Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
epht1Y3TGZ.exe

Overview

General Information

Sample name:epht1Y3TGZ.exe
renamed because original name is a hash value
Original sample name:25860926414bf43383246f7c773a8d6c.exe
Analysis ID:1518342
MD5:25860926414bf43383246f7c773a8d6c
SHA1:760390a4a14df085f4c841067f52c79409cdc93e
SHA256:a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958
Tags:exeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • epht1Y3TGZ.exe (PID: 6640 cmdline: "C:\Users\user\Desktop\epht1Y3TGZ.exe" MD5: 25860926414BF43383246F7C773A8D6C)
    • DZIPR.exe (PID: 6864 cmdline: "C:\Users\user\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
      • DZIPR.exe (PID: 7008 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
        • cmd.exe (PID: 7064 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • explorer.exe (PID: 2336 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • DZIPR.exe (PID: 7056 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 5568 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 4280 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • DZIPR.exe (PID: 764 cmdline: "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 5296 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 6752 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\iikbjmsyJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    C:\Users\user\AppData\Local\Temp\iikbjmsyJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Users\user\AppData\Local\Temp\iikbjmsyJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Users\user\AppData\Local\Temp\iikbjmsyWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        C:\Users\user\AppData\Local\Temp\iikbjmsyREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        00000001.00000000.1739235026.0000000000401000.00000020.00000001.01000000.00000005.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x134b8:$a1: Remcos restarted by watchdog!
                • 0x13a30:$a3: %02i:%02i:%02i:%03i
                Click to see the 53 entries
                SourceRuleDescriptionAuthorStrings
                15.2.cmd.exe.5155b57.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  15.2.cmd.exe.5155b57.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x1dcbe:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x1dd49:$s1: CoGetObject
                  • 0x1dca2:$s2: Elevation:Administrator!new:
                  1.2.DZIPR.exe.358b5ce.4.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    1.2.DZIPR.exe.358b5ce.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x1d0be:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x1d149:$s1: CoGetObject
                    • 0x1d0a2:$s2: Elevation:Administrator!new:
                    1.2.DZIPR.exe.358a9ce.5.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      Click to see the 74 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Windows\SysWOW64\explorer.exe, CommandLine: C:\Windows\SysWOW64\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\explorer.exe, NewProcessName: C:\Windows\SysWOW64\explorer.exe, OriginalFileName: C:\Windows\SysWOW64\explorer.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7064, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\SysWOW64\explorer.exe, ProcessId: 2336, ProcessName: explorer.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsyAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\fsfjAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpxAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpackMalware Configuration Extractor: Remcos {"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsyJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\fsfjJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpxJoe Sandbox ML: detected
                      Source: cmd.exe, 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_b1ac216d-e

                      Exploits

                      barindex
                      Source: Yara matchFile source: 15.2.cmd.exe.5155b57.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DZIPR.exe.358b5ce.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DZIPR.exe.358a9ce.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.5156757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.51a1b57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.explorer.exe.461e757.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.explorer.exe.48a2757.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.explorer.exe.45d8a8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DZIPR.exe.3545901.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.explorer.exe.461db57.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.515ca8a.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.51a2757.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5219b57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.explorer.exe.48a1b57.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.explorer.exe.4fd6a8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.explorer.exe.501c757.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.5110a8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.521a757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.explorer.exe.485ca8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.explorer.exe.501bb57.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.51d4a8a.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DZIPR.exe PID: 6864, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED
                      Source: epht1Y3TGZ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125375066.00000000027C2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217610841.0000000002722000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2391902777.00000000030C2000.00000008.00000001.01000000.00000000.sdmp, iikbjmsy.15.dr, fsfj.3.dr, mtdwpx.10.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125375066.00000000027C2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217610841.0000000002722000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2391902777.00000000030C2000.00000008.00000001.01000000.00000000.sdmp, iikbjmsy.15.dr, fsfj.3.dr, mtdwpx.10.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 00000001.00000002.1766986120.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1767892447.0000000003990000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125654234.00000000052C0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125276347.0000000004E25000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218110243.0000000005240000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217828864.0000000004DA3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125976766.0000000004A70000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125744520.0000000004714000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217750173.0000000004477000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2218057626.0000000004940000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391745006.0000000004D6D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392082164.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392370706.00000000050C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392079481.0000000004C21000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 00000001.00000002.1766986120.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1767892447.0000000003990000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125654234.00000000052C0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125276347.0000000004E25000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218110243.0000000005240000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217828864.0000000004DA3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125976766.0000000004A70000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125744520.0000000004714000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217750173.0000000004477000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2218057626.0000000004940000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391745006.0000000004D6D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392082164.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392370706.00000000050C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392079481.0000000004C21000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002724000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmp, DZIPR.exe, 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmp
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC8748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,1_2_6CC8748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C89748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,2_2_6C89748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F89748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,9_2_6F89748E
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: fullimmersion777.com
                      Source: DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                      Source: DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://support.datanumen.com
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.00000000034E8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.0000000005185000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.000000000510D000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.0000000004589000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.000000000480D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.00000000050C1000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004F87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                      Source: DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.repairfile.com
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.datanumen.com/zip-repair/
                      Source: DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.c
                      Source: DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC904EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,1_2_6CC904EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A04EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,2_2_6C8A04EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A04EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,9_2_6F8A04EE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED

                      System Summary

                      barindex
                      Source: 15.2.cmd.exe.5155b57.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 1.2.DZIPR.exe.358b5ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 1.2.DZIPR.exe.358a9ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.cmd.exe.5156757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.51a1b57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.explorer.exe.461e757.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 13.2.explorer.exe.48a2757.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.explorer.exe.45d8a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 1.2.DZIPR.exe.3545901.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.explorer.exe.461db57.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.515ca8a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.51a2757.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.cmd.exe.5219b57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 13.2.explorer.exe.48a1b57.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.explorer.exe.4fd6a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.explorer.exe.501c757.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.cmd.exe.5110a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.cmd.exe.521a757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 13.2.explorer.exe.485ca8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.explorer.exe.501bb57.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.cmd.exe.51d4a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A0D95 NtdllDefWindowProc_W,9_2_6F8A0D95
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A2932 _memset,NtdllDefWindowProc_W,9_2_6F8A2932
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F89E5F6 NtdllDefWindowProc_W,CallWindowProcW,9_2_6F89E5F6
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00404FAA0_2_00404FAA
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0041206B0_2_0041206B
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0041022D0_2_0041022D
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00411F910_2_00411F91
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC85E701_2_6CC85E70
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC863F01_2_6CC863F0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC85CA01_2_6CC85CA0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CCA2CBB1_2_6CCA2CBB
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC96C6C1_2_6CC96C6C
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC91D851_2_6CC91D85
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC9AE451_2_6CC9AE45
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CCA3E3B1_2_6CCA3E3B
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC95FB71_2_6CC95FB7
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CCA586C1_2_6CCA586C
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC968601_2_6CC96860
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC9648C1_2_6CC9648C
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC817D01_2_6CC817D0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CCA37431_2_6CCA3743
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC817391_2_6CC81739
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC817301_2_6CC81730
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC9708C1_2_6CC9708C
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CCA31FF1_2_6CCA31FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C895E702_2_6C895E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8963F02_2_6C8963F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C895CA02_2_6C895CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8B2CBB2_2_6C8B2CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A6C6C2_2_6C8A6C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A1D852_2_6C8A1D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8B3E3B2_2_6C8B3E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8AAE452_2_6C8AAE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A5FB72_2_6C8A5FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8B586C2_2_6C8B586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A68602_2_6C8A6860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A648C2_2_6C8A648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8917D02_2_6C8917D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8917312_2_6C891731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8917302_2_6C891730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8B37432_2_6C8B3743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A708C2_2_6C8A708C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8B31FF2_2_6C8B31FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F895E709_2_6F895E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8963F09_2_6F8963F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A5FB79_2_6F8A5FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8B3E3B9_2_6F8B3E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8AAE459_2_6F8AAE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A1D859_2_6F8A1D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F895CA09_2_6F895CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8B2CBB9_2_6F8B2CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A6C6C9_2_6F8A6C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8B586C9_2_6F8B586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A68609_2_6F8A6860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8917D09_2_6F8917D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8917319_2_6F891731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8917309_2_6F891730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8B37439_2_6F8B3743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A648C9_2_6F8A648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8B31FF9_2_6F8B31FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A708C9_2_6F8A708C
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\fsfj 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\iikbjmsy 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\mtdwpx 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6CC953BC appears 48 times
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6CC950C9 appears 66 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C8A53BC appears 48 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6F8A50C9 appears 65 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6F8A53BC appears 48 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C8A50C9 appears 65 times
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: String function: 0040243B appears 37 times
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1726094333.000000000252D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs epht1Y3TGZ.exe
                      Source: epht1Y3TGZ.exe, 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs epht1Y3TGZ.exe
                      Source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002724000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDZIPR.DLL4 vs epht1Y3TGZ.exe
                      Source: epht1Y3TGZ.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs epht1Y3TGZ.exe
                      Source: epht1Y3TGZ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 15.2.cmd.exe.5155b57.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 1.2.DZIPR.exe.358b5ce.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 1.2.DZIPR.exe.358a9ce.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.cmd.exe.5156757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.51a1b57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.explorer.exe.461e757.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 13.2.explorer.exe.48a2757.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.explorer.exe.45d8a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 1.2.DZIPR.exe.3545901.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.explorer.exe.461db57.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.515ca8a.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.51a2757.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.cmd.exe.5219b57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 13.2.explorer.exe.48a1b57.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.explorer.exe.4fd6a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.explorer.exe.501c757.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.cmd.exe.5110a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.cmd.exe.521a757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 13.2.explorer.exe.485ca8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.explorer.exe.501bb57.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.cmd.exe.51d4a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@22/16@0/0
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\ekqqtqJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:744:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5660:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeFile created: C:\Users\user\AppData\Local\Temp\a1ba81aaJump to behavior
                      Source: Yara matchFile source: 1.0.DZIPR.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000000.1739235026.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1736102615.000000000277A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\DZIPR.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, type: DROPPED
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: epht1Y3TGZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile read: C:\Users\user\Desktop\epht1Y3TGZ.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\epht1Y3TGZ.exe "C:\Users\user\Desktop\epht1Y3TGZ.exe"
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe"
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: oahisshhqlvln.3.drLNK file: ..\..\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: epht1Y3TGZ.exeStatic file information: File size 4809996 > 1048576
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125375066.00000000027C2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217610841.0000000002722000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2391902777.00000000030C2000.00000008.00000001.01000000.00000000.sdmp, iikbjmsy.15.dr, fsfj.3.dr, mtdwpx.10.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125375066.00000000027C2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217610841.0000000002722000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2391902777.00000000030C2000.00000008.00000001.01000000.00000000.sdmp, iikbjmsy.15.dr, fsfj.3.dr, mtdwpx.10.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 00000001.00000002.1766986120.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1767892447.0000000003990000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125654234.00000000052C0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125276347.0000000004E25000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218110243.0000000005240000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217828864.0000000004DA3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125976766.0000000004A70000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125744520.0000000004714000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217750173.0000000004477000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2218057626.0000000004940000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391745006.0000000004D6D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392082164.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392370706.00000000050C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392079481.0000000004C21000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 00000001.00000002.1766986120.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1767892447.0000000003990000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125654234.00000000052C0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125276347.0000000004E25000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2218110243.0000000005240000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217828864.0000000004DA3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125976766.0000000004A70000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125744520.0000000004714000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217750173.0000000004477000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2218057626.0000000004940000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391745006.0000000004D6D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2392082164.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392370706.00000000050C0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392079481.0000000004C21000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002724000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmp, DZIPR.exe, 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmp
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: DZIPR.dll.0.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: DZIPR.dll.1.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: epht1Y3TGZ.exeStatic PE information: real checksum: 0x33302 should be: 0x4a3c93
                      Source: mtdwpx.10.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: fsfj.3.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: iikbjmsy.15.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: DZIPR.exe.0.drStatic PE information: section name: .didata
                      Source: DZIPR.exe.1.drStatic PE information: section name: .didata
                      Source: fsfj.3.drStatic PE information: section name: cmxvoc
                      Source: mtdwpx.10.drStatic PE information: section name: cmxvoc
                      Source: iikbjmsy.15.drStatic PE information: section name: cmxvoc
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC95401 push ecx; ret 1_2_6CC95414
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC951A1 push ecx; ret 1_2_6CC951B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A5401 push ecx; ret 2_2_6C8A5414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A51A1 push ecx; ret 2_2_6C8A51B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A5401 push ecx; ret 9_2_6F8A5414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A51A1 push ecx; ret 9_2_6F8A51B4
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to dropped file
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\fsfjJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\mtdwpxJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\iikbjmsyJump to dropped file
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\fsfjJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\mtdwpxJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\iikbjmsyJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\FSFJ
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\MTDWPX
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\IIKBJMSY
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC8DE29 IsIconic,GetWindowPlacement,GetWindowRect,1_2_6CC8DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C89DE29 IsIconic,GetWindowPlacement,GetWindowRect,2_2_6C89DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F89DE29 IsIconic,GetWindowPlacement,GetWindowRect,9_2_6F89DE29
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\DZIPR.exeAPI/Special instruction interceptor: Address: 6C977C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C977C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C977945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C973B54
                      Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 2DA317
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\fsfjJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mtdwpxJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\iikbjmsyJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-19010
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_1-18627
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-19023
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-18614
                      Source: C:\Users\user\DZIPR.exeAPI coverage: 4.5 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.7 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.5 %
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC8748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,1_2_6CC8748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C89748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,2_2_6C89748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F89748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,9_2_6F89748E
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                      Source: DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6vmware
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                      Source: explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                      Source: C:\Users\user\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_1-19025
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_2-19012
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\DZIPR.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC93F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6CC93F34
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC85CA0 mov eax, dword ptr fs:[00000030h]1_2_6CC85CA0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC85D78 mov eax, dword ptr fs:[00000030h]1_2_6CC85D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C895CA0 mov eax, dword ptr fs:[00000030h]2_2_6C895CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C895D78 mov eax, dword ptr fs:[00000030h]2_2_6C895D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F895D78 mov eax, dword ptr fs:[00000030h]9_2_6F895D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F895CA0 mov eax, dword ptr fs:[00000030h]9_2_6F895CA0
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC9CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_6CC9CE5C
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC93F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6CC93F34
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC98034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6CC98034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8ACE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6C8ACE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A3F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6C8A3F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 2_2_6C8A8034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6C8A8034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A3F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_6F8A3F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8ACE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_6F8ACE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 9_2_6F8A8034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_6F8A8034

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6F902C26Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6C8FCE9BJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6F902B04Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6C8966A2Jump to behavior
                      Source: C:\Users\user\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6CC866A2Jump to behavior
                      Source: C:\Users\user\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6F8966A2Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2336 base: 2D79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2336 base: 2740000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4280 base: 2D79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4280 base: 26A0000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 6752 base: 2D79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 6752 base: 3040000 value: 00Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2D79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2740000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2D79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 26A0000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2D79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 3040000Jump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoA,1_2_6CCA4DBC
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,1_2_6CC889B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,2_2_6C8B4DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,2_2_6C8989B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,9_2_6F8B4DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,9_2_6F8989B5
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
                      Source: C:\Users\user\DZIPR.exeCode function: 1_2_6CC9D72B __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,1_2_6CC9D72B
                      Source: C:\Users\user\Desktop\epht1Y3TGZ.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.cmd.exe.56c00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.cmd.exe.5c300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.57000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2336, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6752, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iikbjmsy, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\fsfj, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mtdwpx, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      131
                      Masquerading
                      1
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Native API
                      11
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      LSASS Memory111
                      Security Software Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Abuse Elevation Control Mechanism
                      1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets3
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      DLL Side-Loading
                      Cached Domain Credentials134
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1518342 Sample: epht1Y3TGZ.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 Antivirus detection for dropped file 2->63 65 5 other signatures 2->65 9 epht1Y3TGZ.exe 6 2->9         started        13 DZIPR.exe 1 2->13         started        15 DZIPR.exe 1 2->15         started        process3 file4 55 C:\Users\user\DZIPR.exe, PE32 9->55 dropped 57 C:\Users\user\DZIPR.dll, PE32 9->57 dropped 91 Drops PE files to the user root directory 9->91 17 DZIPR.exe 5 9->17         started        93 Maps a DLL or memory area into another process 13->93 95 Found direct / indirect Syscall (likely to bypass EDR) 13->95 21 cmd.exe 2 13->21         started        23 cmd.exe 2 15->23         started        signatures5 process6 file7 45 C:\Users\user\AppData\Roaming\...\DZIPR.exe, PE32 17->45 dropped 47 C:\Users\user\AppData\Roaming\...\DZIPR.dll, PE32 17->47 dropped 67 Switches to a custom stack to bypass stack traces 17->67 69 Found direct / indirect Syscall (likely to bypass EDR) 17->69 25 DZIPR.exe 1 17->25         started        49 C:\Users\user\AppData\Local\Temp\mtdwpx, PE32 21->49 dropped 28 conhost.exe 21->28         started        30 explorer.exe 21->30         started        51 C:\Users\user\AppData\Local\Temp\iikbjmsy, PE32 23->51 dropped 71 Injects code into the Windows Explorer (explorer.exe) 23->71 73 Writes to foreign memory regions 23->73 32 conhost.exe 23->32         started        34 explorer.exe 23->34         started        signatures8 process9 signatures10 85 Maps a DLL or memory area into another process 25->85 87 Switches to a custom stack to bypass stack traces 25->87 89 Found direct / indirect Syscall (likely to bypass EDR) 25->89 36 cmd.exe 5 25->36         started        process11 file12 53 C:\Users\user\AppData\Local\Temp\fsfj, PE32 36->53 dropped 75 Injects code into the Windows Explorer (explorer.exe) 36->75 77 Writes to foreign memory regions 36->77 79 Found hidden mapped module (file has been removed from disk) 36->79 81 Switches to a custom stack to bypass stack traces 36->81 40 explorer.exe 36->40         started        43 conhost.exe 36->43         started        signatures13 process14 signatures15 83 Switches to a custom stack to bypass stack traces 40->83

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\iikbjmsy100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\fsfj100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\mtdwpx100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\iikbjmsy100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\fsfj100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\mtdwpx100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe0%ReversingLabs
                      C:\Users\user\DZIPR.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.symauth.com/cps0(0%URL Reputationsafe
                      http://www.vmware.com/00%Avira URL Cloudsafe
                      https://www.digicert.c0%Avira URL Cloudsafe
                      http://www.vmware.com/0/0%Avira URL Cloudsafe
                      fullimmersion777.com0%Avira URL Cloudsafe
                      http://support.datanumen.com0%Avira URL Cloudsafe
                      http://www.repairfile.com0%Avira URL Cloudsafe
                      https://www.datanumen.com/zip-repair/0%Avira URL Cloudsafe
                      http://www.symauth.com/rpa000%Avira URL Cloudsafe
                      http://www.info-zip.org/0%Avira URL Cloudsafe
                      http://c0rl.m%L0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      fullimmersion777.comtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.vmware.com/0/DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.digicert.cDZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.vmware.com/0DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.datanumen.com/zip-repair/epht1Y3TGZ.exe, 00000000.00000003.1736102615.0000000002F75000.00000004.00000020.00020000.00000000.sdmp, epht1Y3TGZ.exe, 00000000.00000003.1737006961.0000000002460000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://c0rl.m%LDZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.repairfile.comDZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.symauth.com/cps0(DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.symauth.com/rpa00DZIPR.exe, 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 00000001.00000002.1765606333.00000000033ED000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://support.datanumen.comDZIPR.exe, 00000001.00000003.1756607781.0000000003D46000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.info-zip.org/DZIPR.exe, 00000001.00000002.1766393271.00000000034E8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.2125498885.0000000005185000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2217993441.000000000510D000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.2125575098.0000000004589000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2217943505.000000000480D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2391935050.00000000050C1000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.2392238940.0000000004F87000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518342
                      Start date and time:2024-09-25 16:05:18 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 51s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:epht1Y3TGZ.exe
                      renamed because original name is a hash value
                      Original Sample Name:25860926414bf43383246f7c773a8d6c.exe
                      Detection:MAL
                      Classification:mal100.troj.expl.evad.winEXE@22/16@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 70
                      • Number of non-executed functions: 229
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: epht1Y3TGZ.exe
                      TimeTypeDescription
                      10:06:52API Interceptor5x Sleep call for process: cmd.exe modified
                      15:06:35AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT9131.tmp
                      15:06:37Task SchedulerRun new task: lnfast_x64 path: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      15:06:48AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oracledemo_dbg.lnk
                      No context
                      No context
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\fsfj55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                        C:\Users\user\AppData\Local\Temp\iikbjmsy55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                          C:\Users\user\AppData\Local\Temp\mtdwpx55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                            Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1234044
                            Entropy (8bit):7.664473031882771
                            Encrypted:false
                            SSDEEP:24576:El943dyt0CxCz0E00hQ1JwJp/rFNe3hJc4ydIUTjciCvH4FpY:863dGMZ0cGwJpjFNe3hJc4yl9CgpY
                            MD5:EF58D0A24D5A6DC00BD694737B1B1311
                            SHA1:EE4BCF3C7E33A2E12F8AAB667BA3084708E7669D
                            SHA-256:46711314276A371E344EF069513E126BF7985DE21305C224E72F71C60C8157B1
                            SHA-512:AA336264DE202255C97BA439CFFB7DA582E8B1914F61B02580F075695D41D2AFD8CB7002C221996BBEBF238448EB44ABC90C51234FC610A605A58FEB48E77458
                            Malicious:false
                            Reputation:low
                            Preview:>C&.<C&.<C&.=C&.<C&.yC&.)C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C'...v.y.r...k.^1I.R%R.j*H.R4U.n7G.Ick.S6z.O,A.\.U.n7G.I6V.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,o.T7O.Q*\.x;&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,e.X"R.t-U.\-E.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&...o.y.t.a.O.O,U.[7..x.z.O"K.J,T.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.Kq...v...t&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.
                            Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1234044
                            Entropy (8bit):7.664472828261511
                            Encrypted:false
                            SSDEEP:24576:kl943dyt0CxCz0E00hQ1JwJp/rFNe3hJc4ydIUTjciCvH4FpY:c63dGMZ0cGwJpjFNe3hJc4yl9CgpY
                            MD5:6860961845BE2D1B60765FE94F123046
                            SHA1:2E558086BCDB79B2AAAEAB90300DDD6E7F5311C2
                            SHA-256:7A96978DF43E62D0890CA095F4318E7FAF8B934B26592A6A1D08C26137DD2869
                            SHA-512:8B01D57FEDF989B49EA86D3294F909F5E648D795E06AEE93D04F7C3DB8BA7B8ABDF6F92009A56C3EB236F372EA8636028F6DBA5F16466934C8468103A045C4C4
                            Malicious:false
                            Preview:>C&.<C&.<C&.=C&.<C&.yC&.)C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C'...v.y.r...k.^1I.R%R.j*H.R4U.n7G.Ick.S6z.O,A.\.U.n7G.I6V.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,o.T7O.Q*\.x;&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,e.X"R.t-U.\-E.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&...o.y.t.a.O.O,U.[7..x.z.O"K.J,T.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.Kq...v...t&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.
                            Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1234044
                            Entropy (8bit):7.664472185998568
                            Encrypted:false
                            SSDEEP:24576:Jl943dyt0CxCz0E00hQ1JwJp/rFNe3hJc4ydIUTjciCvH4FpY:763dGMZ0cGwJpjFNe3hJc4yl9CgpY
                            MD5:6DEFD53A2063A4A0C46249A25FC4FE15
                            SHA1:E543AD180C96BCED734841B8E8BDDF1EECF9129A
                            SHA-256:6C12E719FBBF7DA82D625130440DCC4C4AB4AA6B16D82ACC4E3618EEC6DB30E2
                            SHA-512:8D7244661BE6CBBC1E03E388AF35AD6CB721D49CD4ECEDA6F11BDC7FC25708E6400B7B47043CC622102686B2DB1F28EB4D2002B189984D8341783BB7F165F6F8
                            Malicious:false
                            Preview:>C&.<C&.<C&.=C&.<C&.yC&.)C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C'...v.y.r...k.^1I.R%R.j*H.R4U.n7G.Ick.S6z.O,A.\.U.n7G.I6V.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,o.T7O.Q*\.x;&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.~,e.X"R.t-U.\-E.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&...o.y.t.a.O.O,U.[7..x.z.O"K.J,T.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.Kq...v...t&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.=C&.
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):500224
                            Entropy (8bit):6.590620352205087
                            Encrypted:false
                            SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                            MD5:6CA401F82443B673FCA7D7DDB0A05357
                            SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                            SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                            SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\fsfj, Author: ditekSHen
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Joe Sandbox View:
                            • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):500224
                            Entropy (8bit):6.590620352205087
                            Encrypted:false
                            SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                            MD5:6CA401F82443B673FCA7D7DDB0A05357
                            SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                            SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                            SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\iikbjmsy, Author: ditekSHen
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Joe Sandbox View:
                            • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):500224
                            Entropy (8bit):6.590620352205087
                            Encrypted:false
                            SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                            MD5:6CA401F82443B673FCA7D7DDB0A05357
                            SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                            SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                            SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\mtdwpx, Author: ditekSHen
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Joe Sandbox View:
                            • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 13:06:17 2024, mtime=Wed Sep 25 13:06:18 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                            Category:dropped
                            Size (bytes):887
                            Entropy (8bit):5.083089062214689
                            Encrypted:false
                            SSDEEP:12:84tYtsa4q2P4WCQ8dY//sp6OSL6/saZE2xQR5ze2jAnmrHgdc8JsrjBmV:8MYt6qCj8+s6OsC22xqVAm+nurjBm
                            MD5:B98004BE7156029147766B196D3DBE43
                            SHA1:19C76031B66F62FA78EBE8E804C435732E9D44BC
                            SHA-256:80B8EAB030788EC3C55735D154802EDD4C1BCEACC9FEAA836B6F08FC36078E2A
                            SHA-512:71D864ED03308C7AF8D7F6B2E99E181630D851B8ACBE23049E9A24B14146506B72966DA8590800D6A67DB355C976DFDAA44EC423F212B12CF3E7965192464F53
                            Malicious:false
                            Preview:L..................F.... ...c...T.....K.T.......A............................:..DG..Yr?.D..U..k0.&...&......vk.v......s.T....A.T.......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^9Y.p...........................%..A.p.p.D.a.t.a...B.V.1.....9Y.p..Roaming.@......CW.^9Y.p..............................R.o.a.m.i.n.g.....b.1.....9Y.p..RUY_DR~1..J......9Y.p9Y.p....i.........................R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9Y.p9Y.p..........................d...D.Z.I.P.R...e.x.e.......d...............-.......c............G1......C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..$.....\.....\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......971342...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                            Process:C:\Users\user\DZIPR.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):354304
                            Entropy (8bit):6.005348176071358
                            Encrypted:false
                            SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                            MD5:AD28D4167571382569D2384FFD7BD2A9
                            SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                            SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                            SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\DZIPR.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):8767704
                            Entropy (8bit):7.112848215947183
                            Encrypted:false
                            SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                            MD5:EC9CE1D67F98072281015C7726FBA245
                            SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                            SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                            SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                            Process:C:\Users\user\DZIPR.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):975374
                            Entropy (8bit):7.888212877886324
                            Encrypted:false
                            SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                            MD5:4649F3A4E58C6040B07F6D486C149A71
                            SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                            SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                            SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                            Malicious:false
                            Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                            Process:C:\Users\user\DZIPR.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):72329
                            Entropy (8bit):4.4816230098296295
                            Encrypted:false
                            SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                            MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                            SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                            SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                            SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                            Malicious:false
                            Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                            Process:C:\Users\user\Desktop\epht1Y3TGZ.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):354304
                            Entropy (8bit):6.005348176071358
                            Encrypted:false
                            SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                            MD5:AD28D4167571382569D2384FFD7BD2A9
                            SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                            SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                            SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\epht1Y3TGZ.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):8767704
                            Entropy (8bit):7.112848215947183
                            Encrypted:false
                            SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                            MD5:EC9CE1D67F98072281015C7726FBA245
                            SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                            SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                            SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                            Process:C:\Users\user\Desktop\epht1Y3TGZ.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):975374
                            Entropy (8bit):7.888212877886324
                            Encrypted:false
                            SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                            MD5:4649F3A4E58C6040B07F6D486C149A71
                            SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                            SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                            SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                            Malicious:false
                            Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                            Process:C:\Users\user\Desktop\epht1Y3TGZ.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):72329
                            Entropy (8bit):4.4816230098296295
                            Encrypted:false
                            SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                            MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                            SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                            SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                            SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                            Malicious:false
                            Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):280
                            Entropy (8bit):3.5772984365087783
                            Encrypted:false
                            SSDEEP:6:PRZi8fcRKUEZglJPZOjzkjTtPjgsW2YRZuy0lbo8lZP1:PRcmcRKMJs0jzvYRQVs0Zt
                            MD5:D0F4475729B019BBFFDAA36502E5843E
                            SHA1:D9771DD87515EA0B8A3C332E8FB7162C69940CD3
                            SHA-256:09C1D502A1ABA5A0E4491661DD6B02C9C480BB847262F4164F7871DA58FC92A8
                            SHA-512:3920E4A4257F684E5BF16F16E049CBFBB0EFDFA53AABEB1286DEB899FD1AE2559B91A50BCA91803F5CBA3D5B67BFC40BB9956D45FCB6B7739FB83DA5E926D138
                            Malicious:false
                            Preview:.......*...K.$....2RF.......<... ................ ....................6.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.........4.....................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.988259707956486
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:epht1Y3TGZ.exe
                            File size:4'809'996 bytes
                            MD5:25860926414bf43383246f7c773a8d6c
                            SHA1:760390a4a14df085f4c841067f52c79409cdc93e
                            SHA256:a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958
                            SHA512:61825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07
                            SSDEEP:98304:+pbYDHaUeRG/GnYDievJRVrQo4QGB0s53+sTH7/93veWGLRHHk:+pbu9e+qYDiQf1hfGWsBVb/rGLhE
                            TLSH:382633423350A0F6CAB8CAB36F2ED7D182B1E7B557112F4B418A1E272D536D6471B2CB
                            File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................0.......3.......................................P.............................
                            Icon Hash:d292fcd8f2f2fe1c
                            Entrypoint:0x411def
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:
                            Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:b5a014d7eeb4c2042897567e1288a095
                            Instruction
                            push ebp
                            mov ebp, esp
                            push FFFFFFFFh
                            push 00414C50h
                            push 00411F80h
                            mov eax, dword ptr fs:[00000000h]
                            push eax
                            mov dword ptr fs:[00000000h], esp
                            sub esp, 68h
                            push ebx
                            push esi
                            push edi
                            mov dword ptr [ebp-18h], esp
                            xor ebx, ebx
                            mov dword ptr [ebp-04h], ebx
                            push 00000002h
                            call dword ptr [00413184h]
                            pop ecx
                            or dword ptr [00419924h], FFFFFFFFh
                            or dword ptr [00419928h], FFFFFFFFh
                            call dword ptr [00413188h]
                            mov ecx, dword ptr [0041791Ch]
                            mov dword ptr [eax], ecx
                            call dword ptr [0041318Ch]
                            mov ecx, dword ptr [00417918h]
                            mov dword ptr [eax], ecx
                            mov eax, dword ptr [00413190h]
                            mov eax, dword ptr [eax]
                            mov dword ptr [00419920h], eax
                            call 00007F994CC45702h
                            cmp dword ptr [00417710h], ebx
                            jne 00007F994CC455EEh
                            push 00411F78h
                            call dword ptr [00413194h]
                            pop ecx
                            call 00007F994CC456D4h
                            push 00417048h
                            push 00417044h
                            call 00007F994CC456BFh
                            mov eax, dword ptr [00417914h]
                            mov dword ptr [ebp-6Ch], eax
                            lea eax, dword ptr [ebp-6Ch]
                            push eax
                            push dword ptr [00417910h]
                            lea eax, dword ptr [ebp-64h]
                            push eax
                            lea eax, dword ptr [ebp-70h]
                            push eax
                            lea eax, dword ptr [ebp-60h]
                            push eax
                            call dword ptr [0041319Ch]
                            push 00417040h
                            push 00417000h
                            call 00007F994CC4568Ch
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x18d04.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1a0000x18d040x18e009dee09854e79aa987e5336a4defda540False0.2433358197236181data5.382874846103129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x1a1f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.6781914893617021
                            RT_ICON0x1a6580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.47068480300187615
                            RT_ICON0x1b7000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.41161825726141077
                            RT_ICON0x1dca80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.3213863958431743
                            RT_ICON0x21ed00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.1865609842659411
                            RT_GROUP_ICON0x326f80x4cdataRussianRussia0.7763157894736842
                            RT_VERSION0x327440x350dataEnglishUnited States0.47523584905660377
                            RT_MANIFEST0x32a940x270ASCII text, with very long lines (624), with no line terminatorsEnglishUnited States0.5144230769230769
                            DLLImport
                            COMCTL32.dll
                            KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                            USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                            GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                            SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                            ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                            OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                            MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                            Language of compilation systemCountry where language is spokenMap
                            RussianRussia
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to jump to process

                            Target ID:0
                            Start time:10:06:14
                            Start date:25/09/2024
                            Path:C:\Users\user\Desktop\epht1Y3TGZ.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\epht1Y3TGZ.exe"
                            Imagebase:0x400000
                            File size:4'809'996 bytes
                            MD5 hash:25860926414BF43383246F7C773A8D6C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1736102615.000000000277A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:10:06:15
                            Start date:25/09/2024
                            Path:C:\Users\user\DZIPR.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\DZIPR.exe"
                            Imagebase:0x400000
                            File size:8'767'704 bytes
                            MD5 hash:EC9CE1D67F98072281015C7726FBA245
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000000.1739235026.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1766393271.000000000353F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                            Antivirus matches:
                            • Detection: 0%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:10:06:17
                            Start date:25/09/2024
                            Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            Imagebase:0x400000
                            File size:8'767'704 bytes
                            MD5 hash:EC9CE1D67F98072281015C7726FBA245
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                            Antivirus matches:
                            • Detection: 0%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:10:06:18
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\cmd.exe
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.2126221230.0000000005C30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.2125498885.00000000051CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:10:06:18
                            Start date:25/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:10:06:37
                            Start date:25/09/2024
                            Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            Imagebase:0x400000
                            File size:8'767'704 bytes
                            MD5 hash:EC9CE1D67F98072281015C7726FBA245
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:10
                            Start time:10:06:39
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\cmd.exe
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.2217993441.0000000005156000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.2218362255.0000000005700000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:true

                            Target ID:11
                            Start time:10:06:39
                            Start date:25/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:10:06:45
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\explorer.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\explorer.exe
                            Imagebase:0x1f0000
                            File size:4'514'184 bytes
                            MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.2125575098.00000000045D2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.2125303235.0000000002799000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                            Reputation:moderate
                            Has exited:true

                            Target ID:13
                            Start time:10:06:56
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\explorer.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\explorer.exe
                            Imagebase:0x1f0000
                            File size:4'514'184 bytes
                            MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2217537794.00000000026F9000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2217943505.0000000004856000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:true

                            Target ID:14
                            Start time:10:06:57
                            Start date:25/09/2024
                            Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                            Imagebase:0x400000
                            File size:8'767'704 bytes
                            MD5 hash:EC9CE1D67F98072281015C7726FBA245
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:15
                            Start time:10:06:57
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\cmd.exe
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.2391935050.000000000510A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.2392314567.00000000056C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:true

                            Target ID:16
                            Start time:10:06:57
                            Start date:25/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:17
                            Start time:10:07:13
                            Start date:25/09/2024
                            Path:C:\Windows\SysWOW64\explorer.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\explorer.exe
                            Imagebase:0x1f0000
                            File size:4'514'184 bytes
                            MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.2391830637.0000000003099000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.2392238940.0000000004FD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:17.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:25.9%
                              Total number of Nodes:1473
                              Total number of Limit Nodes:20
                              execution_graph 9004 410e7f 9005 410e9a 9004->9005 9006 410eb5 9005->9006 9008 40f42d 9005->9008 9009 40f445 free 9008->9009 9010 40f437 9008->9010 9011 4024e7 46 API calls 9009->9011 9010->9009 9012 40f456 9010->9012 9011->9012 9012->9006 10835 411a2d _EH_prolog 10838 4117b9 10835->10838 10837 411a61 10839 4117e9 10838->10839 10840 4117cd 10838->10840 10839->10837 10840->10839 10858 40e58f 10840->10858 10843 40e58f 47 API calls 10844 411801 10843->10844 10844->10839 10845 40e58f 47 API calls 10844->10845 10846 411813 10845->10846 10846->10839 10847 40e58f 47 API calls 10846->10847 10848 411828 10847->10848 10848->10839 10864 40e9b5 10848->10864 10850 41183d 10850->10839 10870 41168a 10850->10870 10852 411a16 10880 40ea88 10852->10880 10855 41164e _CxxThrowException 10857 4118a0 10855->10857 10856 4115a9 memmove _CxxThrowException 10856->10857 10857->10839 10857->10852 10857->10855 10857->10856 10874 4116c7 10857->10874 10859 40e59e 10858->10859 10860 40e5b9 10859->10860 10884 40e556 10859->10884 10860->10839 10860->10843 10863 4024c4 46 API calls 10863->10860 10865 40e9c4 10864->10865 10866 40e9de 10865->10866 10888 40e964 10865->10888 10866->10850 10869 4024c4 46 API calls 10869->10866 10871 411693 10870->10871 10873 4116c4 10871->10873 10892 40e63c 10871->10892 10873->10857 10875 411726 10874->10875 10876 4116df 10874->10876 10877 411709 10875->10877 10879 40e63c _CxxThrowException 10875->10879 10876->10877 10878 40e63c _CxxThrowException 10876->10878 10877->10857 10878->10877 10879->10877 10881 40ea8d 10880->10881 10882 40eaa0 10881->10882 10899 40e9f7 10881->10899 10882->10839 10887 401b1f VirtualFree 10884->10887 10886 40e561 10886->10863 10887->10886 10891 401b1f VirtualFree 10888->10891 10890 40e96e 10890->10869 10891->10890 10895 40e5d3 10892->10895 10896 40e5e1 10895->10896 10897 40e5e5 10895->10897 10896->10871 10897->10896 10898 40e60a _CxxThrowException 10897->10898 10898->10896 10900 40ea0b 10899->10900 10901 40ea30 10900->10901 10902 40ea1c memmove 10900->10902 10901->10881 10902->10901 8236 4096c7 _EH_prolog 8249 4096fa 8236->8249 8237 40971c 8238 409827 8271 40118a 8238->8271 8240 409851 8244 40985e ??2@YAPAXI 8240->8244 8241 40983c 8322 409425 8241->8322 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8249 8252 409878 8244->8252 8245 40969d 8 API calls 8245->8249 8246 40e959 VirtualFree ??3@YAXPAX free free ctype 8246->8249 8249->8237 8249->8238 8249->8242 8249->8245 8249->8246 8315 4095b7 8249->8315 8319 409403 8249->8319 8250 4098c2 8325 409530 8250->8325 8251 409925 ??2@YAPAXI 8251->8252 8252->8250 8252->8251 8256 409530 3 API calls 8252->8256 8258 409425 ctype 3 API calls 8252->8258 8260 4099a2 8252->8260 8265 409a65 8252->8265 8281 409fb4 8252->8281 8285 408ea4 8252->8285 8328 409c13 ??2@YAPAXI 8252->8328 8330 409f49 8252->8330 8256->8252 8258->8252 8261 409530 3 API calls 8260->8261 8262 4099c7 8261->8262 8263 409425 ctype 3 API calls 8262->8263 8263->8237 8267 409530 3 API calls 8265->8267 8268 409a84 8267->8268 8269 409425 ctype 3 API calls 8268->8269 8269->8237 8272 401198 GetDiskFreeSpaceExW 8271->8272 8273 4011ee SendMessageW 8271->8273 8272->8273 8274 4011b0 8272->8274 8275 4011d6 8273->8275 8274->8273 8276 401f9d 19 API calls 8274->8276 8275->8240 8275->8241 8277 4011c9 8276->8277 8278 407717 25 API calls 8277->8278 8279 4011cf 8278->8279 8279->8275 8280 4011e7 8279->8280 8280->8273 8282 409fdd 8281->8282 8334 409dff 8282->8334 8608 40aef3 8285->8608 8288 408ec1 8288->8252 8290 408fd5 8626 408b7c 8290->8626 8291 408f0d ??2@YAPAXI 8300 408ef5 8291->8300 8293 408f31 ??2@YAPAXI 8293->8300 8300->8290 8300->8291 8300->8293 8669 40cdb8 ??2@YAPAXI 8300->8669 8317 4095cc 8315->8317 8318 4095c6 8315->8318 8316 4095e2 _CxxThrowException 8316->8318 8317->8316 8317->8318 8318->8249 8320 40e8e2 4 API calls 8319->8320 8321 40940b 8320->8321 8321->8249 8323 40e8da ctype 3 API calls 8322->8323 8324 409433 8323->8324 8326 408963 ctype 3 API calls 8325->8326 8327 40953b 8326->8327 8329 409c45 8328->8329 8329->8252 8332 409f4e 8330->8332 8331 409f75 8331->8252 8332->8331 8333 409cde 110 API calls 8332->8333 8333->8332 8337 409e04 8334->8337 8335 409e3a 8335->8252 8337->8335 8338 409cde 8337->8338 8339 409cf8 8338->8339 8343 401626 8339->8343 8406 40db1f 8339->8406 8340 409d2c 8340->8337 8344 401642 8343->8344 8350 401638 8343->8350 8409 40a62f _EH_prolog 8344->8409 8346 40166f 8453 40eca9 8346->8453 8347 401411 2 API calls 8349 401688 8347->8349 8351 401962 ??3@YAXPAX 8349->8351 8352 40169d 8349->8352 8350->8340 8356 40eca9 VariantClear 8351->8356 8435 401329 8352->8435 8355 4016a8 8439 401454 8355->8439 8356->8350 8359 401362 2 API calls 8360 4016c7 ??3@YAXPAX 8359->8360 8365 4016d9 8360->8365 8392 401928 ??3@YAXPAX 8360->8392 8362 40eca9 VariantClear 8362->8350 8363 4016fa 8364 40eca9 VariantClear 8363->8364 8366 401702 ??3@YAXPAX 8364->8366 8365->8363 8367 401764 8365->8367 8380 401725 8365->8380 8366->8346 8369 4017a2 8367->8369 8370 401789 8367->8370 8368 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8368->8371 8373 4017c4 GetLocalTime SystemTimeToFileTime 8369->8373 8374 4017aa 8369->8374 8372 40eca9 VariantClear 8370->8372 8371->8346 8375 401791 ??3@YAXPAX 8372->8375 8373->8374 8376 4017e1 8374->8376 8377 4017f8 8374->8377 8374->8380 8375->8346 8457 403354 lstrlenW 8376->8457 8444 40301a GetFileAttributesW 8377->8444 8380->8368 8382 401934 GetLastError 8382->8392 8383 401818 ??2@YAPAXI 8385 401824 8383->8385 8384 40192a 8384->8382 8481 40db53 8385->8481 8388 40190f 8391 40eca9 VariantClear 8388->8391 8389 40185f GetLastError 8484 4012f7 8389->8484 8391->8392 8392->8362 8393 401871 8394 403354 86 API calls 8393->8394 8398 40187f ??3@YAXPAX 8393->8398 8396 4018cc 8394->8396 8396->8398 8399 40db53 2 API calls 8396->8399 8397 40189c 8400 40eca9 VariantClear 8397->8400 8398->8397 8401 4018f1 8399->8401 8402 4018aa ??3@YAXPAX 8400->8402 8403 4018f5 GetLastError 8401->8403 8404 401906 ??3@YAXPAX 8401->8404 8402->8346 8403->8398 8404->8388 8600 40da56 8406->8600 8410 40a738 8409->8410 8411 40a66a 8409->8411 8412 40a687 8410->8412 8413 40a73d 8410->8413 8411->8412 8414 40a704 8411->8414 8415 40a679 8411->8415 8422 40a6ad 8412->8422 8513 40a3b0 8412->8513 8416 40a6f2 8413->8416 8419 40a747 8413->8419 8420 40a699 8413->8420 8414->8422 8487 40e69c 8414->8487 8415->8416 8417 40a67e 8415->8417 8509 40ed34 8416->8509 8421 40a6b2 8417->8421 8426 40a684 8417->8426 8419->8416 8419->8421 8420->8422 8501 40ed59 8420->8501 8421->8422 8505 40ed79 8421->8505 8496 40ecae 8422->8496 8425 40a71a 8490 40eced 8425->8490 8426->8412 8426->8420 8432 40eca9 VariantClear 8434 40166b 8432->8434 8434->8346 8434->8347 8436 401340 8435->8436 8437 40112b 2 API calls 8436->8437 8438 40134b 8437->8438 8438->8355 8440 4012f7 2 API calls 8439->8440 8441 401462 8440->8441 8528 4013e2 8441->8528 8443 40146d 8443->8359 8445 403037 8444->8445 8451 401804 8444->8451 8446 403048 8445->8446 8447 40303b SetLastError 8445->8447 8448 403051 8446->8448 8450 40305f FindFirstFileW 8446->8450 8446->8451 8447->8451 8531 402fed 8448->8531 8450->8448 8452 403072 FindClose CompareFileTime 8450->8452 8451->8382 8451->8383 8451->8384 8452->8448 8452->8451 8454 40ec65 8453->8454 8455 40ec86 VariantClear 8454->8455 8456 40ec9d 8454->8456 8455->8350 8456->8350 8458 4024fc 2 API calls 8457->8458 8459 403375 8458->8459 8460 40112b 2 API calls 8459->8460 8463 403385 8459->8463 8460->8463 8462 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8464 4033e8 8462->8464 8465 4033f2 8462->8465 8463->8462 8476 403477 8463->8476 8572 401986 CreateDirectoryW 8463->8572 8466 40301a 22 API calls 8464->8466 8467 401986 4 API calls 8465->8467 8478 4033f8 ??3@YAXPAX 8465->8478 8466->8465 8480 403405 8467->8480 8468 4034a7 8469 407776 55 API calls 8468->8469 8473 4034b1 ??3@YAXPAX 8469->8473 8470 40340a 8578 407776 8470->8578 8471 40346b ??3@YAXPAX 8477 4034bc 8471->8477 8472 40341d memcpy 8472->8480 8473->8477 8476->8468 8476->8478 8477->8380 8478->8477 8479 401986 4 API calls 8479->8480 8480->8470 8480->8471 8480->8472 8480->8479 8597 40db3c 8481->8597 8485 40112b 2 API calls 8484->8485 8486 401311 8485->8486 8486->8393 8488 4012f7 2 API calls 8487->8488 8489 40e6a9 8488->8489 8489->8425 8517 40ecd7 8490->8517 8493 40ed12 8494 40a726 ??3@YAXPAX 8493->8494 8495 40ed17 _CxxThrowException 8493->8495 8494->8422 8495->8494 8520 40ec65 8496->8520 8498 40ecba 8499 40a7b2 8498->8499 8500 40ecbe memcpy 8498->8500 8499->8432 8500->8499 8502 40ed62 8501->8502 8503 40ed67 8501->8503 8504 40ecd7 VariantClear 8502->8504 8503->8422 8504->8503 8506 40ed82 8505->8506 8507 40ed87 8505->8507 8508 40ecd7 VariantClear 8506->8508 8507->8422 8508->8507 8510 40ed42 8509->8510 8511 40ed3d 8509->8511 8510->8422 8512 40ecd7 VariantClear 8511->8512 8512->8510 8514 40a3c2 8513->8514 8515 40a3de 8514->8515 8524 40eda0 8514->8524 8515->8422 8518 40eca9 VariantClear 8517->8518 8519 40ecdf SysAllocString 8518->8519 8519->8493 8519->8494 8521 40ec6d 8520->8521 8522 40ec86 VariantClear 8521->8522 8523 40ec9d 8521->8523 8522->8498 8523->8498 8525 40eda9 8524->8525 8527 40edae 8524->8527 8526 40ecd7 VariantClear 8525->8526 8526->8527 8527->8515 8529 401398 2 API calls 8528->8529 8530 4013f2 8529->8530 8530->8443 8537 402c86 8531->8537 8533 402ff6 8534 403017 8533->8534 8535 402ffb GetLastError 8533->8535 8534->8451 8536 403006 8535->8536 8536->8451 8538 402c93 GetFileAttributesW 8537->8538 8539 402c8f 8537->8539 8540 402ca4 8538->8540 8541 402ca9 8538->8541 8539->8533 8540->8533 8542 402cc7 8541->8542 8543 402cad SetFileAttributesW 8541->8543 8548 402b79 8542->8548 8545 402cc3 8543->8545 8546 402cba DeleteFileW 8543->8546 8545->8533 8546->8533 8549 4024fc 2 API calls 8548->8549 8550 402b90 8549->8550 8551 40254d 2 API calls 8550->8551 8552 402b9d FindFirstFileW 8551->8552 8553 402c55 SetFileAttributesW 8552->8553 8568 402bbf 8552->8568 8555 402c60 RemoveDirectoryW 8553->8555 8556 402c78 ??3@YAXPAX 8553->8556 8554 401329 2 API calls 8554->8568 8555->8556 8557 402c6d ??3@YAXPAX 8555->8557 8558 402c80 8556->8558 8557->8558 8558->8533 8560 40254d 2 API calls 8560->8568 8561 402c24 SetFileAttributesW 8561->8556 8563 402c2d DeleteFileW 8561->8563 8562 402bef lstrcmpW 8564 402c05 lstrcmpW 8562->8564 8565 402c38 FindNextFileW 8562->8565 8563->8568 8564->8565 8564->8568 8566 402c4e FindClose 8565->8566 8565->8568 8566->8553 8567 402b79 2 API calls 8567->8568 8568->8554 8568->8556 8568->8560 8568->8561 8568->8562 8568->8565 8568->8567 8569 401429 8568->8569 8570 401398 2 API calls 8569->8570 8571 401433 8570->8571 8571->8568 8573 4019c7 8572->8573 8574 401997 GetLastError 8572->8574 8573->8463 8575 4019b1 GetFileAttributesW 8574->8575 8577 4019a6 8574->8577 8575->8573 8575->8577 8576 4019a7 SetLastError 8576->8463 8577->8573 8577->8576 8579 401f9d 19 API calls 8578->8579 8580 40778a wvsprintfW 8579->8580 8581 407859 8580->8581 8582 4077ab GetLastError FormatMessageW 8580->8582 8585 4076a8 25 API calls 8581->8585 8583 4077d9 FormatMessageW 8582->8583 8584 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8582->8584 8583->8581 8583->8584 8589 4076a8 8584->8589 8587 407865 8585->8587 8587->8478 8590 407715 ??3@YAXPAX LocalFree 8589->8590 8591 4076b7 8589->8591 8590->8587 8592 40661a 2 API calls 8591->8592 8593 4076c6 IsWindow 8592->8593 8594 4076ef 8593->8594 8595 4076dd IsBadReadPtr 8593->8595 8596 4073d1 21 API calls 8594->8596 8595->8594 8596->8590 8598 40db1f 2 API calls 8597->8598 8599 401857 8598->8599 8599->8388 8599->8389 8605 40d985 8600->8605 8603 40da65 CreateFileW 8604 40da8a 8603->8604 8604->8340 8606 40d98f CloseHandle 8605->8606 8607 40d99a 8605->8607 8606->8607 8607->8603 8607->8604 8609 40af0c 8608->8609 8624 408ebd 8608->8624 8609->8624 8699 40ac7a 8609->8699 8611 40af3f 8612 40ac7a 7 API calls 8611->8612 8613 40b0cb 8611->8613 8617 40af96 8612->8617 8615 40e959 ctype 4 API calls 8613->8615 8614 40afbd 8706 40e959 8614->8706 8615->8624 8617->8613 8617->8614 8618 40b043 8621 40e959 ctype 4 API calls 8618->8621 8619 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8620 40afc6 8619->8620 8620->8618 8620->8619 8622 40b07f 8621->8622 8623 40e959 ctype 4 API calls 8622->8623 8623->8624 8624->8288 8625 4065ea InitializeCriticalSection 8624->8625 8625->8300 8718 4086f0 8626->8718 8670 40cdc7 8669->8670 8671 408761 4 API calls 8670->8671 8672 40cdde 8671->8672 8672->8300 8700 40e8da ctype 3 API calls 8699->8700 8701 40ac86 8700->8701 8710 40e811 8701->8710 8703 40aca2 8703->8611 8704 409403 4 API calls 8705 40ac90 8704->8705 8705->8703 8705->8704 8707 40e93b 8706->8707 8708 40e8da ctype 3 API calls 8707->8708 8709 40e943 ??3@YAXPAX 8708->8709 8709->8620 8711 40e8a5 8710->8711 8712 40e824 8710->8712 8711->8705 8713 40e833 _CxxThrowException 8712->8713 8714 40e863 ??2@YAPAXI 8712->8714 8715 40e895 ??3@YAXPAX 8712->8715 8713->8712 8714->8712 8716 40e879 memcpy 8714->8716 8715->8711 8716->8715 8719 40e8da ctype 3 API calls 8718->8719 8720 4086f8 8719->8720 8721 40e8da ctype 3 API calls 8720->8721 8722 408700 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408708 8723->8724 9013 40dace 9016 40daac 9013->9016 9019 40da8f 9016->9019 9020 40da56 2 API calls 9019->9020 9021 40daa9 9020->9021 9003 40dadc ReadFile 9022 411def __set_app_type __p__fmode __p__commode 9023 411e5e 9022->9023 9024 411e72 9023->9024 9025 411e66 __setusermatherr 9023->9025 9034 411f66 _controlfp 9024->9034 9025->9024 9027 411e77 _initterm __getmainargs _initterm 9028 411ecb GetStartupInfoA 9027->9028 9030 411eff GetModuleHandleA 9028->9030 9035 4064af _EH_prolog 9030->9035 9034->9027 9038 404faa 9035->9038 9343 401b37 GetModuleHandleW CreateWindowExW 9038->9343 9041 404fdc 9042 40648e MessageBoxA 9041->9042 9044 404ff6 9041->9044 9043 4064a5 exit _XcptFilter 9042->9043 9045 401411 2 API calls 9044->9045 9046 40502d 9045->9046 9047 401411 2 API calls 9046->9047 9048 405035 9047->9048 9346 403e23 9048->9346 9053 40254d 2 API calls 9054 405073 9053->9054 9355 402a69 9054->9355 9056 40507c 9369 403d71 9056->9369 9060 40509b _wtol 9062 4050b1 9060->9062 9061 4050d6 9063 403d71 6 API calls 9061->9063 9374 404405 9062->9374 9064 4050e1 9063->9064 9065 4050e7 9064->9065 9066 405118 9064->9066 9531 404996 9065->9531 9067 405130 GetModuleFileNameW 9066->9067 9069 40112b 2 API calls 9066->9069 9070 405151 9067->9070 9071 405142 9067->9071 9069->9067 9076 403d71 6 API calls 9070->9076 9072 407776 55 API calls 9071->9072 9081 4050ec 9072->9081 9073 4050ee ??3@YAXPAX 9549 403e70 9073->9549 9075 4050ff ??3@YAXPAX ??3@YAXPAX 9075->9043 9089 405173 9076->9089 9077 4052d5 9078 401362 2 API calls 9077->9078 9079 4052e5 9078->9079 9080 401362 2 API calls 9079->9080 9084 4052f2 9080->9084 9081->9073 9082 4051fa 9082->9081 9083 40522a 9082->9083 9086 405213 _wtol 9082->9086 9087 403d71 6 API calls 9083->9087 9085 40538d ??2@YAPAXI 9084->9085 9088 401329 2 API calls 9084->9088 9095 405399 9085->9095 9086->9083 9093 405289 9087->9093 9090 405327 9088->9090 9089->9077 9089->9081 9089->9082 9089->9083 9092 401429 2 API calls 9089->9092 9091 401329 2 API calls 9090->9091 9097 40533d 9091->9097 9092->9089 9093->9077 9094 404594 2 API calls 9093->9094 9096 4052ba 9094->9096 9098 4053cf 9095->9098 9102 407776 55 API calls 9095->9102 9096->9077 9100 401362 2 API calls 9096->9100 9101 401362 2 API calls 9097->9101 9399 4025ae 9098->9399 9100->9077 9104 405367 9101->9104 9102->9098 9106 401f9d 19 API calls 9104->9106 9105 4025ae 2 API calls 9107 4053f6 9105->9107 9108 40536e 9106->9108 9109 4025ae 2 API calls 9107->9109 9110 40254d 2 API calls 9108->9110 9112 4053fe 9109->9112 9111 405377 9110->9111 9111->9085 9402 404e3f 9112->9402 9117 40546f 9118 405534 9117->9118 9121 403d71 6 API calls 9117->9121 9120 40e8da ctype 3 API calls 9118->9120 9119 402844 10 API calls 9122 405441 9119->9122 9123 40553c 9120->9123 9124 405493 9121->9124 9122->9117 9125 407776 55 API calls 9122->9125 9126 405573 9123->9126 9580 403093 9123->9580 9124->9118 9135 40549d 9124->9135 9127 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9125->9127 9129 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9126->9129 9130 40557c 9126->9130 9127->9117 9129->9073 9129->9081 9133 405588 wsprintfW 9130->9133 9134 4055ed 9130->9134 9141 401411 2 API calls 9130->9141 9143 401329 ??2@YAPAXI ??3@YAXPAX 9130->9143 9145 401f9d 19 API calls 9130->9145 9614 402f6c ??2@YAPAXI 9130->9614 9620 402425 ??3@YAXPAX ??3@YAXPAX 9130->9620 9132 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9136 4054f5 9132->9136 9137 401411 2 API calls 9133->9137 9430 404603 9134->9430 9135->9129 9554 404cbc 9135->9554 9136->9129 9137->9130 9140 4054cc 9140->9129 9142 407776 55 API calls 9140->9142 9141->9130 9144 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9142->9144 9143->9130 9144->9136 9145->9130 9146 40584a 9147 404603 26 API calls 9146->9147 9180 40586a 9147->9180 9149 403b94 lstrlenW lstrlenW _wcsnicmp 9177 4055f6 9149->9177 9152 405933 9492 404034 9152->9492 9153 4024fc 2 API calls 9153->9180 9157 4059d8 CoInitialize 9164 40243b lstrcmpW 9157->9164 9158 40595a 9161 40243b lstrcmpW 9158->9161 9159 405935 ??3@YAXPAX 9159->9152 9163 405969 9161->9163 9162 401411 ??2@YAPAXI ??3@YAXPAX 9162->9180 9165 405979 9163->9165 9167 401f9d 19 API calls 9163->9167 9166 4059fe 9164->9166 9647 403b40 9165->9647 9168 405a12 9166->9168 9171 401329 2 API calls 9166->9171 9167->9165 9498 403b59 9168->9498 9170 401362 2 API calls 9170->9180 9171->9168 9175 4073d1 21 API calls 9179 40599c ctype 9175->9179 9176 401329 2 API calls 9176->9180 9177->9146 9177->9149 9190 4057dd _wtol 9177->9190 9204 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9177->9204 9621 40484d 9177->9621 9632 40408b 9177->9632 9178 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9178->9184 9219 405a61 9178->9219 9667 4082e9 9178->9667 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9179->9185 9180->9152 9180->9153 9180->9159 9180->9162 9180->9170 9180->9176 9183 402f6c 7 API calls 9180->9183 9489 40243b 9180->9489 9646 402425 ??3@YAXPAX ??3@YAXPAX 9180->9646 9183->9180 9184->9178 9185->9081 9187 405910 ??3@YAXPAX 9187->9180 9188 401411 2 API calls 9188->9219 9190->9177 9191 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9211 405bf3 9191->9211 9192 405a9f GetKeyState 9192->9219 9193 405c6c 9194 405ca2 9193->9194 9195 405c74 9193->9195 9198 4012f7 2 API calls 9194->9198 9709 403f85 9195->9709 9202 405cb0 9198->9202 9201 40243b lstrcmpW 9201->9219 9205 403b59 15 API calls 9202->9205 9203 401362 2 API calls 9209 405c91 ??3@YAXPAX 9203->9209 9204->9081 9207 405cb9 9205->9207 9206 407776 55 API calls 9208 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9208 9210 405cca ??3@YAXPAX 9207->9210 9215 401362 2 API calls 9207->9215 9208->9211 9216 405cd9 9209->9216 9210->9216 9211->9206 9212 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9211->9212 9212->9211 9213 405bcd ??3@YAXPAX 9213->9219 9214 401329 ??2@YAPAXI ??3@YAXPAX 9214->9219 9215->9210 9217 405d24 9216->9217 9218 405d16 9216->9218 9722 40786b 9217->9722 9505 404a44 9218->9505 9219->9188 9219->9191 9219->9192 9219->9193 9219->9201 9219->9211 9219->9212 9219->9213 9219->9214 9222 401429 ??2@YAPAXI ??3@YAXPAX 9219->9222 9694 407613 9219->9694 9703 407674 9219->9703 9222->9219 9223 405d20 9224 405d65 9223->9224 9728 403e0d 9223->9728 9225 404034 21 API calls 9224->9225 9227 405d77 9225->9227 9229 406373 9227->9229 9230 401411 2 API calls 9227->9230 9232 4063f7 ctype 9229->9232 9235 40243b lstrcmpW 9229->9235 9231 405d95 9230->9231 9275 405da8 9231->9275 9732 40453e 9231->9732 9234 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9232->9234 9240 40243b lstrcmpW 9232->9240 9236 406461 9234->9236 9237 406467 ??3@YAXPAX 9234->9237 9238 4063a4 9235->9238 9236->9237 9239 403e70 ctype 4 API calls 9237->9239 9238->9232 9759 403f48 9238->9759 9241 406478 ??3@YAXPAX ??3@YAXPAX 9239->9241 9243 406416 9240->9243 9241->9043 9242 401411 ??2@YAPAXI ??3@YAXPAX 9242->9275 9243->9234 9247 406423 9243->9247 9246 405dd8 9249 405de5 9246->9249 9250 4061fa ??3@YAXPAX ??3@YAXPAX 9246->9250 9252 4012f7 2 API calls 9247->9252 9248 4073d1 21 API calls 9253 4063e0 ??3@YAXPAX 9248->9253 9741 4043c6 9249->9741 9254 406312 9250->9254 9251 40243b lstrcmpW 9251->9275 9256 406432 9252->9256 9253->9232 9260 40636a ??3@YAXPAX 9254->9260 9261 404034 21 API calls 9254->9261 9764 404aff 9256->9764 9259 405e45 9263 401329 2 API calls 9259->9263 9260->9229 9265 406321 9261->9265 9266 405e4e 9263->9266 9264 4043c6 2 API calls 9267 405e0e 9264->9267 9749 4048ab 9265->9749 9271 403b7f 19 API calls 9266->9271 9272 401362 2 API calls 9267->9272 9269 40626b ??3@YAXPAX ??3@YAXPAX 9269->9254 9270 401329 2 API calls 9270->9275 9289 405e57 9271->9289 9273 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9272->9273 9276 406211 9273->9276 9277 405e41 9273->9277 9274 40633a SetCurrentDirectoryW 9278 4048ab 4 API calls 9274->9278 9275->9242 9275->9246 9275->9251 9275->9259 9275->9269 9275->9270 9279 401429 2 API calls 9275->9279 9282 403e0d 16 API calls 9276->9282 9277->9259 9280 406362 9278->9280 9281 405ee5 ??3@YAXPAX ??3@YAXPAX 9279->9281 9283 403e0d 16 API calls 9280->9283 9281->9275 9284 406216 9282->9284 9283->9260 9285 407776 55 API calls 9284->9285 9287 40621f 7 API calls 9285->9287 9286 403bce lstrlenW lstrlenW _wcsnicmp 9286->9289 9288 40625e 9287->9288 9288->9269 9289->9286 9290 405f61 _wtol 9289->9290 9291 406025 9289->9291 9290->9289 9292 406080 9291->9292 9293 40602e 9291->9293 9294 401362 2 API calls 9292->9294 9295 406053 9293->9295 9296 406034 9293->9296 9297 40607e 9294->9297 9299 401329 2 API calls 9295->9299 9298 401329 2 API calls 9296->9298 9300 40254d 2 API calls 9297->9300 9301 40603f 9298->9301 9302 406051 9299->9302 9303 406092 9300->9303 9304 40254d 2 API calls 9301->9304 9305 40243b lstrcmpW 9302->9305 9306 401411 2 API calls 9303->9306 9307 406048 9304->9307 9308 406068 9305->9308 9309 40609a 9306->9309 9310 40254d 2 API calls 9307->9310 9308->9303 9312 40254d 2 API calls 9308->9312 9311 401411 2 API calls 9309->9311 9310->9302 9313 4060a2 memset 9311->9313 9312->9297 9314 4060e1 9313->9314 9315 404594 2 API calls 9314->9315 9316 4060fe 9315->9316 9317 401329 2 API calls 9316->9317 9318 406109 9317->9318 9319 403b7f 19 API calls 9318->9319 9320 406112 9319->9320 9321 4061b1 9320->9321 9525 4021ed 9320->9525 9323 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9325 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9325 9323->9254 9325->9250 9326 406150 9328 403b7f 19 API calls 9326->9328 9327 401429 2 API calls 9329 406147 9327->9329 9330 406168 ShellExecuteExW 9328->9330 9331 40254d 2 API calls 9329->9331 9333 406282 9330->9333 9334 40618c 9330->9334 9331->9326 9337 407776 55 API calls 9333->9337 9335 4061a0 CloseHandle 9334->9335 9336 406192 WaitForSingleObject 9334->9336 9746 402185 9335->9746 9336->9335 9339 40628c 9337->9339 9340 403e0d 16 API calls 9339->9340 9341 406291 9 API calls 9340->9341 9342 4062e1 9341->9342 9342->9323 9344 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9343->9344 9345 401b9f GetVersionExW 9343->9345 9344->9345 9345->9041 9345->9042 9347 40112b 2 API calls 9346->9347 9348 403e38 GetCommandLineW 9347->9348 9349 404594 9348->9349 9350 4045ce 9349->9350 9353 4045a2 9349->9353 9352 401429 2 API calls 9350->9352 9354 4045c6 9350->9354 9351 401429 2 API calls 9351->9353 9352->9350 9353->9351 9353->9354 9354->9053 9356 401411 2 API calls 9355->9356 9364 402a79 9356->9364 9357 401362 2 API calls 9358 402b6c ??3@YAXPAX 9357->9358 9358->9056 9359 401429 ??2@YAPAXI ??3@YAXPAX 9359->9364 9360 402b5f 9360->9357 9362 401411 2 API calls 9362->9364 9364->9359 9364->9360 9364->9362 9365 401362 2 API calls 9364->9365 9803 4025c6 9364->9803 9806 40272e 9364->9806 9366 402ad9 ??3@YAXPAX 9365->9366 9367 4013e2 2 API calls 9366->9367 9368 402aee ??3@YAXPAX ??3@YAXPAX 9367->9368 9368->9364 9370 403d80 9369->9370 9371 403dbd 9370->9371 9372 403d9a lstrlenW lstrlenW 9370->9372 9371->9060 9371->9062 9817 401a85 9372->9817 9375 401f47 3 API calls 9374->9375 9376 404416 9375->9376 9377 401f9d 19 API calls 9376->9377 9378 40441d 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 404429 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404435 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404441 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 40444d 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 404459 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404465 9389->9390 9391 404480 SHGetSpecialFolderPathW 9390->9391 9394 404533 #17 9390->9394 9395 401411 2 API calls 9390->9395 9396 401329 ??2@YAPAXI ??3@YAXPAX 9390->9396 9398 402f6c 7 API calls 9390->9398 9822 402425 ??3@YAXPAX ??3@YAXPAX 9390->9822 9391->9390 9392 40449a wsprintfW 9391->9392 9393 401411 2 API calls 9392->9393 9393->9390 9394->9061 9395->9390 9396->9390 9398->9390 9400 4022b0 2 API calls 9399->9400 9401 4025c2 9400->9401 9401->9105 9823 403e86 9402->9823 9404 404e56 9405 403e86 2 API calls 9404->9405 9406 404e65 9405->9406 9827 404343 9406->9827 9410 404e82 ??3@YAXPAX 9411 404343 3 API calls 9410->9411 9412 404e9d 9411->9412 9413 403ec1 2 API calls 9412->9413 9414 404ea8 ??3@YAXPAX wsprintfA 9413->9414 9843 403ef6 9414->9843 9416 404ed0 9417 403ef6 2 API calls 9416->9417 9418 404edb 9417->9418 9419 402844 9418->9419 9420 402851 9419->9420 9428 40dcfb 3 API calls 9420->9428 9421 402863 lstrlenA lstrlenA 9426 402890 9421->9426 9422 40296e 9422->9117 9422->9119 9423 40293b memmove 9423->9422 9423->9426 9424 4028db memcmp 9424->9422 9424->9426 9425 402918 memcmp 9425->9426 9426->9422 9426->9423 9426->9424 9426->9425 9429 40dcc7 GetLastError 9426->9429 9854 402640 9426->9854 9428->9421 9429->9426 9431 40243b lstrcmpW 9430->9431 9432 40461c 9431->9432 9433 40466c 9432->9433 9435 401329 2 API calls 9432->9435 9434 40243b lstrcmpW 9433->9434 9436 40468a 9434->9436 9437 404633 9435->9437 9439 40243b lstrcmpW 9436->9439 9438 401f9d 19 API calls 9437->9438 9440 40463a 9438->9440 9442 4046a2 9439->9442 9441 40254d 2 API calls 9440->9441 9443 404643 9441->9443 9444 40243b lstrcmpW 9442->9444 9445 401329 2 API calls 9443->9445 9446 4046ba 9444->9446 9447 40465c 9445->9447 9449 40243b lstrcmpW 9446->9449 9448 401f9d 19 API calls 9447->9448 9450 404663 9448->9450 9451 4046d2 9449->9451 9452 40254d 2 API calls 9450->9452 9453 4046e9 9451->9453 9454 4046d9 lstrcmpiW 9451->9454 9452->9433 9455 40243b lstrcmpW 9453->9455 9454->9453 9456 4046ff 9455->9456 9457 40243b lstrcmpW 9456->9457 9458 40472c 9457->9458 9459 404739 9458->9459 9857 403d1f 9458->9857 9461 40243b lstrcmpW 9459->9461 9462 40474d 9461->9462 9463 40476d 9462->9463 9466 40243b lstrcmpW 9462->9466 9861 403cc6 9462->9861 9465 40243b lstrcmpW 9463->9465 9470 404780 9465->9470 9466->9462 9467 4047a0 9469 40243b lstrcmpW 9467->9469 9471 4047ac 9469->9471 9470->9467 9472 40243b lstrcmpW 9470->9472 9865 403cf7 9470->9865 9473 40243b lstrcmpW 9471->9473 9472->9470 9474 4047bd 9473->9474 9475 40243b lstrcmpW 9474->9475 9476 4047ce 9475->9476 9477 4047e4 9476->9477 9478 4047db _wtol 9476->9478 9479 40243b lstrcmpW 9477->9479 9478->9477 9480 4047f0 9479->9480 9481 404800 9480->9481 9482 4047f7 _wtol 9480->9482 9483 40243b lstrcmpW 9481->9483 9482->9481 9484 40480c 9483->9484 9485 40243b lstrcmpW 9484->9485 9486 404824 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 40483c 9487->9488 9488->9177 9873 4023dd 9489->9873 9493 404045 9492->9493 9494 404088 9492->9494 9495 4012f7 2 API calls 9493->9495 9496 403b7f 19 API calls 9493->9496 9494->9157 9494->9158 9495->9493 9497 404062 SetEnvironmentVariableW ??3@YAXPAX 9496->9497 9497->9493 9497->9494 9499 40393b 7 API calls 9498->9499 9500 403b69 9499->9500 9501 4039f6 7 API calls 9500->9501 9502 403b74 9501->9502 9503 4027c7 6 API calls 9502->9503 9504 403b7a 9503->9504 9504->9178 9650 4083b6 9504->9650 9877 408676 9505->9877 9507 404a55 ??2@YAPAXI 9508 404a64 9507->9508 9522 40dcfb 3 API calls 9508->9522 9509 404a85 9879 40b2fc 9509->9879 9885 40a7de _EH_prolog 9509->9885 9510 404a95 9511 404ab3 9510->9511 9512 404a99 9510->9512 9514 404ada ??2@YAPAXI 9511->9514 9517 403354 86 API calls 9511->9517 9513 407776 55 API calls 9512->9513 9521 404aa1 9513->9521 9515 404ae6 9514->9515 9516 404aed 9514->9516 9920 404292 9515->9920 9901 40150b 9516->9901 9519 404ac6 9517->9519 9519->9514 9519->9521 9521->9223 9522->9509 9526 402200 LoadLibraryA GetProcAddress 9525->9526 9527 4021fb 9525->9527 9528 40221b 9526->9528 9529 402223 9526->9529 9527->9321 9527->9326 9527->9327 9528->9527 9529->9528 10383 4021b9 LoadLibraryA GetProcAddress 9529->10383 9532 40661a 2 API calls 9531->9532 9533 4049af 9532->9533 9534 401f9d 19 API calls 9533->9534 9535 4049bd 9534->9535 9536 4024fc 2 API calls 9535->9536 9537 4049c7 9536->9537 9538 4049fd 9537->9538 9540 40254d ??2@YAPAXI ??3@YAXPAX 9537->9540 9539 40254d 2 API calls 9538->9539 9541 404a0a 9539->9541 9540->9537 9542 401f9d 19 API calls 9541->9542 9543 404a11 9542->9543 9544 40254d 2 API calls 9543->9544 9545 404a1b 9544->9545 9546 4073d1 21 API calls 9545->9546 9547 404a30 ??3@YAXPAX 9546->9547 9548 404a41 ctype 9547->9548 9548->9081 9550 40e8da ctype 3 API calls 9549->9550 9551 403e7e 9550->9551 9552 40e8da ctype 3 API calls 9551->9552 9553 40e943 ??3@YAXPAX 9552->9553 9553->9075 9555 40db53 2 API calls 9554->9555 9556 404ce8 9555->9556 9557 404d44 9556->9557 9559 4024fc 2 API calls 9556->9559 9558 4025ae 2 API calls 9557->9558 9560 404d4c 9558->9560 9561 404cf7 9559->9561 9562 403e86 2 API calls 9560->9562 9565 404db5 ??3@YAXPAX 9561->9565 9567 403354 86 API calls 9561->9567 9563 404d59 9562->9563 9564 403ef6 2 API calls 9563->9564 9566 404d66 9564->9566 9579 404db1 9565->9579 9568 403ef6 2 API calls 9566->9568 9569 404d1b 9567->9569 9570 404d73 9568->9570 9569->9565 9572 40db53 2 API calls 9569->9572 9571 403ef6 2 API calls 9570->9571 9573 404d80 9571->9573 9574 404d37 9572->9574 9575 40dd5f 2 API calls 9573->9575 9574->9565 9576 404d3b ??3@YAXPAX 9574->9576 9577 404d94 9575->9577 9576->9557 9577->9565 9578 404d9d ??3@YAXPAX 9577->9578 9578->9579 9579->9140 9581 4025ae 2 API calls 9580->9581 9597 4030a8 9581->9597 9582 403301 9583 403344 ??3@YAXPAX 9582->9583 9584 40334e 9583->9584 9584->9126 9584->9132 9585 401411 ??2@YAPAXI ??3@YAXPAX 9585->9597 9587 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9587->9597 9588 401362 2 API calls 9589 4030f3 ??3@YAXPAX ??3@YAXPAX 9588->9589 9590 403303 9589->9590 9589->9597 10391 4029c3 9590->10391 9594 40331c ??3@YAXPAX 9594->9584 9595 4031e5 strncmp 9596 4031d0 strncmp 9595->9596 9595->9597 9596->9595 9596->9597 9597->9582 9597->9585 9597->9587 9597->9588 9597->9590 9597->9595 9598 401362 2 API calls 9597->9598 9599 402640 2 API calls 9597->9599 9602 402640 ??2@YAPAXI ??3@YAXPAX 9597->9602 9604 4023dd lstrcmpW 9597->9604 9605 402f6c 7 API calls 9597->9605 9607 403330 9597->9607 9608 4032b2 lstrcmpW 9597->9608 9612 401329 2 API calls 9597->9612 10385 402986 9597->10385 10390 402425 ??3@YAXPAX ??3@YAXPAX 9597->10390 9600 403252 ??3@YAXPAX 9598->9600 9599->9596 9601 402a69 9 API calls 9600->9601 9603 403263 lstrcmpW 9601->9603 9602->9597 9603->9597 9604->9597 9605->9597 9610 402f6c 7 API calls 9607->9610 9608->9597 9609 4032c0 lstrcmpW 9608->9609 9609->9597 9611 40333c 9610->9611 10409 402425 ??3@YAXPAX ??3@YAXPAX 9611->10409 9612->9597 9615 402f7b 9614->9615 9617 402f86 9614->9617 10411 402668 9615->10411 9618 408761 4 API calls 9617->9618 9619 402f92 9618->9619 9619->9130 9620->9130 9622 4024fc 2 API calls 9621->9622 9623 40485f 9622->9623 9624 40254d 2 API calls 9623->9624 9625 40486c 9624->9625 9626 404888 9625->9626 9627 401429 2 API calls 9625->9627 9628 40254d 2 API calls 9626->9628 9627->9625 9629 404892 9628->9629 9630 40408b 94 API calls 9629->9630 9631 40489d ??3@YAXPAX 9630->9631 9631->9177 9633 4040a2 lstrlenW 9632->9633 9634 4040ce 9632->9634 9635 401a85 4 API calls 9633->9635 9634->9177 9636 4040b8 9635->9636 9636->9633 9636->9634 9637 4040d5 9636->9637 9638 4024fc 2 API calls 9637->9638 9641 4040de 9638->9641 10416 402776 9641->10416 9642 403093 84 API calls 9643 40414c 9642->9643 9644 404156 ??3@YAXPAX ??3@YAXPAX 9643->9644 9645 40416d ??3@YAXPAX ??3@YAXPAX 9643->9645 9644->9634 9645->9634 9646->9187 9648 40661a 2 API calls 9647->9648 9649 403b48 9648->9649 9649->9175 9651 408646 9650->9651 9663 4083d5 ctype 9650->9663 9651->9184 9652 40661a 2 API calls 9652->9663 9653 40786b 23 API calls 9653->9663 9654 40243b lstrcmpW 9654->9663 9656 407674 23 API calls 9656->9663 9657 407613 23 API calls 9657->9663 9658 403b40 2 API calls 9658->9663 9659 401f9d 19 API calls 9659->9663 9660 403f48 4 API calls 9660->9663 9661 4073d1 21 API calls 9661->9663 9662 407776 55 API calls 9662->9663 9663->9651 9663->9652 9663->9653 9663->9654 9663->9656 9663->9657 9663->9658 9663->9659 9663->9660 9663->9661 9663->9662 9664 407717 25 API calls 9663->9664 9665 4073d1 21 API calls 9663->9665 10426 40744b 9663->10426 9664->9663 9666 408476 ??3@YAXPAX 9665->9666 9666->9663 9668 40243b lstrcmpW 9667->9668 9669 4082fd 9668->9669 9670 40830b 9669->9670 10430 4019f0 GetStdHandle WriteFile 9669->10430 9672 40831e 9670->9672 10431 4019f0 GetStdHandle WriteFile 9670->10431 9674 408333 9672->9674 10432 4019f0 GetStdHandle WriteFile 9672->10432 9676 408344 9674->9676 10433 4019f0 GetStdHandle WriteFile 9674->10433 9677 40243b lstrcmpW 9676->9677 9679 408351 9677->9679 9682 40835f 9679->9682 10434 4019f0 GetStdHandle WriteFile 9679->10434 9681 40243b lstrcmpW 9683 40836c 9681->9683 9682->9681 9684 40837a 9683->9684 10435 4019f0 GetStdHandle WriteFile 9683->10435 9686 40243b lstrcmpW 9684->9686 9687 408387 9686->9687 9688 408395 9687->9688 10436 4019f0 GetStdHandle WriteFile 9687->10436 9690 40243b lstrcmpW 9688->9690 9691 4083a2 9690->9691 9692 4083b2 9691->9692 10437 4019f0 GetStdHandle WriteFile 9691->10437 9692->9178 9695 407636 9694->9695 9696 407658 9695->9696 9697 40764b 9695->9697 10441 407186 9696->10441 10438 407154 9697->10438 9700 407653 9701 4073d1 21 API calls 9700->9701 9702 407671 9701->9702 9702->9219 9704 407689 9703->9704 9705 40716d 2 API calls 9704->9705 9706 407694 9705->9706 9707 4073d1 21 API calls 9706->9707 9708 4076a5 9707->9708 9708->9219 9710 401411 2 API calls 9709->9710 9711 403f96 9710->9711 9712 402535 2 API calls 9711->9712 9713 403f9f GetTempPathW 9712->9713 9714 403fb8 9713->9714 9719 403fcf 9713->9719 9715 402535 2 API calls 9714->9715 9716 403fc3 GetTempPathW 9715->9716 9716->9719 9717 402535 2 API calls 9718 403ff2 wsprintfW 9717->9718 9718->9719 9719->9717 9720 404009 GetFileAttributesW 9719->9720 9721 40402d 9719->9721 9720->9719 9720->9721 9721->9203 9723 40787e 9722->9723 10447 40719f 9723->10447 9726 4073d1 21 API calls 9727 4078b3 9726->9727 9727->9223 9729 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9728->9729 9730 403e16 9728->9730 9729->9224 9731 402c86 16 API calls 9730->9731 9731->9729 9733 40243b lstrcmpW 9732->9733 9734 40455d 9733->9734 9735 404592 9734->9735 9736 401329 2 API calls 9734->9736 9735->9275 9737 40456c 9736->9737 9738 403b7f 19 API calls 9737->9738 9739 404572 9738->9739 9739->9735 9740 401429 2 API calls 9739->9740 9740->9735 9742 4012f7 2 API calls 9741->9742 9743 4043d4 9742->9743 9744 40254d 2 API calls 9743->9744 9745 4043df 9744->9745 9745->9264 9747 4021a9 9746->9747 9748 40218e LoadLibraryA GetProcAddress 9746->9748 9747->9321 9748->9747 9750 401411 2 API calls 9749->9750 9757 4048bc 9750->9757 9751 401329 2 API calls 9751->9757 9752 40494e 9753 404988 ??3@YAXPAX 9752->9753 9755 4048ab 3 API calls 9752->9755 9753->9274 9754 401429 2 API calls 9754->9757 9756 404985 9755->9756 9756->9753 9757->9751 9757->9752 9757->9754 9758 40243b lstrcmpW 9757->9758 9758->9757 9760 40661a 2 API calls 9759->9760 9761 403f50 9760->9761 9762 401411 2 API calls 9761->9762 9763 403f5e 9762->9763 9763->9248 9765 404cb1 ??3@YAXPAX 9764->9765 9766 404b15 9764->9766 9769 404cb7 9765->9769 9766->9765 9767 404b29 GetDriveTypeW 9766->9767 9767->9765 9768 404b55 9767->9768 9770 403f85 6 API calls 9768->9770 9769->9234 9771 404b63 CreateFileW 9770->9771 9772 404b89 9771->9772 9773 404c7b ??3@YAXPAX ??3@YAXPAX 9771->9773 9774 401411 2 API calls 9772->9774 9773->9769 9775 404b92 9774->9775 9776 401329 2 API calls 9775->9776 9777 404b9f 9776->9777 9778 40254d 2 API calls 9777->9778 9779 404bad 9778->9779 9780 4013e2 2 API calls 9779->9780 9781 404bb9 9780->9781 9782 40254d 2 API calls 9781->9782 9783 404bc7 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bd4 9784->9785 9786 4013e2 2 API calls 9785->9786 9787 404be0 9786->9787 9788 40254d 2 API calls 9787->9788 9789 404bed 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bf6 9790->9791 9792 4013e2 2 API calls 9791->9792 9793 404c02 9792->9793 9794 40254d 2 API calls 9793->9794 9795 404c0b 9794->9795 9796 402776 3 API calls 9795->9796 9797 404c1d WriteFile ??3@YAXPAX CloseHandle 9796->9797 9798 404c4b 9797->9798 9799 404c8c 9797->9799 9798->9799 9800 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9798->9800 9801 402c86 16 API calls 9799->9801 9800->9773 9802 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9801->9802 9802->9769 9812 4022b0 9803->9812 9807 401411 2 API calls 9806->9807 9808 40273a 9807->9808 9809 402772 9808->9809 9810 402535 2 API calls 9808->9810 9809->9364 9811 402757 MultiByteToWideChar 9810->9811 9811->9809 9813 4022ea 9812->9813 9814 4022be ??2@YAPAXI 9812->9814 9813->9364 9814->9813 9815 4022cf ??3@YAXPAX 9814->9815 9815->9813 9818 401ae3 9817->9818 9819 401a97 9817->9819 9818->9371 9819->9818 9820 401abc CharUpperW CharUpperW 9819->9820 9820->9819 9821 401af3 CharUpperW CharUpperW 9820->9821 9821->9818 9822->9390 9824 403e9e 9823->9824 9825 4022b0 2 API calls 9824->9825 9826 403eac 9825->9826 9826->9404 9828 40435e 9827->9828 9829 404375 9828->9829 9830 40436a 9828->9830 9831 4025ae 2 API calls 9829->9831 9847 4025f6 9830->9847 9833 40437e 9831->9833 9835 4022b0 2 API calls 9833->9835 9834 404373 9839 403ec1 9834->9839 9836 404387 9835->9836 9837 4025f6 2 API calls 9836->9837 9838 4043b5 ??3@YAXPAX 9837->9838 9838->9834 9840 403ecd 9839->9840 9842 403ede 9839->9842 9841 4022b0 2 API calls 9840->9841 9841->9842 9842->9410 9844 403f06 9843->9844 9844->9844 9850 4022fc 9844->9850 9846 403f13 9846->9416 9848 4022b0 2 API calls 9847->9848 9849 402610 9848->9849 9849->9834 9851 402340 9850->9851 9852 402310 9850->9852 9851->9846 9853 4022b0 2 API calls 9852->9853 9853->9851 9855 4022fc 2 API calls 9854->9855 9856 40264a 9855->9856 9856->9426 9858 403d3d 9857->9858 9869 403c63 9858->9869 9862 403cd3 9861->9862 9863 403c63 _wtol 9862->9863 9864 403cf4 9863->9864 9864->9462 9866 403d04 9865->9866 9867 403c63 _wtol 9866->9867 9868 403d1c 9867->9868 9868->9470 9870 403c6d 9869->9870 9871 403c88 _wtol 9870->9871 9872 403cc1 9870->9872 9871->9870 9872->9459 9875 4023e8 9873->9875 9874 4023f4 lstrcmpW 9874->9875 9876 402411 9874->9876 9875->9874 9875->9876 9876->9180 9878 408679 9877->9878 9878->9507 9880 40b30d 9879->9880 9884 40dcfb 3 API calls 9880->9884 9881 40b321 9882 40b331 9881->9882 9925 40b163 9881->9925 9882->9510 9884->9881 9886 40a7fe 9885->9886 9887 40b2fc 11 API calls 9886->9887 9888 40a823 9887->9888 9889 40a845 9888->9889 9890 40a82c 9888->9890 9953 40cc59 _EH_prolog 9889->9953 9956 40a3fe 9890->9956 9902 40151e 9901->9902 9903 401329 2 API calls 9902->9903 9904 40152b 9903->9904 9905 401429 2 API calls 9904->9905 9906 401534 CreateThread 9905->9906 9907 401563 9906->9907 9908 401568 WaitForSingleObject 9906->9908 10377 40129c 9906->10377 9909 40786b 23 API calls 9907->9909 9910 401585 9908->9910 9911 4015b7 9908->9911 9909->9908 9914 4015a3 9910->9914 9917 401594 9910->9917 9912 4015b3 9911->9912 9913 4015bf GetExitCodeThread 9911->9913 9912->9521 9915 4015d6 9913->9915 9916 407776 55 API calls 9914->9916 9915->9912 9915->9917 9918 401605 SetLastError 9915->9918 9916->9912 9917->9912 9919 407776 55 API calls 9917->9919 9918->9917 9919->9912 9921 401411 2 API calls 9920->9921 9922 4042ab 9921->9922 9923 401411 2 API calls 9922->9923 9924 4042b7 9923->9924 9924->9516 9938 40f0b6 9925->9938 9927 40b192 9927->9882 9928 40b17e 9928->9927 9941 40adc3 9928->9941 9931 40b297 ??3@YAXPAX 9931->9927 9932 40b2a2 ??3@YAXPAX 9932->9927 9934 40b27a memmove 9935 40b1d9 9934->9935 9935->9931 9935->9932 9935->9934 9936 40b2ac memcpy 9935->9936 9937 40dcfb 3 API calls 9936->9937 9937->9932 9949 40f06b 9938->9949 9942 40add0 9941->9942 9943 40ae0d memcpy 9941->9943 9944 40add5 ??2@YAPAXI 9942->9944 9945 40adfb 9942->9945 9943->9935 9946 40adfd ??3@YAXPAX 9944->9946 9947 40ade5 memmove 9944->9947 9945->9946 9946->9943 9947->9946 9950 40f0af 9949->9950 9951 40f07d 9949->9951 9950->9928 9951->9950 9952 40dcc7 GetLastError 9951->9952 9952->9951 9964 40c9fc 9953->9964 10360 40a28e 9956->10360 9986 40a0bf 9964->9986 10109 40a030 9986->10109 10110 40e8da ctype 3 API calls 10109->10110 10111 40a039 10110->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a041 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a049 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a051 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a059 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a061 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a06b 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a073 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a080 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a088 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a095 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a09d 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a0aa 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0b2 10136->10137 10361 40e8da ctype 3 API calls 10360->10361 10362 40a29c 10361->10362 10378 4012a5 10377->10378 10379 4012b8 10377->10379 10378->10379 10380 4012a7 Sleep 10378->10380 10381 4012f1 10379->10381 10382 4012e3 EndDialog 10379->10382 10380->10378 10382->10381 10384 4021db 10383->10384 10384->9528 10386 4025ae 2 API calls 10385->10386 10387 402992 10386->10387 10388 4029be 10387->10388 10389 402640 2 API calls 10387->10389 10388->9597 10389->10387 10390->9597 10392 4029d2 10391->10392 10393 4029de 10391->10393 10410 4019f0 GetStdHandle WriteFile 10392->10410 10395 4025ae 2 API calls 10393->10395 10399 4029e8 10395->10399 10396 4029d9 10408 402425 ??3@YAXPAX ??3@YAXPAX 10396->10408 10397 402a13 10398 40272e 3 API calls 10397->10398 10400 402a25 10398->10400 10399->10397 10403 402640 2 API calls 10399->10403 10401 402a33 10400->10401 10402 402a47 10400->10402 10404 407776 55 API calls 10401->10404 10405 407776 55 API calls 10402->10405 10403->10399 10406 402a42 ??3@YAXPAX ??3@YAXPAX 10404->10406 10405->10406 10406->10396 10408->9594 10409->9583 10410->10396 10412 4012f7 2 API calls 10411->10412 10413 402676 10412->10413 10414 4012f7 2 API calls 10413->10414 10415 402682 10414->10415 10415->9617 10417 4025ae 2 API calls 10416->10417 10418 402785 10417->10418 10419 4027c1 10418->10419 10422 402628 10418->10422 10419->9642 10423 402634 10422->10423 10424 40263a WideCharToMultiByte 10422->10424 10425 4022b0 2 API calls 10423->10425 10424->10419 10425->10424 10427 407456 10426->10427 10428 40745b 10426->10428 10427->9663 10428->10427 10429 4073d1 21 API calls 10428->10429 10429->10427 10430->9670 10431->9672 10432->9674 10433->9676 10434->9682 10435->9684 10436->9688 10437->9692 10439 40661a 2 API calls 10438->10439 10440 40715c 10439->10440 10440->9700 10444 40716d 10441->10444 10445 40661a 2 API calls 10444->10445 10446 407175 10445->10446 10446->9700 10448 40661a 2 API calls 10447->10448 10449 4071a7 10448->10449 10449->9726 8030 40f3f1 8033 4024e7 8030->8033 8038 40245a 8033->8038 8036 4024f5 8037 4024f6 malloc 8039 40246a 8038->8039 8045 402466 8038->8045 8040 40247a GlobalMemoryStatusEx 8039->8040 8039->8045 8041 402488 8040->8041 8040->8045 8041->8045 8046 401f9d 8041->8046 8045->8036 8045->8037 8047 401fb4 8046->8047 8048 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8047->8048 8049 401fdb 8047->8049 8050 402095 SetLastError 8048->8050 8051 40201d ??2@YAPAXI GetEnvironmentVariableW 8048->8051 8066 407717 8049->8066 8050->8049 8056 4020ac 8050->8056 8052 40204c GetLastError 8051->8052 8064 40207e ??3@YAXPAX 8051->8064 8053 402052 8052->8053 8052->8064 8059 402081 8053->8059 8060 40205c lstrcmpiW 8053->8060 8055 4020cb lstrlenA ??2@YAPAXI 8057 402136 MultiByteToWideChar 8055->8057 8058 4020fc GetLocaleInfoW 8055->8058 8056->8055 8073 401f47 8056->8073 8057->8049 8058->8057 8062 402123 _wtol 8058->8062 8059->8050 8063 40206b ??3@YAXPAX 8060->8063 8060->8064 8062->8057 8063->8059 8064->8059 8065 4020c1 8065->8055 8080 40661a 8066->8080 8069 40774e 8084 4073d1 8069->8084 8070 40773c IsBadReadPtr 8070->8069 8074 401f51 GetUserDefaultUILanguage 8073->8074 8075 401f95 8073->8075 8076 401f72 GetSystemDefaultUILanguage 8074->8076 8077 401f6e 8074->8077 8075->8065 8076->8075 8078 401f7e GetSystemDefaultLCID 8076->8078 8077->8065 8078->8075 8079 401f8e 8078->8079 8079->8075 8081 406643 8080->8081 8082 40666f IsWindow 8080->8082 8081->8082 8083 40664b GetSystemMetrics GetSystemMetrics 8081->8083 8082->8069 8082->8070 8083->8082 8085 4073e0 8084->8085 8086 407444 8084->8086 8085->8086 8096 4024fc 8085->8096 8086->8045 8088 4073f1 8089 4024fc 2 API calls 8088->8089 8090 4073fc 8089->8090 8100 403b7f 8090->8100 8093 403b7f 19 API calls 8094 40740e ??3@YAXPAX ??3@YAXPAX 8093->8094 8094->8086 8097 402513 8096->8097 8109 40112b 8097->8109 8099 40251e 8099->8088 8173 403880 8100->8173 8102 403b59 8114 40393b 8102->8114 8104 403b69 8137 4039f6 8104->8137 8106 403b74 8160 4027c7 8106->8160 8110 401177 8109->8110 8111 401139 ??2@YAPAXI 8109->8111 8110->8099 8111->8110 8113 40115a 8111->8113 8112 40116f ??3@YAXPAX 8112->8110 8113->8112 8113->8113 8196 401411 8114->8196 8118 403954 8203 40254d 8118->8203 8120 403961 8121 4024fc 2 API calls 8120->8121 8122 40396e 8121->8122 8207 403805 8122->8207 8125 401362 2 API calls 8126 403992 8125->8126 8127 40254d 2 API calls 8126->8127 8128 40399f 8127->8128 8129 4024fc 2 API calls 8128->8129 8130 4039ac 8129->8130 8131 403805 3 API calls 8130->8131 8132 4039bc ??3@YAXPAX 8131->8132 8133 4024fc 2 API calls 8132->8133 8134 4039d3 8133->8134 8135 403805 3 API calls 8134->8135 8136 4039e2 ??3@YAXPAX ??3@YAXPAX 8135->8136 8136->8104 8138 401411 2 API calls 8137->8138 8139 403a04 8138->8139 8140 401362 2 API calls 8139->8140 8141 403a0f 8140->8141 8142 40254d 2 API calls 8141->8142 8143 403a1c 8142->8143 8144 4024fc 2 API calls 8143->8144 8145 403a29 8144->8145 8146 403805 3 API calls 8145->8146 8147 403a39 ??3@YAXPAX 8146->8147 8148 401362 2 API calls 8147->8148 8149 403a4d 8148->8149 8150 40254d 2 API calls 8149->8150 8151 403a5a 8150->8151 8152 4024fc 2 API calls 8151->8152 8153 403a67 8152->8153 8154 403805 3 API calls 8153->8154 8155 403a77 ??3@YAXPAX 8154->8155 8156 4024fc 2 API calls 8155->8156 8157 403a8e 8156->8157 8158 403805 3 API calls 8157->8158 8159 403a9d ??3@YAXPAX ??3@YAXPAX 8158->8159 8159->8106 8161 401411 2 API calls 8160->8161 8162 4027d5 8161->8162 8163 4027e5 ExpandEnvironmentStringsW 8162->8163 8166 40112b 2 API calls 8162->8166 8164 402809 8163->8164 8165 4027fe ??3@YAXPAX 8163->8165 8232 402535 8164->8232 8167 402840 8165->8167 8166->8163 8167->8093 8170 402824 8171 401362 2 API calls 8170->8171 8172 402838 ??3@YAXPAX 8171->8172 8172->8167 8174 401411 2 API calls 8173->8174 8175 40388e 8174->8175 8176 401362 2 API calls 8175->8176 8177 403899 8176->8177 8178 40254d 2 API calls 8177->8178 8179 4038a6 8178->8179 8180 4024fc 2 API calls 8179->8180 8181 4038b3 8180->8181 8182 403805 3 API calls 8181->8182 8183 4038c3 ??3@YAXPAX 8182->8183 8184 401362 2 API calls 8183->8184 8185 4038d7 8184->8185 8186 40254d 2 API calls 8185->8186 8187 4038e4 8186->8187 8188 4024fc 2 API calls 8187->8188 8189 4038f1 8188->8189 8190 403805 3 API calls 8189->8190 8191 403901 ??3@YAXPAX 8190->8191 8192 4024fc 2 API calls 8191->8192 8193 403918 8192->8193 8194 403805 3 API calls 8193->8194 8195 403927 ??3@YAXPAX ??3@YAXPAX 8194->8195 8195->8102 8197 40112b 2 API calls 8196->8197 8198 401425 8197->8198 8199 401362 8198->8199 8200 40136e 8199->8200 8202 401380 8199->8202 8201 40112b 2 API calls 8200->8201 8201->8202 8202->8118 8204 40255a 8203->8204 8212 401398 8204->8212 8206 402565 8206->8120 8208 40381b 8207->8208 8209 403817 ??3@YAXPAX 8207->8209 8208->8209 8216 4026b1 8208->8216 8220 402f96 8208->8220 8209->8125 8213 4013dc 8212->8213 8214 4013ac 8212->8214 8213->8206 8215 40112b 2 API calls 8214->8215 8215->8213 8217 4026c7 8216->8217 8218 4026db 8217->8218 8224 402346 memmove 8217->8224 8218->8208 8221 402fa5 8220->8221 8223 402fbe 8221->8223 8225 4026e6 8221->8225 8223->8208 8224->8218 8226 4026f6 8225->8226 8227 401398 2 API calls 8226->8227 8228 402702 8227->8228 8231 402346 memmove 8228->8231 8230 40270f 8230->8223 8231->8230 8233 402541 8232->8233 8234 402547 ExpandEnvironmentStringsW 8232->8234 8235 40112b 2 API calls 8233->8235 8234->8170 8235->8234 11179 40e4f9 11180 40e516 11179->11180 11181 40e506 11179->11181 11184 40de46 11181->11184 11187 401b1f VirtualFree 11184->11187 11186 40de81 ??3@YAXPAX 11186->11180 11187->11186
                              APIs
                                • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                              • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                              • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                              • _wtol.MSVCRT ref: 0040509F
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                              • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                              • _wtol.MSVCRT ref: 00405217
                              • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                              • wsprintfW.USER32 ref: 00405595
                              • _wtol.MSVCRT ref: 004057DE
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                              • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                              • CoInitialize.OLE32(00000000), ref: 004059E9
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                              • GetKeyState.USER32(00000010), ref: 00405AA1
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                              • memset.MSVCRT ref: 004060AE
                              • ShellExecuteExW.SHELL32(?), ref: 0040617E
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                              • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                              • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                              • _wtol.MSVCRT ref: 00405F65
                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                              • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                              • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                              • API String ID: 154539431-3058303289
                              • Opcode ID: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                              • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                              • Opcode Fuzzy Hash: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                              • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 700 4017a2-4017a8 695->700 701 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->701 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 700->704 705 4017aa-4017ad 700->705 701->660 709 4017dc-4017df 704->709 707 4017b6-4017c2 705->707 708 4017af-4017b1 705->708 707->709 708->693 710 4017e1-4017eb call 403354 709->710 711 4017f8-4017ff call 40301a 709->711 710->697 716 4017f1-4017f3 710->716 715 401804-401809 711->715 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 746 4018d1-4018d9 739->746 747 4018db-4018f3 call 40db53 739->747 742 40188a-40189a ??3@YAXPAX@Z 740->742 744 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 742->744 745 40189c-40189e 742->745 744->660 745->744 746->742 753 4018f5-401904 GetLastError 747->753 754 401906-40190e ??3@YAXPAX@Z 747->754 753->742 754->729
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                              • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                              • Opcode Fuzzy Hash: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                              • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                              • SetLastError.KERNEL32(00000010), ref: 0040303D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AttributesErrorFileLast
                              • String ID:
                              • API String ID: 1799206407-0
                              • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                              • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                              • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                              • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                              APIs
                              • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                              • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: DiskFreeMessageSendSpace
                              • String ID:
                              • API String ID: 696007252-0
                              • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                              • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                              • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                              • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                              • String ID: HpA
                              • API String ID: 801014965-2938899866
                              • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                              • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                              • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                              • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                              Control-flow Graph

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                              • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                              • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                              • DispatchMessageW.USER32(?), ref: 00401B89
                              • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                              • String ID: Static
                              • API String ID: 2479445380-2272013587
                              • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                              • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                              • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                              • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                              APIs
                              • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                              • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@memcpymemmove
                              • String ID:
                              • API String ID: 3549172513-3916222277
                              • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                              • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                              • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                              • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 851 4033f8-4033fa 838->851 852 403419-40341b 839->852 853 40340a-403417 call 407776 839->853 840->831 847 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->847 848 40347f-40348a 841->848 844->837 849 4033b6 844->849 864 4034bc-4034c0 847->864 848->847 854 40348c-403490 848->854 849->835 858 40349c-4034a5 ??3@YAXPAX@Z 851->858 855 40346b-403475 ??3@YAXPAX@Z 852->855 856 40341d-40343c memcpy 852->856 853->851 854->847 860 403492-403497 854->860 855->864 862 403451-403455 856->862 863 40343e 856->863 858->864 860->847 861 403499-40349b 860->861 861->858 867 403440-403448 862->867 868 403457-403464 call 401986 862->868 866 403450 863->866 866->862 867->868 869 40344a-40344e 867->869 868->853 872 403466-403469 868->872 869->866 869->868 872->855 872->856
                              APIs
                              • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                              • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                              • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                              • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                              • String ID:
                              • API String ID: 846840743-0
                              • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                              • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                              • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                              • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                              • wsprintfW.USER32 ref: 004044A7
                                • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                              • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                              • String ID: 7zSfxFolder%02d$IA
                              • API String ID: 3387708999-1317665167
                              • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                              • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                              • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                              • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 925 408f26 923->925 926 408f19-408f24 923->926 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 925->927 926->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 944 409199-4091b0 935->944 945 409019-40901c 935->945 939 409020-409035 call 40e8da call 40874d 936->939 965 408fb0-408fb2 937->965 966 408fb6-408fbb 937->966 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 944->952 953 40934c-409367 call 4087ea 944->953 945->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 970 4090ad-4090b3 955->970 971 40907f 955->971 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 963 409051-409061 call 408726 958->963 959->963 987 409063-409066 963->987 988 409068 963->988 965->966 968 408fc3-408fcf 966->968 969 408fbd-408fbf 966->969 968->922 968->923 969->968 981 409187-409196 call 408e83 970->981 982 4090b9-4090d9 call 40d94b 970->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 971->977 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->970 1016 409261-409264 978->1016 1017 4092c9 978->1017 985 4091f7-409209 979->985 986 4092b9-4092bb 979->986 981->944 997 4090de-4090e6 982->997 999 4093a4-4093b8 call 408761 983->999 1000 4093ba-4093d6 983->1000 1013 409293-409295 985->1013 1014 40920f-409211 985->1014 1001 4092bf-4092c4 986->1001 994 40906a 987->994 988->994 994->955 1005 409283-409288 997->1005 1006 4090ec-4090f3 997->1006 999->1000 1080 4093d7 call 40ce70 1000->1080 1081 4093d7 call 40f160 1000->1081 1001->977 1011 409290 1005->1011 1012 40928a-40928c 1005->1012 1007 409121-409124 1006->1007 1008 4090f5-4090f9 1006->1008 1022 4092b2-4092b7 1007->1022 1023 40912a-409138 call 408726 1007->1023 1008->1007 1018 4090fb-4090fe 1008->1018 1011->1013 1012->1011 1025 409297-409299 1013->1025 1026 40929d-4092a0 1013->1026 1014->978 1024 409213-409215 1014->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->986 1022->1001 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1049 409281 1027->1049 1028->1046 1050 409114-40911f call 40d6cb 1028->1050 1029->1001 1041 4092ac-4092ae 1029->1041 1036 4092d4-4092e0 call 408a55 1030->1036 1037 40931d-409346 call 40e959 * 2 1030->1037 1057 4092e2-4092ec 1036->1057 1058 4092ee-4092fa call 408aa0 1036->1058 1037->953 1037->957 1041->1022 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1049->1030 1050->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1065 409165-409167 1060->1065 1066 40916b-409170 1060->1066 1063->1036 1063->1037 1065->1066 1071 409172-409174 1066->1071 1072 409178-409181 1066->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                              • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@
                              • String ID: IA$IA
                              • API String ID: 1033339047-1400641299
                              • Opcode ID: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                              • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                              • Opcode Fuzzy Hash: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                              • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: free
                              • String ID: $KA$4KA$HKA$\KA
                              • API String ID: 1294909896-3316857779
                              • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                              • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                              • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                              • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1120 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1120 1121 40983c-409846 call 409425 1112->1121 1113->1114 1116 409780-409796 call 4094e0 call 40969d call 40e959 1114->1116 1117 4097a3-4097a8 1114->1117 1137 40979b-4097a1 1116->1137 1118 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1117->1118 1119 4097aa-4097b4 1117->1119 1124 4097f3-409809 1118->1124 1119->1118 1119->1124 1133 409881-40989a call 4010e2 call 40eb24 1120->1133 1134 409878-40987f call 40ebf7 1120->1134 1144 40984a-40984c 1121->1144 1129 40980c-409814 1124->1129 1136 409816-409825 call 409403 1129->1136 1129->1137 1153 40989d-4098c0 call 40eb19 1133->1153 1134->1133 1136->1129 1137->1109 1144->1110 1157 4098c2-4098c7 1153->1157 1158 4098f6-4098f9 1153->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1163 409954 1159->1163 1164 40994b-409952 call 409c13 1159->1164 1165 409902-409904 1160->1165 1166 409908-40991e call 409530 call 409425 1160->1166 1161->1162 1179 4098e9-4098eb 1162->1179 1180 4098ef-4098f1 1162->1180 1170 409956-40996d call 4010e2 1163->1170 1164->1170 1165->1166 1166->1159 1181 40997b-4099a0 call 409fb4 1170->1181 1182 40996f-409978 1170->1182 1179->1180 1180->1110 1186 4099a2-4099a7 1181->1186 1187 4099e3-4099e6 1181->1187 1182->1181 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1153 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1225 409aa2-409aa4 1213->1225 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1222 409a73-409a75 1218->1222 1223 409a79-409a91 call 409530 call 409425 1218->1223 1219->1213 1220->1195 1224 409adf-409ae5 1220->1224 1222->1223 1223->1144 1233 409a97-409a9d 1223->1233 1224->1195 1228 409aa6-409aa8 1225->1228 1229 409aac-409ab0 1225->1229 1228->1229 1229->1195 1233->1144
                              APIs
                              • _EH_prolog.MSVCRT ref: 004096D0
                              • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                              • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@$H_prolog
                              • String ID: HIA
                              • API String ID: 3431946709-2712174624
                              • Opcode ID: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                              • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                              • Opcode Fuzzy Hash: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                              • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                              APIs
                              • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                              • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                              • memcmp.MSVCRT(?,?,?), ref: 004028E4
                              • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                              • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: lstrlenmemcmp$memmove
                              • String ID:
                              • API String ID: 3251180759-0
                              • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                              • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                              • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                              • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                              APIs
                              • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                              • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                              • String ID:
                              • API String ID: 359084233-0
                              • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                              • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                              • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                              • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                              APIs
                              • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                              • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                              • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorLast$AttributesCreateDirectoryFile
                              • String ID:
                              • API String ID: 635176117-0
                              • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                              • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                              • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                              • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,0000000D,?,00405D20,?,00417788,00417788), ref: 00404A5A
                              • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@
                              • String ID: ExecuteFile
                              • API String ID: 1033339047-323923146
                              • Opcode ID: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                              • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                              • Opcode Fuzzy Hash: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                              • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                              • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@??3@memmove
                              • String ID:
                              • API String ID: 3828600508-0
                              • Opcode ID: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                              • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                              • Opcode Fuzzy Hash: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                              • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                              APIs
                              • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID: @
                              • API String ID: 1890195054-2766056989
                              • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                              • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                              • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                              • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                              APIs
                                • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$??2@ExceptionThrowmemmove
                              • String ID:
                              • API String ID: 4269121280-0
                              • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                              • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                              • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                              • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@H_prolog
                              • String ID:
                              • API String ID: 1329742358-0
                              • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                              • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                              • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                              • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@??3@
                              • String ID:
                              • API String ID: 1936579350-0
                              • Opcode ID: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                              • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                              • Opcode Fuzzy Hash: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                              • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@??3@
                              • String ID:
                              • API String ID: 1936579350-0
                              • Opcode ID: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                              • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                              • Opcode Fuzzy Hash: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                              • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                              APIs
                              • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                              • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                              • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                              • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                              • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                              APIs
                              • SysAllocString.OLEAUT32(?), ref: 0040ED05
                              • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AllocExceptionStringThrow
                              • String ID:
                              • API String ID: 3773818493-0
                              • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                              • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                              • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                              • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                              • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                              • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                              • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                              • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                              • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                              • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                              APIs
                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                              • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                              • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                              • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                              APIs
                                • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CloseCreateFileHandle
                              • String ID:
                              • API String ID: 3498533004-0
                              • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                              • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                              • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                              • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                              APIs
                              • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                              • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                              • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                              • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                              APIs
                              • _beginthreadex.MSVCRT ref: 00406552
                                • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorLast_beginthreadex
                              • String ID:
                              • API String ID: 4034172046-0
                              • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                              • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                              • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                              • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                              • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                              • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                              • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                              APIs
                              • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                              • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                              • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                              • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                              APIs
                              • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FileTime
                              • String ID:
                              • API String ID: 1425588814-0
                              • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                              • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                              • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                              • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@
                              • String ID:
                              • API String ID: 1033339047-0
                              • Opcode ID: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                              • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                              • Opcode Fuzzy Hash: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                              • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                              • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                              • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                              • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@
                              • String ID:
                              • API String ID: 1033339047-0
                              • Opcode ID: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                              • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                              • Opcode Fuzzy Hash: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                              • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                              APIs
                              • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                              • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                              • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                              • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                              • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                              • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                              • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                              APIs
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                              • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                              • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                              • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                              • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                              • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                              • Instruction Fuzzy Hash:
                              APIs
                              • _wtol.MSVCRT ref: 004034E5
                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                              • _wtol.MSVCRT ref: 0040367F
                              • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                              • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                              • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                              • String ID: .lnk
                              • API String ID: 408529070-24824748
                              • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                              • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                              • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                              • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                              APIs
                              • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                              • wsprintfW.USER32 ref: 00401FFD
                              • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                              • GetLastError.KERNEL32 ref: 00402017
                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                              • GetLastError.KERNEL32 ref: 0040204C
                              • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                              • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                              • SetLastError.KERNEL32(00000000), ref: 00402098
                              • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                              • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                              • _wtol.MSVCRT ref: 0040212A
                              • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                              • String ID: 7zSfxString%d$XpA$\3A
                              • API String ID: 2117570002-3108448011
                              • Opcode ID: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                              • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                              • Opcode Fuzzy Hash: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                              • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                              • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                              • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                              • LockResource.KERNEL32(00000000), ref: 00401C41
                              • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                              • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                              • wsprintfW.USER32 ref: 00401C95
                              • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                              • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                              • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                              • API String ID: 2639302590-365843014
                              • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                              • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                              • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                              • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                              APIs
                              • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                              • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                              • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                              • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                              • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                              • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                              • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                              • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                              • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                              • String ID:
                              • API String ID: 829399097-0
                              • Opcode ID: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                              • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                              • Opcode Fuzzy Hash: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                              • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                              • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                              • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                              • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                              • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                              • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                              • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                              • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                              • String ID:
                              • API String ID: 1862581289-0
                              • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                              • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                              • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                              • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                              APIs
                              • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                              • GetWindow.USER32(?,00000005), ref: 00406D8F
                              • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Window$AddressLibraryLoadProc
                              • String ID: SetWindowTheme$\EA$uxtheme
                              • API String ID: 324724604-1613512829
                              • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                              • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                              • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                              • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                              • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                              • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                              • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                              • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                              • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                              • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                              • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                              • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                              • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                              • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                              • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                              • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                              APIs
                              • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                              • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                              • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                              • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                              • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                              • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                              • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                              • API String ID: 3007203151-3467708659
                              • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                              • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                              • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                              • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                              APIs
                              • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                              • _wtol.MSVCRT ref: 004047DC
                              • _wtol.MSVCRT ref: 004047F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                              • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                              • API String ID: 2725485552-3187639848
                              • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                              • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                              • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                              • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                              APIs
                              • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                              • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                              • GetParent.USER32(?), ref: 00402E2E
                              • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                              • GetMenu.USER32(?), ref: 00402E55
                              • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                              • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                              • DestroyWindow.USER32(?), ref: 00402EA3
                              • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                              • GetSysColor.USER32(0000000F), ref: 00402EBC
                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                              • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                              • String ID: RichEdit20W$STATIC$riched20${\rtf
                              • API String ID: 1731037045-2281146334
                              • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                              • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                              • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                              • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                              APIs
                              • GetWindowDC.USER32(00000000), ref: 00401CD4
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                              • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                              • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                              • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                              • CreateCompatibleDC.GDI32(?), ref: 00401D52
                              • SelectObject.GDI32(00000000,?), ref: 00401D60
                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                              • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                              • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                              • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                              • SelectObject.GDI32(00000000,?), ref: 00401DB3
                              • SelectObject.GDI32(00000000,?), ref: 00401DB9
                              • DeleteDC.GDI32(00000000), ref: 00401DC2
                              • DeleteDC.GDI32(00000000), ref: 00401DC5
                              • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                              • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                              • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                              • String ID:
                              • API String ID: 3462224810-0
                              • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                              • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                              • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                              • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                              APIs
                              • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                              • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                              • GetMenu.USER32(?), ref: 00401E44
                                • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                              • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                              • CoInitialize.OLE32(00000000), ref: 00401E8C
                              • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                              • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                              • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                              • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                              • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                              • String ID: IMAGES$STATIC
                              • API String ID: 4202116410-1168396491
                              • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                              • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                              • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                              • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                              APIs
                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                              • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                              • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                              • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                              • SetWindowLongW.USER32(00000000), ref: 004081D8
                              • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                              • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                              • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                              • SetFocus.USER32(00000000), ref: 0040821D
                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                              • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                              • GetDlgItem.USER32(?,00000002), ref: 00408294
                              • IsWindow.USER32(00000000), ref: 00408297
                              • GetDlgItem.USER32(?,00000002), ref: 004082A7
                              • EnableWindow.USER32(00000000), ref: 004082AA
                              • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                              • ShowWindow.USER32(00000000), ref: 004082C1
                                • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                              • String ID:
                              • API String ID: 855516470-0
                              • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                              • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                              • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                              • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                              • strncmp.MSVCRT ref: 004031F1
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                              • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                              • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$lstrcmpstrncmp
                              • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                              • API String ID: 2881732429-172299233
                              • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                              • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                              • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                              • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                              APIs
                              • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                              • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                              • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                              • GetSystemMetrics.USER32(00000011), ref: 00406B11
                              • GetSystemMetrics.USER32(00000008), ref: 00406B18
                              • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                              • GetParent.USER32(?), ref: 00406B43
                              • GetClientRect.USER32(00000000,?), ref: 00406B55
                              • ClientToScreen.USER32(?,?), ref: 00406B68
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                              • GetClientRect.USER32(?,?), ref: 00406C55
                              • ClientToScreen.USER32(?,?), ref: 00406B71
                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                              • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                              • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                              • String ID:
                              • API String ID: 747815384-0
                              • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                              • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                              • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                              • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                              • LoadIconW.USER32(00000000), ref: 00407D33
                              • GetSystemMetrics.USER32(00000032), ref: 00407D43
                              • GetSystemMetrics.USER32(00000031), ref: 00407D48
                              • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                              • LoadImageW.USER32(00000000), ref: 00407D54
                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                              • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                              • GetWindow.USER32(?,00000005), ref: 00407E76
                              • GetWindow.USER32(?,00000005), ref: 00407E92
                              • GetWindow.USER32(?,00000005), ref: 00407EAA
                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                              • LoadIconW.USER32(00000000), ref: 00407F0D
                              • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                              • SendMessageW.USER32(00000000), ref: 00407F2F
                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                              • String ID:
                              • API String ID: 1889686859-0
                              • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                              • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                              • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                              • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                              APIs
                              • GetParent.USER32(?), ref: 00406F45
                              • GetWindowLongW.USER32(00000000), ref: 00406F4C
                              • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                              • GetSystemMetrics.USER32(00000031), ref: 00406F91
                              • GetSystemMetrics.USER32(00000032), ref: 00406F98
                              • GetWindowDC.USER32(?), ref: 00406FAA
                              • GetWindowRect.USER32(?,?), ref: 00406FB7
                              • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                              • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                              • String ID:
                              • API String ID: 2586545124-0
                              • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                              • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                              • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                              • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                              APIs
                              • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                              • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                              • GetDlgItem.USER32(?,?), ref: 004067CC
                              • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                              • GetDlgItem.USER32(?,?), ref: 004067DD
                              • SetFocus.USER32(00000000,?,000004B4,74DF0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ItemMessageSend$Focus
                              • String ID:
                              • API String ID: 3946207451-0
                              • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                              • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                              • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                              • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID: IA$IA$IA$IA$IA$IA
                              • API String ID: 613200358-3743982587
                              • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                              • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                              • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                              • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                              • API String ID: 613200358-994561823
                              • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                              • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                              • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                              • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                              APIs
                              • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                              • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                              • GetDC.USER32(00000000), ref: 00406DFB
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                              • ReleaseDC.USER32(00000000,?), ref: 00406E24
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                              • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                              • String ID:
                              • API String ID: 2693764856-0
                              • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                              • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                              • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                              • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                              APIs
                              • GetDC.USER32(?), ref: 0040696E
                              • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                              • GetSystemMetrics.USER32(0000003D), ref: 00406993
                              • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                              • SelectObject.GDI32(?,?), ref: 004069B8
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                              • SelectObject.GDI32(?,?), ref: 004069F9
                              • ReleaseDC.USER32(?,?), ref: 00406A08
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                              • String ID:
                              • API String ID: 2466489532-0
                              • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                              • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                              • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                              • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                              APIs
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                              • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                              • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                              • wsprintfW.USER32 ref: 00407BBB
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                              • String ID: %d%%
                              • API String ID: 3753976982-1518462796
                              • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                              • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                              • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                              • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                              APIs
                              • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$CharUpper$lstrlen
                              • String ID: hAA
                              • API String ID: 2587799592-1362906312
                              • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                              • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                              • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                              • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$FileTime$AttributesSystemlstrlen
                              • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                              • API String ID: 4038993085-2279431206
                              • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                              • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                              • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                              • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                              APIs
                              • EndDialog.USER32(?,00000000), ref: 00407579
                              • KillTimer.USER32(?,00000001), ref: 0040758A
                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                              • SuspendThread.KERNEL32(00000298), ref: 004075CD
                              • ResumeThread.KERNEL32(00000298), ref: 004075EA
                              • EndDialog.USER32(?,00000000), ref: 0040760C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: DialogThreadTimer$KillResumeSuspend
                              • String ID:
                              • API String ID: 4151135813-0
                              • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                              • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                              • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                              • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                              • wsprintfA.USER32 ref: 00404EBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$wsprintf
                              • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                              • API String ID: 2704270482-1550708412
                              • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                              • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                              • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                              • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                              • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID: %%T/$%%T\
                              • API String ID: 613200358-2679640699
                              • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                              • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                              • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                              • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID: %%S/$%%S\
                              • API String ID: 613200358-358529586
                              • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                              • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                              • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                              • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID: %%M/$%%M\
                              • API String ID: 613200358-4143866494
                              • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                              • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                              • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                              • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                              APIs
                              • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ExceptionThrow
                              • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                              • API String ID: 432778473-803145960
                              • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                              • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                              • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                              • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                              APIs
                                • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                              • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@$??3@$memmove
                              • String ID: IA$IA$IA
                              • API String ID: 4294387087-924693538
                              • Opcode ID: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                              • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                              • Opcode Fuzzy Hash: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                              • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                              APIs
                              • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                              • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                              • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                              • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??2@??3@ExceptionThrowmemcpy
                              • String ID: IA
                              • API String ID: 3462485524-3293647318
                              • Opcode ID: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                              • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                              • Opcode Fuzzy Hash: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                              • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: wsprintf$ExitProcesslstrcat
                              • String ID: 0x%p
                              • API String ID: 2530384128-1745605757
                              • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                              • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                              • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                              • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                              APIs
                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                              • GetSystemMetrics.USER32(00000007), ref: 00407A51
                              • GetSystemMetrics.USER32(00000007), ref: 00407A62
                              • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: MetricsSystem$??3@
                              • String ID: 100%%
                              • API String ID: 2562992111-568723177
                              • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                              • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                              • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                              • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                              APIs
                              • wsprintfW.USER32 ref: 00407A12
                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                              • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: TextWindow$ItemLength$??3@wsprintf
                              • String ID: (%u%s)
                              • API String ID: 3595513934-2496177969
                              • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                              • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                              • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                              • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                              • GetProcAddress.KERNEL32(00000000), ref: 00402211
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32
                              • API String ID: 2574300362-3846845290
                              • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                              • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                              • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                              • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                              • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32
                              • API String ID: 2574300362-3900151262
                              • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                              • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                              • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                              • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                              • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32
                              • API String ID: 2574300362-736604160
                              • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                              • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                              • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                              • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                              APIs
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$ByteCharMultiWide
                              • String ID:
                              • API String ID: 1731127917-0
                              • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                              • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                              • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                              • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                              APIs
                              • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                              • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                              • wsprintfW.USER32 ref: 00403FFB
                              • GetFileAttributesW.KERNEL32(?), ref: 00404016
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: PathTemp$AttributesFilewsprintf
                              • String ID:
                              • API String ID: 1746483863-0
                              • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                              • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                              • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                              • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                              APIs
                              • CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CharUpper
                              • String ID:
                              • API String ID: 9403516-0
                              • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                              • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                              • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                              • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                              APIs
                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                              • GetDlgItem.USER32(?,000004B7), ref: 00408020
                              • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                              • String ID:
                              • API String ID: 2538916108-0
                              • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                              • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                              • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                              • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                              APIs
                              • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                              • GetSystemMetrics.USER32(00000031), ref: 0040683A
                              • CreateFontIndirectW.GDI32(?), ref: 00406849
                              • DeleteObject.GDI32(00000000), ref: 00406878
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                              • String ID:
                              • API String ID: 1900162674-0
                              • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                              • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                              • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                              • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                              APIs
                              • memset.MSVCRT ref: 0040749F
                              • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                              • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                              • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                              • String ID:
                              • API String ID: 1557639607-0
                              • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                              • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                              • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                              • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                              APIs
                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@$EnvironmentExpandStrings$??2@
                              • String ID:
                              • API String ID: 612612615-0
                              • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                              • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                              • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                              • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                              APIs
                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                              • SetWindowTextW.USER32(?,?), ref: 00403B12
                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ??3@TextWindow$Length
                              • String ID:
                              • API String ID: 2308334395-0
                              • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                              • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                              • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                              • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                              APIs
                              • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                              • CreateFontIndirectW.GDI32(?), ref: 0040705B
                              • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                              • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: CreateFontIndirectItemMessageObjectSend
                              • String ID:
                              • API String ID: 2001801573-0
                              • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                              • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                              • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                              • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                              APIs
                              • GetParent.USER32(?), ref: 00401BA8
                              • GetWindowRect.USER32(?,?), ref: 00401BC1
                              • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                              • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: ClientScreen$ParentRectWindow
                              • String ID:
                              • API String ID: 2099118873-0
                              • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                              • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                              • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                              • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: _wtol
                              • String ID: GUIFlags$[G@
                              • API String ID: 2131799477-2126219683
                              • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                              • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                              • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                              • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                              APIs
                              • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1769554964.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1769438589.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769595618.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769615201.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1769642494.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_epht1Y3TGZ.jbxd
                              Similarity
                              • API ID: EnvironmentVariable
                              • String ID: ?O@
                              • API String ID: 1431749950-3511380453
                              • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                              • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                              • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                              • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                              Execution Graph

                              Execution Coverage:2.9%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:1.6%
                              Total number of Nodes:1730
                              Total number of Limit Nodes:25
                              execution_graph 18552 6cc9498c 18553 6cc9499c 18552->18553 18554 6cc94997 18552->18554 18558 6cc94896 18553->18558 18570 6cc9be02 18554->18570 18557 6cc949aa 18559 6cc948a2 __lseeki64 18558->18559 18560 6cc948ef 18559->18560 18568 6cc9493f __lseeki64 18559->18568 18574 6cc94761 18559->18574 18560->18568 18621 6cc86894 18560->18621 18564 6cc9491f 18566 6cc94761 __CRT_INIT@12 156 API calls 18564->18566 18564->18568 18565 6cc86894 ___DllMainCRTStartup 31 API calls 18567 6cc94916 18565->18567 18566->18568 18569 6cc94761 __CRT_INIT@12 156 API calls 18567->18569 18568->18557 18569->18564 18571 6cc9be34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 18570->18571 18572 6cc9be27 18570->18572 18573 6cc9be2b 18571->18573 18572->18571 18572->18573 18573->18553 18575 6cc947ec 18574->18575 18576 6cc94770 18574->18576 18578 6cc94823 18575->18578 18579 6cc947f2 18575->18579 18625 6cc9a6f4 HeapCreate 18576->18625 18580 6cc94828 18578->18580 18581 6cc94881 18578->18581 18584 6cc9480d 18579->18584 18602 6cc9477b 18579->18602 18758 6cc95e85 18579->18758 18761 6cc9a0ae TlsGetValue 18580->18761 18581->18602 18813 6cc9a3c8 18581->18813 18590 6cc9b77d __ioterm 68 API calls 18584->18590 18584->18602 18592 6cc94817 18590->18592 18594 6cc9a0e2 __mtterm 70 API calls 18592->18594 18598 6cc9481c 18594->18598 18595 6cc94787 __RTC_Initialize 18596 6cc94797 GetCommandLineA 18595->18596 18614 6cc9478b 18595->18614 18661 6cc9bafe 18596->18661 18599 6cc9a724 __heap_term 4 API calls 18598->18599 18599->18602 18602->18560 18605 6cc947b1 18609 6cc947b5 18605->18609 18702 6cc9ba43 18605->18702 18606 6cc9485e 18782 6cc9a11f 18606->18782 18607 6cc94875 18800 6cc94618 18607->18800 18742 6cc9a0e2 18609->18742 18613 6cc94865 GetCurrentThreadId 18613->18602 18736 6cc9a724 18614->18736 18616 6cc947d5 18616->18602 18753 6cc9b77d 18616->18753 18622 6cc868a2 18621->18622 18623 6cc867cb 18621->18623 18622->18623 19631 6cc8aef1 18622->19631 18623->18564 18623->18565 18626 6cc94776 18625->18626 18626->18602 18627 6cc9a436 GetModuleHandleW 18626->18627 18628 6cc9a44a 18627->18628 18629 6cc9a451 18627->18629 18824 6cc95bcf 18628->18824 18631 6cc9a5b9 18629->18631 18632 6cc9a45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 18629->18632 18633 6cc9a0e2 __mtterm 70 API calls 18631->18633 18635 6cc9a4a4 TlsAlloc 18632->18635 18637 6cc9a5be 18633->18637 18635->18637 18638 6cc9a4f2 TlsSetValue 18635->18638 18637->18595 18638->18637 18639 6cc9a503 18638->18639 18828 6cc95e94 18639->18828 18644 6cc99fb8 __encode_pointer 6 API calls 18645 6cc9a523 18644->18645 18646 6cc99fb8 __encode_pointer 6 API calls 18645->18646 18647 6cc9a533 18646->18647 18648 6cc99fb8 __encode_pointer 6 API calls 18647->18648 18649 6cc9a543 18648->18649 18845 6cc9a798 18649->18845 18652 6cc9a033 __decode_pointer 6 API calls 18653 6cc9a564 18652->18653 18653->18631 18654 6cc9a608 __calloc_crt 67 API calls 18653->18654 18655 6cc9a57d 18654->18655 18655->18631 18656 6cc9a033 __decode_pointer 6 API calls 18655->18656 18657 6cc9a597 18656->18657 18657->18631 18658 6cc9a59e 18657->18658 18659 6cc9a11f __getptd_noexit 67 API calls 18658->18659 18660 6cc9a5a6 GetCurrentThreadId 18659->18660 18660->18637 18662 6cc9bb3b 18661->18662 18663 6cc9bb1c GetEnvironmentStringsW 18661->18663 18664 6cc9bb24 18662->18664 18665 6cc9bbd4 18662->18665 18663->18664 18666 6cc9bb30 GetLastError 18663->18666 18667 6cc9bb57 GetEnvironmentStringsW 18664->18667 18673 6cc9bb66 WideCharToMultiByte 18664->18673 18668 6cc9bbdd GetEnvironmentStrings 18665->18668 18670 6cc947a7 18665->18670 18666->18662 18667->18670 18667->18673 18668->18670 18672 6cc9bbed 18668->18672 18687 6cc9b529 18670->18687 18671 6cc9bbfb 18676 6cc9a5c3 __malloc_crt 67 API calls 18671->18676 18672->18671 18672->18672 18674 6cc9bbc9 FreeEnvironmentStringsW 18673->18674 18675 6cc9bb9a 18673->18675 18674->18670 18860 6cc9a5c3 18675->18860 18678 6cc9bc07 18676->18678 18680 6cc9bc1a ___crtGetEnvironmentStringsA 18678->18680 18681 6cc9bc0e FreeEnvironmentStringsA 18678->18681 18685 6cc9bc24 FreeEnvironmentStringsA 18680->18685 18681->18670 18682 6cc9bba8 WideCharToMultiByte 18683 6cc9bbba 18682->18683 18684 6cc9bbc2 18682->18684 18686 6cc94618 __crtLCMapStringA_stat 67 API calls 18683->18686 18684->18674 18685->18670 18686->18684 19105 6cc953bc 18687->19105 18689 6cc9b535 GetStartupInfoA 18690 6cc9a608 __calloc_crt 67 API calls 18689->18690 18691 6cc9b556 18690->18691 18692 6cc9b774 __lseeki64 18691->18692 18695 6cc9a608 __calloc_crt 67 API calls 18691->18695 18697 6cc9b63e 18691->18697 18701 6cc9b6bb 18691->18701 18692->18605 18693 6cc9b6f1 GetStdHandle 18693->18701 18694 6cc9b756 SetHandleCount 18694->18692 18695->18691 18696 6cc9b703 GetFileType 18696->18701 18697->18692 18698 6cc9b667 GetFileType 18697->18698 18700 6cc9e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 18697->18700 18697->18701 18698->18697 18699 6cc9e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 18699->18701 18700->18697 18701->18692 18701->18693 18701->18694 18701->18696 18701->18699 18703 6cc9ba58 18702->18703 18704 6cc9ba5d GetModuleFileNameA 18702->18704 19112 6cca02ad 18703->19112 18706 6cc9ba84 18704->18706 19106 6cc9b8a9 18706->19106 18709 6cc947c1 18709->18616 18715 6cc9b7cb 18709->18715 18710 6cc9bac0 18711 6cc9a5c3 __malloc_crt 67 API calls 18710->18711 18712 6cc9bac6 18711->18712 18712->18709 18713 6cc9b8a9 _parse_cmdline 77 API calls 18712->18713 18714 6cc9bae0 18713->18714 18714->18709 18716 6cc9b7d4 18715->18716 18718 6cc9b7d9 _strlen 18715->18718 18717 6cca02ad ___initmbctable 111 API calls 18716->18717 18717->18718 18719 6cc9a608 __calloc_crt 67 API calls 18718->18719 18722 6cc947ca 18718->18722 18725 6cc9b80e _strlen 18719->18725 18720 6cc9b86c 18721 6cc94618 __crtLCMapStringA_stat 67 API calls 18720->18721 18721->18722 18722->18616 18730 6cc95cbe 18722->18730 18723 6cc9a608 __calloc_crt 67 API calls 18723->18725 18724 6cc9b892 18726 6cc94618 __crtLCMapStringA_stat 67 API calls 18724->18726 18725->18720 18725->18722 18725->18723 18725->18724 18727 6cca0997 _strcpy_s 67 API calls 18725->18727 18728 6cc9b853 18725->18728 18726->18722 18727->18725 18728->18725 18729 6cc98034 __invoke_watson 10 API calls 18728->18729 18729->18728 18732 6cc95ccc __IsNonwritableInCurrentImage 18730->18732 19416 6cc9df82 18732->19416 18733 6cc95cea __initterm_e 18735 6cc95d09 __IsNonwritableInCurrentImage __initterm 18733->18735 19420 6cc944b4 18733->19420 18735->18616 18737 6cc9a72d 18736->18737 18738 6cc9a784 HeapDestroy 18736->18738 18739 6cc9a772 HeapFree 18737->18739 18740 6cc9a749 VirtualFree HeapFree 18737->18740 18738->18602 18739->18738 18740->18740 18741 6cc9a771 18740->18741 18741->18739 18743 6cc9a0ec 18742->18743 18744 6cc9a0f8 18742->18744 18746 6cc9a033 __decode_pointer 6 API calls 18743->18746 18745 6cc9a10c TlsFree 18744->18745 18747 6cc9a11a 18744->18747 18745->18747 18746->18744 18748 6cc9a7ff DeleteCriticalSection 18747->18748 18749 6cc9a817 18747->18749 18750 6cc94618 __crtLCMapStringA_stat 67 API calls 18748->18750 18751 6cc9a829 DeleteCriticalSection 18749->18751 18752 6cc9a837 18749->18752 18750->18747 18751->18749 18752->18614 18757 6cc9b786 18753->18757 18754 6cc9b7c8 18754->18609 18755 6cc9b79a DeleteCriticalSection 18755->18757 18756 6cc94618 __crtLCMapStringA_stat 67 API calls 18756->18757 18757->18754 18757->18755 18757->18756 19523 6cc95d43 18758->19523 18760 6cc95e90 18760->18584 18762 6cc9482d 18761->18762 18763 6cc9a0c3 18761->18763 18766 6cc9a608 18762->18766 18764 6cc9a033 __decode_pointer 6 API calls 18763->18764 18765 6cc9a0ce TlsSetValue 18764->18765 18765->18762 18769 6cc9a611 18766->18769 18768 6cc94839 18768->18602 18772 6cc9a033 TlsGetValue 18768->18772 18769->18768 18770 6cc9a62f Sleep 18769->18770 19546 6cc9b40b 18769->19546 18771 6cc9a644 18770->18771 18771->18768 18771->18769 18773 6cc9a04b 18772->18773 18774 6cc9a06c GetModuleHandleW 18772->18774 18773->18774 18777 6cc9a055 TlsGetValue 18773->18777 18775 6cc9a07c 18774->18775 18776 6cc9a087 GetProcAddress 18774->18776 18778 6cc95bcf __crt_waiting_on_module_handle 2 API calls 18775->18778 18780 6cc94857 18776->18780 18781 6cc9a060 18777->18781 18779 6cc9a082 18778->18779 18779->18776 18779->18780 18780->18606 18780->18607 18781->18774 18781->18780 19563 6cc953bc 18782->19563 18784 6cc9a12b GetModuleHandleW 18785 6cc9a13b 18784->18785 18786 6cc9a141 18784->18786 18787 6cc95bcf __crt_waiting_on_module_handle 2 API calls 18785->18787 18788 6cc9a159 GetProcAddress GetProcAddress 18786->18788 18789 6cc9a17d 18786->18789 18787->18786 18788->18789 18790 6cc9a914 __lock 63 API calls 18789->18790 18791 6cc9a19c InterlockedIncrement 18790->18791 19564 6cc9a1f4 18791->19564 18794 6cc9a914 __lock 63 API calls 18795 6cc9a1bd 18794->18795 18796 6cca0414 ___addlocaleref 8 API calls 18795->18796 18797 6cc9a1db 18796->18797 19567 6cc9a1fd 18797->19567 18799 6cc9a1e8 __lseeki64 18799->18613 18801 6cc94624 __lseeki64 18800->18801 18802 6cc9469d __expand __lseeki64 18801->18802 18804 6cc9a914 __lock 65 API calls 18801->18804 18812 6cc94663 18801->18812 18802->18602 18803 6cc94678 HeapFree 18803->18802 18805 6cc9468a 18803->18805 18808 6cc9463b ___sbh_find_block 18804->18808 18806 6cc95348 __lseeki64 65 API calls 18805->18806 18807 6cc9468f GetLastError 18806->18807 18807->18802 18809 6cc94655 18808->18809 19572 6cc9a977 18808->19572 19579 6cc9466e 18809->19579 18812->18802 18812->18803 18814 6cc9a421 18813->18814 18815 6cc9a3d6 18813->18815 18816 6cc9a42b TlsSetValue 18814->18816 18817 6cc9a434 18814->18817 18818 6cc9a3dc TlsGetValue 18815->18818 18819 6cc9a3ff 18815->18819 18816->18817 18817->18602 18818->18819 18821 6cc9a3ef TlsGetValue 18818->18821 18820 6cc9a033 __decode_pointer 6 API calls 18819->18820 18822 6cc9a416 18820->18822 18821->18819 19587 6cc9a299 18822->19587 18825 6cc95bda Sleep GetModuleHandleW 18824->18825 18826 6cc95bf8 18825->18826 18827 6cc95bfc 18825->18827 18826->18825 18826->18827 18827->18629 18849 6cc9a02a 18828->18849 18830 6cc95e9c __init_pointers __initp_misc_winsig 18852 6cc9cdf3 18830->18852 18833 6cc99fb8 __encode_pointer 6 API calls 18834 6cc95ed8 18833->18834 18835 6cc99fb8 TlsGetValue 18834->18835 18836 6cc99ff1 GetModuleHandleW 18835->18836 18837 6cc99fd0 18835->18837 18839 6cc9a00c GetProcAddress 18836->18839 18840 6cc9a001 18836->18840 18837->18836 18838 6cc99fda TlsGetValue 18837->18838 18843 6cc99fe5 18838->18843 18841 6cc99fe9 18839->18841 18842 6cc95bcf __crt_waiting_on_module_handle 2 API calls 18840->18842 18841->18644 18844 6cc9a007 18842->18844 18843->18836 18843->18841 18844->18839 18844->18841 18846 6cc9a7a3 18845->18846 18847 6cc9a550 18846->18847 18855 6cc9e1d3 18846->18855 18847->18631 18847->18652 18850 6cc99fb8 __encode_pointer 6 API calls 18849->18850 18851 6cc9a031 18850->18851 18851->18830 18853 6cc99fb8 __encode_pointer 6 API calls 18852->18853 18854 6cc95ece 18853->18854 18854->18833 18859 6cc953bc 18855->18859 18857 6cc9e1df InitializeCriticalSectionAndSpinCount 18858 6cc9e223 __lseeki64 18857->18858 18858->18846 18859->18857 18862 6cc9a5cc 18860->18862 18863 6cc9a602 18862->18863 18864 6cc9a5e3 Sleep 18862->18864 18865 6cc949fe 18862->18865 18863->18674 18863->18682 18864->18862 18866 6cc94ab1 18865->18866 18875 6cc94a10 18865->18875 18867 6cc9c08e __calloc_impl 6 API calls 18866->18867 18868 6cc94ab7 18867->18868 18870 6cc95348 __lseeki64 66 API calls 18868->18870 18881 6cc94aa9 18870->18881 18873 6cc94a6d HeapAlloc 18873->18875 18875->18873 18876 6cc94a9d 18875->18876 18879 6cc94aa2 18875->18879 18875->18881 18882 6cc9c046 18875->18882 18891 6cc9be9b 18875->18891 18925 6cc95c53 18875->18925 18928 6cc949af 18875->18928 18936 6cc9c08e 18875->18936 18939 6cc95348 18876->18939 18880 6cc95348 __lseeki64 66 API calls 18879->18880 18880->18881 18881->18862 18942 6cca0cfc 18882->18942 18885 6cc9c05a 18887 6cc9be9b __NMSG_WRITE 67 API calls 18885->18887 18889 6cc9c07c 18885->18889 18886 6cca0cfc __set_error_mode 67 API calls 18886->18885 18888 6cc9c072 18887->18888 18890 6cc9be9b __NMSG_WRITE 67 API calls 18888->18890 18889->18875 18890->18889 18892 6cc9beaf 18891->18892 18893 6cca0cfc __set_error_mode 64 API calls 18892->18893 18924 6cc9c00a 18892->18924 18894 6cc9bed1 18893->18894 18895 6cc9c00f GetStdHandle 18894->18895 18897 6cca0cfc __set_error_mode 64 API calls 18894->18897 18896 6cc9c01d _strlen 18895->18896 18895->18924 18900 6cc9c036 WriteFile 18896->18900 18896->18924 18898 6cc9bee2 18897->18898 18898->18895 18899 6cc9bef4 18898->18899 18899->18924 18951 6cca0997 18899->18951 18900->18924 18903 6cc9bf2a GetModuleFileNameA 18905 6cc9bf48 18903->18905 18912 6cc9bf6b _strlen 18903->18912 18907 6cca0997 _strcpy_s 64 API calls 18905->18907 18909 6cc9bf58 18907->18909 18908 6cc9bfae 18976 6cca0bd3 18908->18976 18910 6cc98034 __invoke_watson 10 API calls 18909->18910 18909->18912 18910->18912 18912->18908 18967 6cca0c47 18912->18967 18916 6cc9bfd2 18917 6cca0bd3 _strcat_s 64 API calls 18916->18917 18919 6cc9bfe6 18917->18919 18918 6cc98034 __invoke_watson 10 API calls 18918->18916 18921 6cc9bff7 18919->18921 18922 6cc98034 __invoke_watson 10 API calls 18919->18922 18920 6cc98034 __invoke_watson 10 API calls 18920->18908 18985 6cca0a6a 18921->18985 18922->18921 18924->18875 19023 6cc95c28 GetModuleHandleW 18925->19023 18929 6cc949bb __lseeki64 18928->18929 18930 6cc949ec __lseeki64 18929->18930 19026 6cc9a914 18929->19026 18930->18875 18932 6cc949d1 19033 6cc9b126 18932->19033 18937 6cc9a033 __decode_pointer 6 API calls 18936->18937 18938 6cc9c09e 18937->18938 18938->18875 19091 6cc9a206 GetLastError 18939->19091 18941 6cc9534d 18941->18879 18943 6cca0d0b 18942->18943 18944 6cc95348 __lseeki64 67 API calls 18943->18944 18945 6cc9c04d 18943->18945 18946 6cca0d2e 18944->18946 18945->18885 18945->18886 18948 6cc9815c 18946->18948 18949 6cc9a033 __decode_pointer 6 API calls 18948->18949 18950 6cc9816c __invoke_watson 18949->18950 18952 6cca09a8 18951->18952 18953 6cca09af 18951->18953 18952->18953 18958 6cca09d5 18952->18958 18954 6cc95348 __lseeki64 67 API calls 18953->18954 18955 6cca09b4 18954->18955 18956 6cc9815c __lseeki64 6 API calls 18955->18956 18957 6cc9bf16 18956->18957 18957->18903 18960 6cc98034 18957->18960 18958->18957 18959 6cc95348 __lseeki64 67 API calls 18958->18959 18959->18955 19012 6cc955b0 18960->19012 18962 6cc98061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18963 6cc9813d GetCurrentProcess TerminateProcess 18962->18963 18964 6cc98131 __invoke_watson 18962->18964 19014 6cc93f34 18963->19014 18964->18963 18966 6cc9815a 18966->18903 18971 6cca0c59 18967->18971 18968 6cca0c5d 18969 6cc9bf9b 18968->18969 18970 6cc95348 __lseeki64 67 API calls 18968->18970 18969->18908 18969->18920 18972 6cca0c79 18970->18972 18971->18968 18971->18969 18974 6cca0ca3 18971->18974 18973 6cc9815c __lseeki64 6 API calls 18972->18973 18973->18969 18974->18969 18975 6cc95348 __lseeki64 67 API calls 18974->18975 18975->18972 18977 6cca0beb 18976->18977 18979 6cca0be4 18976->18979 18978 6cc95348 __lseeki64 67 API calls 18977->18978 18984 6cca0bf0 18978->18984 18979->18977 18982 6cca0c1f 18979->18982 18980 6cc9815c __lseeki64 6 API calls 18981 6cc9bfc1 18980->18981 18981->18916 18981->18918 18982->18981 18983 6cc95348 __lseeki64 67 API calls 18982->18983 18983->18984 18984->18980 18986 6cc9a02a _doexit 6 API calls 18985->18986 18987 6cca0a7a 18986->18987 18988 6cca0a8d LoadLibraryA 18987->18988 18990 6cca0b15 18987->18990 18989 6cca0aa2 GetProcAddress 18988->18989 19001 6cca0bb7 18988->19001 18991 6cca0ab8 18989->18991 18989->19001 18993 6cc9a033 __decode_pointer 6 API calls 18990->18993 19009 6cca0b3f 18990->19009 18994 6cc99fb8 __encode_pointer 6 API calls 18991->18994 18992 6cc9a033 __decode_pointer 6 API calls 19002 6cca0b82 18992->19002 18996 6cca0b32 18993->18996 18997 6cca0abe GetProcAddress 18994->18997 18995 6cc9a033 __decode_pointer 6 API calls 18995->19001 18998 6cc9a033 __decode_pointer 6 API calls 18996->18998 18999 6cc99fb8 __encode_pointer 6 API calls 18997->18999 18998->19009 19000 6cca0ad3 GetProcAddress 18999->19000 19003 6cc99fb8 __encode_pointer 6 API calls 19000->19003 19001->18924 19006 6cc9a033 __decode_pointer 6 API calls 19002->19006 19008 6cca0b6a 19002->19008 19004 6cca0ae8 GetProcAddress 19003->19004 19005 6cc99fb8 __encode_pointer 6 API calls 19004->19005 19007 6cca0afd 19005->19007 19006->19008 19007->18990 19010 6cca0b07 GetProcAddress 19007->19010 19008->18995 19009->18992 19009->19008 19011 6cc99fb8 __encode_pointer 6 API calls 19010->19011 19011->18990 19013 6cc955bc __VEC_memzero 19012->19013 19013->18962 19015 6cc93f3c 19014->19015 19016 6cc93f3e IsDebuggerPresent 19014->19016 19015->18966 19022 6cc9ee35 19016->19022 19019 6cc97c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 19020 6cc97c9b __invoke_watson 19019->19020 19021 6cc97ca3 GetCurrentProcess TerminateProcess 19019->19021 19020->19021 19021->18966 19022->19019 19024 6cc95c3c GetProcAddress 19023->19024 19025 6cc95c4c ExitProcess 19023->19025 19024->19025 19027 6cc9a929 19026->19027 19028 6cc9a93c EnterCriticalSection 19026->19028 19042 6cc9a851 19027->19042 19028->18932 19030 6cc9a92f 19030->19028 19068 6cc95bff 19030->19068 19035 6cc9b154 19033->19035 19034 6cc9b1ed 19038 6cc949dc 19034->19038 19086 6cc9ad3d 19034->19086 19035->19034 19035->19038 19079 6cc9ac8d 19035->19079 19039 6cc949f5 19038->19039 19090 6cc9a83a LeaveCriticalSection 19039->19090 19041 6cc949fc 19041->18930 19043 6cc9a85d __lseeki64 19042->19043 19044 6cc9a883 19043->19044 19045 6cc9c046 __FF_MSGBANNER 67 API calls 19043->19045 19047 6cc9a5c3 __malloc_crt 67 API calls 19044->19047 19052 6cc9a893 __lseeki64 19044->19052 19046 6cc9a872 19045->19046 19049 6cc9be9b __NMSG_WRITE 67 API calls 19046->19049 19048 6cc9a89e 19047->19048 19050 6cc9a8a5 19048->19050 19051 6cc9a8b4 19048->19051 19053 6cc9a879 19049->19053 19054 6cc95348 __lseeki64 67 API calls 19050->19054 19055 6cc9a914 __lock 67 API calls 19051->19055 19052->19030 19056 6cc95c53 _doexit 3 API calls 19053->19056 19054->19052 19057 6cc9a8bb 19055->19057 19056->19044 19058 6cc9a8ef 19057->19058 19059 6cc9a8c3 19057->19059 19060 6cc94618 __crtLCMapStringA_stat 67 API calls 19058->19060 19061 6cc9e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19059->19061 19067 6cc9a8e0 19060->19067 19062 6cc9a8ce 19061->19062 19064 6cc94618 __crtLCMapStringA_stat 67 API calls 19062->19064 19062->19067 19065 6cc9a8da 19064->19065 19066 6cc95348 __lseeki64 67 API calls 19065->19066 19066->19067 19075 6cc9a90b 19067->19075 19069 6cc9c046 __FF_MSGBANNER 67 API calls 19068->19069 19070 6cc95c09 19069->19070 19071 6cc9be9b __NMSG_WRITE 67 API calls 19070->19071 19072 6cc95c11 19071->19072 19073 6cc9a033 __decode_pointer 6 API calls 19072->19073 19074 6cc95c1c 19073->19074 19074->19028 19078 6cc9a83a LeaveCriticalSection 19075->19078 19077 6cc9a912 19077->19052 19078->19077 19080 6cc9aca0 HeapReAlloc 19079->19080 19081 6cc9acd4 HeapAlloc 19079->19081 19082 6cc9acbe 19080->19082 19084 6cc9acc2 19080->19084 19081->19082 19083 6cc9acf7 VirtualAlloc 19081->19083 19082->19034 19083->19082 19085 6cc9ad11 HeapFree 19083->19085 19084->19081 19085->19082 19087 6cc9ad54 VirtualAlloc 19086->19087 19089 6cc9ad9b 19087->19089 19089->19038 19090->19041 19092 6cc9a0ae ___set_flsgetvalue 8 API calls 19091->19092 19094 6cc9a21d 19092->19094 19093 6cc9a273 SetLastError 19093->18941 19094->19093 19095 6cc9a608 __calloc_crt 64 API calls 19094->19095 19096 6cc9a231 19095->19096 19096->19093 19097 6cc9a033 __decode_pointer 6 API calls 19096->19097 19098 6cc9a24b 19097->19098 19099 6cc9a26a 19098->19099 19100 6cc9a252 19098->19100 19102 6cc94618 __crtLCMapStringA_stat 64 API calls 19099->19102 19101 6cc9a11f __getptd_noexit 64 API calls 19100->19101 19103 6cc9a25a GetCurrentThreadId 19101->19103 19104 6cc9a270 19102->19104 19103->19093 19104->19093 19105->18689 19108 6cc9b8c8 19106->19108 19110 6cc9b935 19108->19110 19116 6cca0a52 19108->19116 19109 6cc9ba33 19109->18709 19109->18710 19110->19109 19111 6cca0a52 77 API calls _parse_cmdline 19110->19111 19111->19110 19113 6cca02bd 19112->19113 19114 6cca02b6 19112->19114 19113->18704 19238 6cca0113 19114->19238 19119 6cca09ff 19116->19119 19122 6cc98659 19119->19122 19123 6cc9866c 19122->19123 19124 6cc986b9 19122->19124 19130 6cc9a27f 19123->19130 19124->19108 19128 6cc98699 19128->19124 19150 6cc9fe0e 19128->19150 19131 6cc9a206 __getptd_noexit 67 API calls 19130->19131 19132 6cc9a287 19131->19132 19133 6cc98671 19132->19133 19134 6cc95bff __amsg_exit 67 API calls 19132->19134 19133->19128 19135 6cca057a 19133->19135 19134->19133 19136 6cca0586 __lseeki64 19135->19136 19137 6cc9a27f __getptd 67 API calls 19136->19137 19138 6cca058b 19137->19138 19139 6cca05b9 19138->19139 19141 6cca059d 19138->19141 19140 6cc9a914 __lock 67 API calls 19139->19140 19142 6cca05c0 19140->19142 19143 6cc9a27f __getptd 67 API calls 19141->19143 19166 6cca053c 19142->19166 19144 6cca05a2 19143->19144 19147 6cca05b0 __lseeki64 19144->19147 19149 6cc95bff __amsg_exit 67 API calls 19144->19149 19147->19128 19149->19147 19151 6cc9fe1a __lseeki64 19150->19151 19152 6cc9a27f __getptd 67 API calls 19151->19152 19153 6cc9fe1f 19152->19153 19154 6cc9a914 __lock 67 API calls 19153->19154 19163 6cc9fe31 19153->19163 19155 6cc9fe4f 19154->19155 19156 6cc9fe98 19155->19156 19157 6cc9fe80 InterlockedIncrement 19155->19157 19158 6cc9fe66 InterlockedDecrement 19155->19158 19234 6cc9fea9 19156->19234 19157->19156 19158->19157 19162 6cc9fe71 19158->19162 19160 6cc95bff __amsg_exit 67 API calls 19161 6cc9fe3f __lseeki64 19160->19161 19161->19124 19162->19157 19164 6cc94618 __crtLCMapStringA_stat 67 API calls 19162->19164 19163->19160 19163->19161 19165 6cc9fe7f 19164->19165 19165->19157 19167 6cca0540 19166->19167 19168 6cca0572 19166->19168 19167->19168 19177 6cca0414 InterlockedIncrement 19167->19177 19174 6cca05e4 19168->19174 19170 6cca0553 19170->19168 19189 6cca04a3 19170->19189 19233 6cc9a83a LeaveCriticalSection 19174->19233 19176 6cca05eb 19176->19144 19178 6cca0432 InterlockedIncrement 19177->19178 19179 6cca0435 19177->19179 19178->19179 19180 6cca043f InterlockedIncrement 19179->19180 19181 6cca0442 19179->19181 19180->19181 19182 6cca044f 19181->19182 19183 6cca044c InterlockedIncrement 19181->19183 19184 6cca0459 InterlockedIncrement 19182->19184 19186 6cca045c 19182->19186 19183->19182 19184->19186 19185 6cca0475 InterlockedIncrement 19185->19186 19186->19185 19187 6cca0485 InterlockedIncrement 19186->19187 19188 6cca0490 InterlockedIncrement 19186->19188 19187->19186 19188->19170 19190 6cca0537 19189->19190 19191 6cca04b4 InterlockedDecrement 19189->19191 19190->19168 19203 6cca02cb 19190->19203 19192 6cca04c9 InterlockedDecrement 19191->19192 19193 6cca04cc 19191->19193 19192->19193 19194 6cca04d9 19193->19194 19195 6cca04d6 InterlockedDecrement 19193->19195 19196 6cca04e3 InterlockedDecrement 19194->19196 19197 6cca04e6 19194->19197 19195->19194 19196->19197 19198 6cca04f0 InterlockedDecrement 19197->19198 19200 6cca04f3 19197->19200 19198->19200 19199 6cca050c InterlockedDecrement 19199->19200 19200->19199 19201 6cca051c InterlockedDecrement 19200->19201 19202 6cca0527 InterlockedDecrement 19200->19202 19201->19200 19202->19190 19204 6cca034f 19203->19204 19206 6cca02e2 19203->19206 19205 6cca039c 19204->19205 19207 6cc94618 __crtLCMapStringA_stat 67 API calls 19204->19207 19209 6cca2365 ___free_lc_time 67 API calls 19205->19209 19219 6cca03c3 19205->19219 19206->19204 19208 6cca0316 19206->19208 19215 6cc94618 __crtLCMapStringA_stat 67 API calls 19206->19215 19210 6cca0370 19207->19210 19212 6cca0337 19208->19212 19223 6cc94618 __crtLCMapStringA_stat 67 API calls 19208->19223 19211 6cca03bc 19209->19211 19213 6cc94618 __crtLCMapStringA_stat 67 API calls 19210->19213 19216 6cc94618 __crtLCMapStringA_stat 67 API calls 19211->19216 19214 6cc94618 __crtLCMapStringA_stat 67 API calls 19212->19214 19218 6cca0383 19213->19218 19220 6cca0344 19214->19220 19221 6cca030b 19215->19221 19216->19219 19217 6cca0408 19222 6cc94618 __crtLCMapStringA_stat 67 API calls 19217->19222 19225 6cc94618 __crtLCMapStringA_stat 67 API calls 19218->19225 19219->19217 19224 6cc94618 67 API calls __crtLCMapStringA_stat 19219->19224 19226 6cc94618 __crtLCMapStringA_stat 67 API calls 19220->19226 19227 6cca253f ___free_lconv_mon 67 API calls 19221->19227 19228 6cca040e 19222->19228 19229 6cca032c 19223->19229 19224->19219 19230 6cca0391 19225->19230 19226->19204 19227->19208 19228->19168 19231 6cca24fa ___free_lconv_num 67 API calls 19229->19231 19232 6cc94618 __crtLCMapStringA_stat 67 API calls 19230->19232 19231->19212 19232->19205 19233->19176 19237 6cc9a83a LeaveCriticalSection 19234->19237 19236 6cc9feb0 19236->19163 19237->19236 19239 6cca011f __lseeki64 19238->19239 19240 6cc9a27f __getptd 67 API calls 19239->19240 19241 6cca0128 19240->19241 19242 6cc9fe0e __setmbcp 69 API calls 19241->19242 19243 6cca0132 19242->19243 19269 6cc9feb2 19243->19269 19246 6cc9a5c3 __malloc_crt 67 API calls 19247 6cca0153 19246->19247 19248 6cca0272 __lseeki64 19247->19248 19276 6cc9ff2e 19247->19276 19248->19113 19251 6cca027f 19251->19248 19255 6cca0292 19251->19255 19257 6cc94618 __crtLCMapStringA_stat 67 API calls 19251->19257 19252 6cca0183 InterlockedDecrement 19253 6cca0193 19252->19253 19254 6cca01a4 InterlockedIncrement 19252->19254 19253->19254 19259 6cc94618 __crtLCMapStringA_stat 67 API calls 19253->19259 19254->19248 19256 6cca01ba 19254->19256 19258 6cc95348 __lseeki64 67 API calls 19255->19258 19256->19248 19261 6cc9a914 __lock 67 API calls 19256->19261 19257->19255 19258->19248 19260 6cca01a3 19259->19260 19260->19254 19263 6cca01ce InterlockedDecrement 19261->19263 19264 6cca024a 19263->19264 19265 6cca025d InterlockedIncrement 19263->19265 19264->19265 19267 6cc94618 __crtLCMapStringA_stat 67 API calls 19264->19267 19286 6cca0274 19265->19286 19268 6cca025c 19267->19268 19268->19265 19270 6cc98659 _LocaleUpdate::_LocaleUpdate 77 API calls 19269->19270 19271 6cc9fec6 19270->19271 19272 6cc9feef 19271->19272 19273 6cc9fed1 GetOEMCP 19271->19273 19274 6cc9fef4 GetACP 19272->19274 19275 6cc9fee1 19272->19275 19273->19275 19274->19275 19275->19246 19275->19248 19277 6cc9feb2 getSystemCP 79 API calls 19276->19277 19278 6cc9ff4e 19277->19278 19279 6cc9ff59 setSBCS 19278->19279 19282 6cc9ff9d IsValidCodePage 19278->19282 19285 6cc9ffc2 _memset __setmbcp_nolock 19278->19285 19280 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19279->19280 19281 6cca0111 19280->19281 19281->19251 19281->19252 19282->19279 19283 6cc9ffaf GetCPInfo 19282->19283 19283->19279 19283->19285 19289 6cc9fc7b GetCPInfo 19285->19289 19415 6cc9a83a LeaveCriticalSection 19286->19415 19288 6cca027b 19288->19248 19290 6cc9fcaf _memset 19289->19290 19291 6cc9fd61 19289->19291 19299 6cca2323 19290->19299 19294 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19291->19294 19296 6cc9fe0c 19294->19296 19296->19285 19298 6cca2124 ___crtLCMapStringA 102 API calls 19298->19291 19300 6cc98659 _LocaleUpdate::_LocaleUpdate 77 API calls 19299->19300 19301 6cca2336 19300->19301 19309 6cca2169 19301->19309 19304 6cca2124 19305 6cc98659 _LocaleUpdate::_LocaleUpdate 77 API calls 19304->19305 19306 6cca2137 19305->19306 19368 6cca1d7f 19306->19368 19310 6cca218a GetStringTypeW 19309->19310 19311 6cca21b5 19309->19311 19312 6cca21aa GetLastError 19310->19312 19313 6cca21a2 19310->19313 19311->19313 19314 6cca229c 19311->19314 19312->19311 19315 6cca21ee MultiByteToWideChar 19313->19315 19317 6cca2296 19313->19317 19337 6cca4dbc GetLocaleInfoA 19314->19337 19315->19317 19322 6cca221b 19315->19322 19318 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19317->19318 19320 6cc9fd1c 19318->19320 19320->19304 19321 6cca22ed GetStringTypeA 19321->19317 19327 6cca2308 19321->19327 19323 6cca2230 _memset __crtLCMapStringA_stat 19322->19323 19324 6cc949fe _malloc 67 API calls 19322->19324 19323->19317 19326 6cca2269 MultiByteToWideChar 19323->19326 19324->19323 19330 6cca227f GetStringTypeW 19326->19330 19331 6cca2290 19326->19331 19328 6cc94618 __crtLCMapStringA_stat 67 API calls 19327->19328 19328->19317 19330->19331 19333 6cca1006 19331->19333 19334 6cca1012 19333->19334 19335 6cca1023 19333->19335 19334->19335 19336 6cc94618 __crtLCMapStringA_stat 67 API calls 19334->19336 19335->19317 19336->19335 19338 6cca4def 19337->19338 19340 6cca4dea 19337->19340 19339 6cca1026 ___ansicp 90 API calls 19338->19339 19339->19340 19341 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19340->19341 19342 6cca22c0 19341->19342 19342->19317 19342->19321 19343 6cca4e05 19342->19343 19344 6cca4e45 GetCPInfo 19343->19344 19348 6cca4ecf 19343->19348 19345 6cca4eba MultiByteToWideChar 19344->19345 19346 6cca4e5c 19344->19346 19345->19348 19352 6cca4e75 _strlen 19345->19352 19346->19345 19349 6cca4e62 GetCPInfo 19346->19349 19347 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19350 6cca22e1 19347->19350 19348->19347 19349->19345 19351 6cca4e6f 19349->19351 19350->19317 19350->19321 19351->19345 19351->19352 19353 6cc949fe _malloc 67 API calls 19352->19353 19355 6cca4ea7 _memset __crtLCMapStringA_stat 19352->19355 19353->19355 19354 6cca4f04 MultiByteToWideChar 19356 6cca4f1c 19354->19356 19360 6cca4f3b 19354->19360 19355->19348 19355->19354 19358 6cca4f23 WideCharToMultiByte 19356->19358 19359 6cca4f40 19356->19359 19357 6cca1006 __freea 67 API calls 19357->19348 19358->19360 19361 6cca4f4b WideCharToMultiByte 19359->19361 19362 6cca4f5f 19359->19362 19360->19357 19361->19360 19361->19362 19363 6cc9a608 __calloc_crt 67 API calls 19362->19363 19364 6cca4f67 19363->19364 19364->19360 19365 6cca4f70 WideCharToMultiByte 19364->19365 19365->19360 19366 6cca4f82 19365->19366 19367 6cc94618 __crtLCMapStringA_stat 67 API calls 19366->19367 19367->19360 19369 6cca1da0 LCMapStringW 19368->19369 19373 6cca1dbb 19368->19373 19370 6cca1dc3 GetLastError 19369->19370 19369->19373 19370->19373 19371 6cca1fb9 19375 6cca4dbc ___ansicp 91 API calls 19371->19375 19372 6cca1e15 19374 6cca1e2e MultiByteToWideChar 19372->19374 19395 6cca1fb0 19372->19395 19373->19371 19373->19372 19382 6cca1e5b 19374->19382 19374->19395 19377 6cca1fe1 19375->19377 19376 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19378 6cc9fd3c 19376->19378 19379 6cca1ffa 19377->19379 19380 6cca20d5 LCMapStringA 19377->19380 19377->19395 19378->19298 19383 6cca4e05 ___convertcp 74 API calls 19379->19383 19414 6cca2031 19380->19414 19381 6cca1eac MultiByteToWideChar 19384 6cca1ec5 LCMapStringW 19381->19384 19411 6cca1fa7 19381->19411 19386 6cc949fe _malloc 67 API calls 19382->19386 19393 6cca1e74 __crtLCMapStringA_stat 19382->19393 19387 6cca200c 19383->19387 19389 6cca1ee6 19384->19389 19384->19411 19385 6cca20fc 19394 6cc94618 __crtLCMapStringA_stat 67 API calls 19385->19394 19385->19395 19386->19393 19391 6cca2016 LCMapStringA 19387->19391 19387->19395 19388 6cca1006 __freea 67 API calls 19388->19395 19392 6cca1eef 19389->19392 19398 6cca1f18 19389->19398 19390 6cc94618 __crtLCMapStringA_stat 67 API calls 19390->19385 19396 6cca2038 19391->19396 19391->19414 19397 6cca1f01 LCMapStringW 19392->19397 19392->19411 19393->19381 19393->19395 19394->19395 19395->19376 19399 6cca2049 _memset __crtLCMapStringA_stat 19396->19399 19403 6cc949fe _malloc 67 API calls 19396->19403 19397->19411 19401 6cca1f33 __crtLCMapStringA_stat 19398->19401 19402 6cc949fe _malloc 67 API calls 19398->19402 19406 6cca2087 LCMapStringA 19399->19406 19399->19414 19400 6cca1f67 LCMapStringW 19404 6cca1f7f WideCharToMultiByte 19400->19404 19405 6cca1fa1 19400->19405 19401->19400 19401->19411 19402->19401 19403->19399 19404->19405 19407 6cca1006 __freea 67 API calls 19405->19407 19408 6cca20a3 19406->19408 19409 6cca20a7 19406->19409 19407->19411 19413 6cca1006 __freea 67 API calls 19408->19413 19412 6cca4e05 ___convertcp 74 API calls 19409->19412 19411->19388 19412->19408 19413->19414 19414->19385 19414->19390 19415->19288 19417 6cc9df88 19416->19417 19418 6cc99fb8 __encode_pointer 6 API calls 19417->19418 19419 6cc9dfa0 19417->19419 19418->19417 19419->18733 19423 6cc94478 19420->19423 19422 6cc944c1 19422->18735 19424 6cc94484 __lseeki64 19423->19424 19431 6cc95c6b 19424->19431 19430 6cc944a5 __lseeki64 19430->19422 19432 6cc9a914 __lock 67 API calls 19431->19432 19433 6cc94489 19432->19433 19434 6cc9438d 19433->19434 19435 6cc9a033 __decode_pointer 6 API calls 19434->19435 19436 6cc943a1 19435->19436 19437 6cc9a033 __decode_pointer 6 API calls 19436->19437 19438 6cc943b1 19437->19438 19439 6cc94434 19438->19439 19457 6cc97637 19438->19457 19454 6cc944ae 19439->19454 19441 6cc943cf 19442 6cc9441b 19441->19442 19445 6cc943f9 19441->19445 19446 6cc943ea 19441->19446 19443 6cc99fb8 __encode_pointer 6 API calls 19442->19443 19444 6cc94429 19443->19444 19448 6cc99fb8 __encode_pointer 6 API calls 19444->19448 19445->19439 19447 6cc943f3 19445->19447 19470 6cc9a654 19446->19470 19447->19445 19450 6cc9a654 __realloc_crt 73 API calls 19447->19450 19452 6cc9440f 19447->19452 19448->19439 19451 6cc94409 19450->19451 19451->19439 19451->19452 19453 6cc99fb8 __encode_pointer 6 API calls 19452->19453 19453->19442 19519 6cc95c74 19454->19519 19458 6cc97643 __lseeki64 19457->19458 19459 6cc97670 19458->19459 19460 6cc97653 19458->19460 19461 6cc976b1 HeapSize 19459->19461 19464 6cc9a914 __lock 67 API calls 19459->19464 19462 6cc95348 __lseeki64 67 API calls 19460->19462 19466 6cc97668 __lseeki64 19461->19466 19463 6cc97658 19462->19463 19465 6cc9815c __lseeki64 6 API calls 19463->19465 19467 6cc97680 ___sbh_find_block 19464->19467 19465->19466 19466->19441 19475 6cc976d1 19467->19475 19471 6cc9a65d 19470->19471 19473 6cc9a69c 19471->19473 19474 6cc9a67d Sleep 19471->19474 19479 6cc94ac8 19471->19479 19473->19447 19474->19471 19478 6cc9a83a LeaveCriticalSection 19475->19478 19477 6cc976ac 19477->19461 19477->19466 19478->19477 19480 6cc94ad4 __lseeki64 19479->19480 19481 6cc94ae9 19480->19481 19482 6cc94adb 19480->19482 19484 6cc94afc 19481->19484 19485 6cc94af0 19481->19485 19483 6cc949fe _malloc 67 API calls 19482->19483 19500 6cc94ae3 __expand __lseeki64 19483->19500 19492 6cc94c6e 19484->19492 19513 6cc94b09 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 19484->19513 19486 6cc94618 __crtLCMapStringA_stat 67 API calls 19485->19486 19486->19500 19487 6cc94ca1 19488 6cc9c08e __calloc_impl 6 API calls 19487->19488 19491 6cc94ca7 19488->19491 19489 6cc9a914 __lock 67 API calls 19489->19513 19490 6cc94c73 HeapReAlloc 19490->19492 19490->19500 19493 6cc95348 __lseeki64 67 API calls 19491->19493 19492->19487 19492->19490 19494 6cc94cc5 19492->19494 19495 6cc9c08e __calloc_impl 6 API calls 19492->19495 19497 6cc94cbb 19492->19497 19493->19500 19496 6cc95348 __lseeki64 67 API calls 19494->19496 19494->19500 19495->19492 19498 6cc94cce GetLastError 19496->19498 19501 6cc95348 __lseeki64 67 API calls 19497->19501 19498->19500 19500->19471 19503 6cc94c3c 19501->19503 19502 6cc94b94 HeapAlloc 19502->19513 19503->19500 19505 6cc94c41 GetLastError 19503->19505 19504 6cc94be9 HeapReAlloc 19504->19513 19505->19500 19506 6cc9b126 ___sbh_alloc_block 5 API calls 19506->19513 19507 6cc94c54 19507->19500 19509 6cc95348 __lseeki64 67 API calls 19507->19509 19508 6cc9c08e __calloc_impl 6 API calls 19508->19513 19510 6cc94c61 19509->19510 19510->19498 19510->19500 19511 6cc94c37 19512 6cc95348 __lseeki64 67 API calls 19511->19512 19512->19503 19513->19487 19513->19489 19513->19500 19513->19502 19513->19504 19513->19506 19513->19507 19513->19508 19513->19511 19514 6cc9a977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19513->19514 19515 6cc94c0c 19513->19515 19514->19513 19518 6cc9a83a LeaveCriticalSection 19515->19518 19517 6cc94c13 19517->19513 19518->19517 19522 6cc9a83a LeaveCriticalSection 19519->19522 19521 6cc944b3 19521->19430 19522->19521 19524 6cc95d4f __lseeki64 19523->19524 19525 6cc9a914 __lock 67 API calls 19524->19525 19526 6cc95d56 19525->19526 19528 6cc9a033 __decode_pointer 6 API calls 19526->19528 19532 6cc95e0f __initterm 19526->19532 19530 6cc95d8d 19528->19530 19530->19532 19534 6cc9a033 __decode_pointer 6 API calls 19530->19534 19531 6cc95e57 __lseeki64 19531->18760 19540 6cc95e5a 19532->19540 19539 6cc95da2 19534->19539 19535 6cc95e4e 19536 6cc95c53 _doexit 3 API calls 19535->19536 19536->19531 19537 6cc9a033 6 API calls __decode_pointer 19537->19539 19538 6cc9a02a 6 API calls _doexit 19538->19539 19539->19532 19539->19537 19539->19538 19541 6cc95e3b 19540->19541 19542 6cc95e60 19540->19542 19541->19531 19544 6cc9a83a LeaveCriticalSection 19541->19544 19545 6cc9a83a LeaveCriticalSection 19542->19545 19544->19535 19545->19541 19547 6cc9b417 __lseeki64 19546->19547 19548 6cc9b42f 19547->19548 19558 6cc9b44e _memset 19547->19558 19549 6cc95348 __lseeki64 66 API calls 19548->19549 19550 6cc9b434 19549->19550 19552 6cc9815c __lseeki64 6 API calls 19550->19552 19551 6cc9b444 __lseeki64 19551->18769 19552->19551 19553 6cc9b4c0 RtlAllocateHeap 19553->19558 19554 6cc9c08e __calloc_impl 6 API calls 19554->19558 19555 6cc9a914 __lock 66 API calls 19555->19558 19556 6cc9b126 ___sbh_alloc_block 5 API calls 19556->19558 19558->19551 19558->19553 19558->19554 19558->19555 19558->19556 19559 6cc9b507 19558->19559 19562 6cc9a83a LeaveCriticalSection 19559->19562 19561 6cc9b50e 19561->19558 19562->19561 19563->18784 19570 6cc9a83a LeaveCriticalSection 19564->19570 19566 6cc9a1b6 19566->18794 19571 6cc9a83a LeaveCriticalSection 19567->19571 19569 6cc9a204 19569->18799 19570->19566 19571->19569 19573 6cc9a9b6 19572->19573 19578 6cc9ac58 19572->19578 19574 6cc9aba2 VirtualFree 19573->19574 19573->19578 19575 6cc9ac06 19574->19575 19576 6cc9ac15 VirtualFree HeapFree 19575->19576 19575->19578 19582 6cc98190 19576->19582 19578->18809 19586 6cc9a83a LeaveCriticalSection 19579->19586 19581 6cc94675 19581->18812 19583 6cc981a8 19582->19583 19584 6cc981d7 19583->19584 19585 6cc981cf __VEC_memcpy 19583->19585 19584->19578 19585->19584 19586->19581 19589 6cc9a2a5 __lseeki64 19587->19589 19588 6cc9a2bd 19592 6cc94618 __crtLCMapStringA_stat 67 API calls 19588->19592 19596 6cc9a2cb 19588->19596 19589->19588 19590 6cc9a3a7 __lseeki64 19589->19590 19591 6cc94618 __crtLCMapStringA_stat 67 API calls 19589->19591 19590->18814 19591->19588 19592->19596 19593 6cc94618 __crtLCMapStringA_stat 67 API calls 19595 6cc9a2d9 19593->19595 19594 6cc9a2e7 19598 6cc9a2f5 19594->19598 19599 6cc94618 __crtLCMapStringA_stat 67 API calls 19594->19599 19595->19594 19597 6cc94618 __crtLCMapStringA_stat 67 API calls 19595->19597 19596->19593 19596->19595 19597->19594 19600 6cc9a303 19598->19600 19601 6cc94618 __crtLCMapStringA_stat 67 API calls 19598->19601 19599->19598 19602 6cc9a311 19600->19602 19603 6cc94618 __crtLCMapStringA_stat 67 API calls 19600->19603 19601->19600 19604 6cc9a322 19602->19604 19605 6cc94618 __crtLCMapStringA_stat 67 API calls 19602->19605 19603->19602 19606 6cc9a914 __lock 67 API calls 19604->19606 19605->19604 19607 6cc9a32a 19606->19607 19608 6cc9a34f 19607->19608 19609 6cc9a336 InterlockedDecrement 19607->19609 19623 6cc9a3b3 19608->19623 19609->19608 19610 6cc9a341 19609->19610 19610->19608 19614 6cc94618 __crtLCMapStringA_stat 67 API calls 19610->19614 19613 6cc9a914 __lock 67 API calls 19615 6cc9a363 19613->19615 19614->19608 19616 6cc9a394 19615->19616 19617 6cca04a3 ___removelocaleref 8 API calls 19615->19617 19626 6cc9a3bf 19616->19626 19621 6cc9a378 19617->19621 19620 6cc94618 __crtLCMapStringA_stat 67 API calls 19620->19590 19621->19616 19622 6cca02cb ___freetlocinfo 67 API calls 19621->19622 19622->19616 19629 6cc9a83a LeaveCriticalSection 19623->19629 19625 6cc9a35c 19625->19613 19630 6cc9a83a LeaveCriticalSection 19626->19630 19628 6cc9a3a1 19628->19620 19629->19625 19630->19628 19636 6cc8c050 19631->19636 19633 6cc8af00 19634 6cc8af23 19633->19634 19647 6cc8bb0c 19633->19647 19634->18623 19639 6cc8c05c __EH_prolog3 19636->19639 19638 6cc8c0aa 19671 6cc8ba5b EnterCriticalSection 19638->19671 19639->19638 19653 6cc8bd66 TlsAlloc 19639->19653 19657 6cc8bc4e EnterCriticalSection 19639->19657 19678 6cc86dc1 19639->19678 19644 6cc8c0bd 19683 6cc8be0d 19644->19683 19645 6cc8c0d0 ctype 19645->19633 19648 6cc8bb18 __EH_prolog3_catch 19647->19648 19650 6cc8bb41 ctype 19648->19650 19725 6cc8c220 19648->19725 19650->19633 19651 6cc8bb27 19735 6cc8c292 19651->19735 19654 6cc8bd92 19653->19654 19655 6cc8bd97 InitializeCriticalSection 19653->19655 19705 6cc86d89 19654->19705 19655->19639 19658 6cc8bc71 19657->19658 19660 6cc8bcaa ctype 19658->19660 19661 6cc8bcbf GlobalHandle GlobalUnlock 19658->19661 19669 6cc8bd30 _memset 19658->19669 19659 6cc8bd47 LeaveCriticalSection 19659->19639 19664 6cc8bcb2 GlobalAlloc 19660->19664 19711 6cc869d7 19661->19711 19663 6cc8bcdd GlobalReAlloc 19665 6cc8bce9 19663->19665 19664->19665 19666 6cc8bd10 GlobalLock 19665->19666 19667 6cc8bd02 LeaveCriticalSection 19665->19667 19668 6cc8bcf4 GlobalHandle GlobalLock 19665->19668 19666->19669 19670 6cc86d89 ctype RaiseException 19667->19670 19668->19667 19669->19659 19670->19666 19672 6cc8ba9d LeaveCriticalSection 19671->19672 19673 6cc8ba76 19671->19673 19674 6cc8baa6 19672->19674 19673->19672 19675 6cc8ba7b TlsGetValue 19673->19675 19674->19644 19674->19645 19675->19672 19676 6cc8ba87 19675->19676 19676->19672 19677 6cc8ba8c LeaveCriticalSection 19676->19677 19677->19674 19679 6cc9527b __CxxThrowException@8 RaiseException 19678->19679 19680 6cc86ddc __EH_prolog3 19679->19680 19713 6cc8ba28 LocalAlloc 19680->19713 19682 6cc86df3 ctype 19682->19639 19717 6cc950fc 19683->19717 19685 6cc8be19 EnterCriticalSection 19686 6cc8be38 19685->19686 19691 6cc8bf1c LeaveCriticalSection 19685->19691 19688 6cc8be41 TlsGetValue 19686->19688 19686->19691 19689 6cc8be7f 19688->19689 19700 6cc8be4f 19688->19700 19692 6cc8ba28 ctype 2 API calls 19689->19692 19690 6cc8bf3f ctype 19690->19645 19691->19690 19693 6cc8be89 19692->19693 19718 6cc8bbbf 19693->19718 19694 6cc8be69 ctype 19696 6cc8be73 LocalAlloc 19694->19696 19695 6cc8bec4 ctype 19698 6cc8bed0 LocalReAlloc 19695->19698 19699 6cc8bedc 19696->19699 19698->19699 19701 6cc8beee _memset 19699->19701 19702 6cc8bee0 LeaveCriticalSection 19699->19702 19700->19691 19700->19694 19700->19695 19704 6cc8bf07 TlsSetValue 19701->19704 19703 6cc86d89 ctype RaiseException 19702->19703 19703->19701 19704->19691 19708 6cc9527b 19705->19708 19707 6cc86da4 19709 6cc952b0 RaiseException 19708->19709 19710 6cc952a4 19708->19710 19709->19707 19710->19709 19712 6cc869ec ctype 19711->19712 19712->19663 19714 6cc8ba3c 19713->19714 19715 6cc8ba41 19713->19715 19716 6cc86d89 ctype RaiseException 19714->19716 19715->19682 19716->19715 19717->19685 19721 6cc8bba5 19718->19721 19722 6cc8bbb0 19721->19722 19723 6cc8bbb5 19721->19723 19724 6cc86dc1 ctype 2 API calls 19722->19724 19723->19700 19724->19723 19726 6cc8c230 19725->19726 19727 6cc8c235 19725->19727 19728 6cc86dc1 ctype 2 API calls 19726->19728 19729 6cc8c243 19727->19729 19739 6cc8c1b7 19727->19739 19728->19727 19731 6cc8c27f EnterCriticalSection 19729->19731 19732 6cc8c255 EnterCriticalSection 19729->19732 19731->19651 19733 6cc8c261 InitializeCriticalSection 19732->19733 19734 6cc8c274 LeaveCriticalSection 19732->19734 19733->19734 19734->19731 19736 6cc8c29f 19735->19736 19737 6cc8c2a4 LeaveCriticalSection 19735->19737 19738 6cc86dc1 ctype 2 API calls 19736->19738 19737->19650 19738->19737 19740 6cc8c1c0 InitializeCriticalSection 19739->19740 19741 6cc8c1d5 19739->19741 19740->19741 19741->19729 19742 6cc839b0 19743 6cc839ee 19742->19743 19776 6cc81990 19743->19776 19745 6cc83a0a ctype 19782 6cc82370 19745->19782 19747 6cc83a69 ctype 19812 6cc81a10 19747->19812 19749 6cc83b12 19750 6cc83b16 19749->19750 19751 6cc83b77 19749->19751 19786 6cc81000 19750->19786 19752 6cc83c3b 19751->19752 19753 6cc83b81 19751->19753 19881 6cc82c10 19752->19881 19849 6cc83090 19753->19849 19758 6cc83b8c 19858 6cc831f0 19758->19858 19759 6cc83c49 19891 6cc815f0 19759->19891 19766 6cc83b4c ctype 19843 6cc87202 19766->19843 19768 6cc83b65 19900 6cc85590 19768->19900 19777 6cc819b4 19776->19777 19916 6cc868e2 19777->19916 19780 6cc868e2 ctype 67 API calls 19781 6cc819e7 19780->19781 19781->19745 19783 6cc8239f ctype 19782->19783 19783->19783 19920 6cc814a0 19783->19920 19785 6cc8240f 19785->19747 19787 6cc8102d ctype 19786->19787 19788 6cc831f0 102 API calls 19787->19788 19789 6cc81068 19788->19789 19790 6cc815f0 67 API calls 19789->19790 19791 6cc81077 19790->19791 19792 6cc83e60 19791->19792 19956 6cc93d6c 19792->19956 19794 6cc84443 19795 6cc868e2 ctype 67 API calls 19794->19795 19797 6cc84460 ctype 19795->19797 19796 6cc83b35 19819 6cc85070 19796->19819 19798 6cc9527b __CxxThrowException@8 RaiseException 19797->19798 19799 6cc844ae 19798->19799 19800 6cc86dc1 ctype 2 API calls 19799->19800 19800->19796 19802 6cc868e2 ctype 67 API calls 19807 6cc83ea7 _memset 19802->19807 19806 6cc8afc3 69 API calls 19806->19807 19807->19794 19807->19796 19807->19799 19807->19802 19807->19806 19811 6cc840fd 19807->19811 19962 6cc85ca0 19807->19962 19975 6cc86160 19807->19975 19980 6cc8b1ec 19807->19980 19810 6cc86750 ReadFile 19810->19811 19811->19807 19811->19810 19986 6cc85e70 19811->19986 19992 6cc86230 19811->19992 19997 6cc863f0 19811->19997 20025 6cc8764f 19812->20025 19814 6cc81af7 19814->19749 19815 6cc81a59 ctype 19815->19814 20040 6cc872fd 19815->20040 19817 6cc81ab1 GetDiskFreeSpaceW 19817->19814 19841 6cc850a6 19819->19841 19820 6cc853de 19822 6cc86dc1 ctype 2 API calls 19820->19822 19821 6cc852bf 20185 6cc847d0 19821->20185 19824 6cc853e3 19822->19824 19823 6cc8538f 19828 6cc868e2 ctype 67 API calls 19823->19828 19826 6cc868e2 ctype 67 API calls 19824->19826 19835 6cc853ea ctype 19826->19835 19827 6cc8525a 19827->19820 19827->19821 19827->19824 20181 6cc845f0 19827->20181 19832 6cc85396 ctype 19828->19832 19831 6cc9527b __CxxThrowException@8 RaiseException 19836 6cc85432 19831->19836 19833 6cc9527b __CxxThrowException@8 RaiseException 19832->19833 19833->19820 19835->19831 19838 6cc8530c 19838->19766 19839 6cc831f0 102 API calls 19839->19841 19840 6cc82600 101 API calls 19840->19841 19841->19820 19841->19823 19841->19827 19841->19839 19841->19840 20127 6cc84880 19841->20127 20147 6cc84ac0 19841->20147 20170 6cc862d0 19841->20170 20175 6cc85490 19841->20175 19844 6cc87220 ctype 19843->19844 19845 6cc87212 CloseHandle 19843->19845 19846 6cc87244 19844->19846 19847 6cc87236 GetLastError 19844->19847 19845->19844 19846->19768 20283 6cc87bcb 19847->20283 20297 6cc82f60 19849->20297 19851 6cc8309f 19852 6cc830bc 19851->19852 19853 6cc830a7 19851->19853 20319 6cc81580 19852->20319 20311 6cc83370 19853->20311 19856 6cc830b8 19856->19758 19857 6cc830c7 19857->19758 19859 6cc83222 ctype 19858->19859 19860 6cc8aef1 ctype 31 API calls 19859->19860 19861 6cc83254 19860->19861 20328 6cc833f0 FindResourceExW 19861->20328 19863 6cc83268 19864 6cc8326c 19863->19864 19866 6cc8aef1 ctype 31 API calls 19863->19866 19865 6cc81580 67 API calls 19864->19865 19876 6cc83279 19865->19876 19867 6cc832bf 19866->19867 19868 6cc833f0 71 API calls 19867->19868 19869 6cc832d3 19868->19869 19870 6cc83308 19869->19870 19871 6cc832d7 19869->19871 19872 6cc8a58c 31 API calls 19870->19872 19873 6cc81580 67 API calls 19871->19873 19874 6cc8330e 19872->19874 19873->19876 19874->19864 19875 6cc83325 19874->19875 19877 6cc82b50 98 API calls 19875->19877 19878 6cc82600 19876->19878 19877->19876 20342 6cc81240 19878->20342 19880 6cc82613 19880->19768 19882 6cc82c51 ctype 19881->19882 19883 6cc82cc0 19882->19883 19884 6cc831f0 102 API calls 19882->19884 19885 6cc831f0 102 API calls 19883->19885 19886 6cc82cad 19884->19886 19887 6cc82cf9 19885->19887 19888 6cc944cb 67 API calls 19886->19888 19889 6cc82600 101 API calls 19887->19889 19888->19883 19890 6cc82d0b ctype 19889->19890 19890->19759 19892 6cc8165a 19891->19892 19893 6cc81606 19891->19893 19892->19768 19894 6cc81646 19893->19894 19895 6cc81616 19893->19895 19896 6cc814a0 ctype 67 API calls 19894->19896 19897 6cc81580 67 API calls 19895->19897 19898 6cc81652 19896->19898 19899 6cc8161d 19897->19899 19898->19768 19899->19768 19901 6cc855bb 19900->19901 19902 6cc83d8b 19900->19902 19901->19902 19903 6cc831f0 102 API calls 19901->19903 19906 6cc82490 19902->19906 19904 6cc855d1 19903->19904 19905 6cc82600 101 API calls 19904->19905 19905->19902 19907 6cc824d1 ctype 19906->19907 20606 6cc87343 19907->20606 19918 6cc868ea 19916->19918 19917 6cc949fe _malloc 67 API calls 19917->19918 19918->19917 19919 6cc819be 19918->19919 19919->19780 19921 6cc814ac ctype 19920->19921 19922 6cc814b6 19920->19922 19921->19785 19923 6cc814ed 19922->19923 19930 6cc813f0 19922->19930 19925 6cc8150a 19923->19925 19926 6cc814fd 19923->19926 19947 6cc93f43 19925->19947 19935 6cc93fc0 19926->19935 19929 6cc81508 19929->19785 19932 6cc81330 ctype 19930->19932 19931 6cc813b0 ctype 19931->19923 19932->19931 19933 6cc93f43 _memcpy_s 67 API calls 19932->19933 19934 6cc8137d 19933->19934 19934->19923 19936 6cc93fd0 19935->19936 19946 6cc93fe9 19935->19946 19937 6cc93fd5 19936->19937 19938 6cc93ff5 19936->19938 19939 6cc95348 __lseeki64 67 API calls 19937->19939 19940 6cc94008 19938->19940 19941 6cc93ffa 19938->19941 19945 6cc93fda 19939->19945 19943 6cc98190 __fptostr __VEC_memcpy 19940->19943 19942 6cc95348 __lseeki64 67 API calls 19941->19942 19942->19945 19943->19946 19944 6cc9815c __lseeki64 6 API calls 19944->19946 19945->19944 19946->19929 19950 6cc93f57 _memset 19947->19950 19952 6cc93f53 ___crtGetEnvironmentStringsA 19947->19952 19948 6cc93f5c 19949 6cc95348 __lseeki64 67 API calls 19948->19949 19951 6cc93f61 19949->19951 19950->19948 19950->19952 19953 6cc93fa6 19950->19953 19954 6cc9815c __lseeki64 6 API calls 19951->19954 19952->19929 19953->19952 19955 6cc95348 __lseeki64 67 API calls 19953->19955 19954->19952 19955->19951 19957 6cc93d7f 19956->19957 19959 6cc93d84 19956->19959 19958 6cc86dc1 ctype 2 API calls 19957->19958 19958->19959 19960 6cc868e2 ctype 67 API calls 19959->19960 19961 6cc93d92 _memset ctype 19959->19961 19960->19961 19961->19807 19963 6cc85cd6 19962->19963 20004 6cc8afc3 19963->20004 19965 6cc85d57 19966 6cc8afc3 69 API calls 19965->19966 19967 6cc85d61 19966->19967 20014 6cc864e0 19967->20014 19970 6cc85eba GlobalAlloc 19973 6cc85d97 19970->19973 19971 6cc867c3 19971->19807 19972 6cc860f0 CreateFileW 19972->19973 19974 6cc861de 19972->19974 19973->19970 19973->19971 19973->19972 19979 6cc85de6 19975->19979 19976 6cc85eba GlobalAlloc 19976->19979 19977 6cc861d2 19977->19807 19978 6cc860f0 CreateFileW 19978->19977 19978->19979 19979->19976 19979->19977 19979->19978 19981 6cc8b1fc 19980->19981 19982 6cc8b201 19980->19982 19984 6cc86dc1 ctype 2 API calls 19981->19984 19983 6cc8b211 19982->19983 19985 6cc93d6c 69 API calls 19982->19985 19983->19807 19984->19982 19985->19983 19986->19986 19990 6cc85de6 19986->19990 19987 6cc867c3 19987->19811 19988 6cc85eba GlobalAlloc 19988->19990 19989 6cc860f0 CreateFileW 19989->19990 19991 6cc861de 19989->19991 19990->19987 19990->19988 19990->19989 19995 6cc86250 19992->19995 19993 6cc862f3 ReadFile 19994 6cc861f0 19993->19994 19993->19995 19994->19811 19995->19993 19996 6cc866d2 19995->19996 20003 6cc863fe 19997->20003 19998 6cc865f3 LoadLibraryA VirtualProtect 20000 6cc867f8 19998->20000 19999 6cc866f0 20001 6cc86649 VirtualProtect 20000->20001 20002 6cc86663 20001->20002 20002->19807 20003->19998 20003->19999 20008 6cc8afd6 20004->20008 20005 6cc86dc1 ctype 2 API calls 20005->20008 20006 6cc8b009 20007 6cc868e2 ctype 67 API calls 20006->20007 20013 6cc8afe9 _memset ctype 20007->20013 20008->20005 20008->20006 20009 6cc8b08c 20008->20009 20008->20013 20010 6cc868e2 ctype 67 API calls 20009->20010 20011 6cc8b094 20010->20011 20020 6cc85ac0 20011->20020 20013->19965 20019 6cc864ea LoadLibraryA VirtualProtect 20014->20019 20018 6cc85d67 GetPEB 20018->19973 20023 6cc867f8 20019->20023 20021 6cc93f43 _memcpy_s 67 API calls 20020->20021 20022 6cc85ad9 20021->20022 20022->20013 20024 6cc86649 VirtualProtect 20023->20024 20024->20018 20028 6cc87696 ctype 20025->20028 20026 6cc87807 20027 6cc877fb 20026->20027 20089 6cc82330 20026->20089 20031 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20027->20031 20028->20026 20030 6cc876bd 20028->20030 20046 6cc8748e 20030->20046 20033 6cc87835 20031->20033 20033->19815 20123 6cc81440 20040->20123 20042 6cc87312 _memset 20043 6cc86a35 67 API calls 20042->20043 20044 6cc87329 PathStripToRootW 20043->20044 20045 6cc8733d 20044->20045 20045->19817 20047 6cc8749d __EH_prolog3_GS 20046->20047 20048 6cc86dc1 ctype 2 API calls 20047->20048 20049 6cc874c7 GetFullPathNameW 20047->20049 20048->20047 20050 6cc874e0 20049->20050 20051 6cc87505 20049->20051 20096 6cc86a35 20050->20096 20052 6cc87509 20051->20052 20053 6cc87524 20051->20053 20056 6cc82330 67 API calls 20052->20056 20069 6cc874fe ctype 20052->20069 20058 6cc872fd 68 API calls 20053->20058 20055 6cc874ef 20057 6cc8745f 68 API calls 20055->20057 20056->20069 20057->20069 20060 6cc87540 PathIsUNCW 20058->20060 20062 6cc87554 GetVolumeInformationW 20060->20062 20060->20069 20063 6cc87596 20062->20063 20064 6cc87577 20062->20064 20065 6cc8759f CharUpperW 20063->20065 20066 6cc875a6 20063->20066 20067 6cc8745f 68 API calls 20064->20067 20065->20066 20068 6cc875af FindFirstFileW 20066->20068 20066->20069 20067->20069 20068->20069 20070 6cc875c7 FindClose 20068->20070 20102 6cc951b5 20069->20102 20070->20064 20071 6cc875d7 20070->20071 20071->20064 20072 6cc875df lstrlenW 20071->20072 20073 6cc875fc 20072->20073 20074 6cc8762d 20072->20074 20099 6cc86ea0 20073->20099 20074->20069 20076 6cc82330 67 API calls 20074->20076 20076->20069 20090 6cc8234a 20089->20090 20091 6cc8233b 20089->20091 20094 6cc814a0 ctype 67 API calls 20090->20094 20092 6cc814a0 ctype 67 API calls 20091->20092 20093 6cc82344 20092->20093 20093->20027 20095 6cc82369 20094->20095 20095->20027 20105 6cc944cb 20096->20105 20098 6cc86a4b 20098->20055 20114 6cc951ed 20099->20114 20101 6cc86eb3 20101->20069 20103 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20102->20103 20104 6cc951bf 20103->20104 20104->20104 20109 6cc944dd 20105->20109 20106 6cc944e1 20107 6cc944e6 20106->20107 20108 6cc95348 __lseeki64 67 API calls 20106->20108 20107->20098 20110 6cc944fd 20108->20110 20109->20106 20109->20107 20112 6cc9452d 20109->20112 20111 6cc9815c __lseeki64 6 API calls 20110->20111 20111->20107 20112->20107 20113 6cc95348 __lseeki64 67 API calls 20112->20113 20113->20110 20115 6cc951fe 20114->20115 20116 6cc95205 20114->20116 20115->20116 20121 6cc95231 20115->20121 20117 6cc95348 __lseeki64 67 API calls 20116->20117 20118 6cc9520a 20117->20118 20119 6cc9815c __lseeki64 6 API calls 20118->20119 20120 6cc95219 20119->20120 20120->20101 20121->20120 20122 6cc95348 __lseeki64 67 API calls 20121->20122 20122->20118 20124 6cc8145d 20123->20124 20125 6cc81465 20123->20125 20126 6cc813f0 ctype 67 API calls 20124->20126 20125->20042 20126->20125 20128 6cc848be ctype 20127->20128 20129 6cc862d0 ReadFile 20128->20129 20130 6cc8492c 20129->20130 20131 6cc815f0 67 API calls 20130->20131 20132 6cc8493e 20131->20132 20189 6cc830e0 20132->20189 20134 6cc8496f 20135 6cc84a3d 20134->20135 20192 6cc83150 20134->20192 20138 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20135->20138 20140 6cc84aae 20138->20140 20139 6cc815f0 67 API calls 20141 6cc84996 20139->20141 20140->19841 20196 6cc85670 20141->20196 20143 6cc849d6 20144 6cc8afc3 69 API calls 20143->20144 20145 6cc849f9 ___crtGetEnvironmentStringsA 20144->20145 20145->20135 20146 6cc94618 __crtLCMapStringA_stat 67 API calls 20145->20146 20146->20135 20149 6cc84b00 20147->20149 20246 6cc83720 20149->20246 20153 6cc8afc3 69 API calls 20154 6cc84e44 20153->20154 20155 6cc84e88 20154->20155 20157 6cc84e63 20154->20157 20156 6cc84e97 20155->20156 20158 6cc86dc1 ctype 2 API calls 20155->20158 20261 6cc857c0 20156->20261 20255 6cc8b0d5 20157->20255 20158->20156 20160 6cc84ea0 20162 6cc8b0d5 69 API calls 20160->20162 20163 6cc84e86 20162->20163 20277 6cc85fb0 20163->20277 20165 6cc84ecc ctype 20166 6cc862d0 ReadFile 20165->20166 20167 6cc84f5b 20166->20167 20168 6cc815f0 67 API calls 20167->20168 20169 6cc84f6f ctype 20168->20169 20169->19841 20173 6cc866d2 20170->20173 20174 6cc8626d 20170->20174 20171 6cc862f3 ReadFile 20172 6cc861f0 20171->20172 20171->20174 20172->19841 20174->20171 20174->20173 20176 6cc854f7 20175->20176 20180 6cc854be 20175->20180 20177 6cc831f0 102 API calls 20176->20177 20176->20180 20178 6cc8551a 20177->20178 20179 6cc82600 101 API calls 20178->20179 20179->20180 20180->19841 20182 6cc84616 20181->20182 20183 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20182->20183 20184 6cc846ee 20183->20184 20184->19827 20186 6cc847f9 20185->20186 20187 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20186->20187 20188 6cc84873 20187->20188 20188->19838 20208 6cc82b50 20189->20208 20191 6cc830f2 _wcspbrk 20191->20134 20193 6cc8318b ctype 20192->20193 20194 6cc82600 101 API calls 20193->20194 20195 6cc831d7 20194->20195 20195->20139 20197 6cc8567b 20196->20197 20198 6cc85681 lstrlenW 20196->20198 20197->20143 20218 6cc85730 20198->20218 20201 6cc8571f 20201->20143 20202 6cc856c5 GetLastError 20203 6cc856d0 WideCharToMultiByte 20202->20203 20204 6cc85716 20202->20204 20205 6cc85730 73 API calls 20203->20205 20204->20201 20226 6cc85b00 GetLastError 20204->20226 20206 6cc856f4 WideCharToMultiByte 20205->20206 20206->20204 20209 6cc82b7e ctype 20208->20209 20210 6cc82bb9 20209->20210 20211 6cc82bd1 20209->20211 20215 6cc8a58c 20210->20215 20213 6cc814a0 ctype 67 API calls 20211->20213 20214 6cc82bc2 20213->20214 20214->20191 20216 6cc8aef1 ctype 31 API calls 20215->20216 20217 6cc8a591 20216->20217 20217->20214 20219 6cc85734 20218->20219 20224 6cc85788 20219->20224 20225 6cc85771 20219->20225 20228 6cc946a6 20219->20228 20220 6cc94618 __crtLCMapStringA_stat 67 API calls 20220->20224 20223 6cc8569f WideCharToMultiByte 20223->20201 20223->20202 20224->20223 20239 6cc94721 20224->20239 20225->20220 20225->20224 20227 6cc85b0a 20226->20227 20229 6cc946dd 20228->20229 20230 6cc946b5 20228->20230 20232 6cc946f2 20229->20232 20234 6cc97637 __recalloc 68 API calls 20229->20234 20230->20229 20231 6cc946c1 20230->20231 20233 6cc95348 __lseeki64 67 API calls 20231->20233 20235 6cc94ac8 _realloc 72 API calls 20232->20235 20236 6cc946c6 20233->20236 20234->20232 20238 6cc946d6 _memset 20235->20238 20237 6cc9815c __lseeki64 6 API calls 20236->20237 20237->20238 20238->20225 20240 6cc9b40b __calloc_impl 67 API calls 20239->20240 20241 6cc9473b 20240->20241 20242 6cc94757 20241->20242 20243 6cc95348 __lseeki64 67 API calls 20241->20243 20242->20224 20244 6cc9474e 20243->20244 20244->20242 20245 6cc95348 __lseeki64 67 API calls 20244->20245 20245->20242 20247 6cc83756 20246->20247 20248 6cc8afc3 69 API calls 20247->20248 20249 6cc83769 20248->20249 20250 6cc860f0 CreateFileW 20249->20250 20251 6cc861de 20250->20251 20254 6cc85de6 20250->20254 20252 6cc85eba GlobalAlloc 20252->20254 20253 6cc84d7d 20253->20153 20254->20250 20254->20252 20254->20253 20256 6cc8b0ff 20255->20256 20257 6cc8b0e5 20255->20257 20256->20163 20258 6cc8afc3 69 API calls 20257->20258 20259 6cc8b0ef 20258->20259 20260 6cc85ac0 67 API calls 20259->20260 20260->20256 20262 6cc857f8 20261->20262 20263 6cc857f3 20261->20263 20265 6cc858bb 20262->20265 20268 6cc85848 _memset 20262->20268 20275 6cc857fa ctype 20262->20275 20264 6cc86dc1 ctype 2 API calls 20263->20264 20264->20262 20266 6cc85992 20265->20266 20270 6cc858c6 _memset 20265->20270 20267 6cc859d8 20266->20267 20269 6cc86dc1 ctype 2 API calls 20266->20269 20271 6cc85ac0 67 API calls 20267->20271 20273 6cc83720 69 API calls 20268->20273 20268->20275 20269->20267 20272 6cc83720 69 API calls 20270->20272 20270->20275 20274 6cc85a0d _memset 20271->20274 20272->20270 20273->20268 20274->20275 20276 6cc83720 69 API calls 20274->20276 20275->20160 20276->20274 20282 6cc85de6 20277->20282 20278 6cc860f0 CreateFileW 20280 6cc861de 20278->20280 20278->20282 20279 6cc85eba GlobalAlloc 20279->20282 20281 6cc867c3 20281->20165 20282->20278 20282->20279 20282->20281 20284 6cc87bea 20283->20284 20285 6cc87bd6 ctype 20283->20285 20284->19846 20287 6cc87b85 20285->20287 20288 6cc87b91 __EH_prolog3 20287->20288 20289 6cc868e2 ctype 67 API calls 20288->20289 20290 6cc87b98 20289->20290 20291 6cc87bb5 20290->20291 20293 6cc82370 ctype 67 API calls 20290->20293 20292 6cc9527b __CxxThrowException@8 RaiseException 20291->20292 20295 6cc87bca ctype 20292->20295 20293->20291 20294 6cc87bea 20294->20284 20295->20294 20296 6cc87b85 ctype 68 API calls 20295->20296 20296->20294 20298 6cc81580 67 API calls 20297->20298 20299 6cc82f92 20298->20299 20300 6cc813f0 ctype 67 API calls 20299->20300 20301 6cc82fc2 __wcsrev 20299->20301 20300->20301 20302 6cc82f60 67 API calls 20301->20302 20304 6cc82fe0 _wcspbrk 20301->20304 20303 6cc8309f 20302->20303 20305 6cc830bc 20303->20305 20306 6cc830a7 20303->20306 20304->19851 20307 6cc81580 67 API calls 20305->20307 20308 6cc83370 67 API calls 20306->20308 20310 6cc830c7 20307->20310 20309 6cc830b8 20308->20309 20309->19851 20310->19851 20312 6cc83386 20311->20312 20313 6cc83391 20312->20313 20316 6cc833af ctype 20312->20316 20314 6cc81580 67 API calls 20313->20314 20315 6cc8339a 20314->20315 20315->19856 20324 6cc83680 20316->20324 20321 6cc8158f ctype 20319->20321 20320 6cc8159c 20320->19857 20321->20320 20322 6cc93f43 _memcpy_s 67 API calls 20321->20322 20323 6cc815e1 20322->20323 20323->19857 20325 6cc8368b ctype 20324->20325 20326 6cc93f43 _memcpy_s 67 API calls 20325->20326 20327 6cc833e6 20326->20327 20327->19856 20329 6cc8340e 20328->20329 20330 6cc8341f 20328->20330 20337 6cc828d0 LoadResource 20329->20337 20330->19863 20332 6cc83416 20332->20330 20333 6cc83447 20332->20333 20334 6cc813f0 ctype 67 API calls 20332->20334 20335 6cc93f43 _memcpy_s 67 API calls 20333->20335 20334->20333 20336 6cc8347e 20335->20336 20336->19863 20338 6cc828e9 LockResource 20337->20338 20339 6cc828e6 20337->20339 20340 6cc828f7 SizeofResource 20338->20340 20341 6cc8290a 20338->20341 20339->20332 20340->20341 20341->20332 20343 6cc8124c 20342->20343 20350 6cc94320 20343->20350 20346 6cc81286 20353 6cc941a0 20346->20353 20347 6cc813f0 ctype 67 API calls 20347->20346 20349 6cc81294 20349->19880 20356 6cc942c9 20350->20356 20362 6cc94115 20353->20362 20357 6cc942d9 20356->20357 20361 6cc81263 20356->20361 20358 6cc95348 __lseeki64 67 API calls 20357->20358 20359 6cc942de 20358->20359 20360 6cc9815c __lseeki64 6 API calls 20359->20360 20360->20361 20361->20346 20361->20347 20363 6cc9413f 20362->20363 20364 6cc94122 20362->20364 20365 6cc9414c 20363->20365 20367 6cc94159 20363->20367 20366 6cc95348 __lseeki64 67 API calls 20364->20366 20368 6cc95348 __lseeki64 67 API calls 20365->20368 20369 6cc94127 20366->20369 20377 6cc9401d 20367->20377 20376 6cc94151 20368->20376 20371 6cc9815c __lseeki64 6 API calls 20369->20371 20373 6cc94137 20371->20373 20373->20349 20374 6cc9815c __lseeki64 6 API calls 20374->20373 20375 6cc95348 __lseeki64 67 API calls 20375->20376 20376->20374 20378 6cc9404d 20377->20378 20379 6cc9402d 20377->20379 20382 6cc9405d 20378->20382 20387 6cc9407d 20378->20387 20380 6cc95348 __lseeki64 67 API calls 20379->20380 20381 6cc94032 20380->20381 20383 6cc9815c __lseeki64 6 API calls 20381->20383 20384 6cc95348 __lseeki64 67 API calls 20382->20384 20390 6cc94042 20383->20390 20385 6cc94062 20384->20385 20386 6cc9815c __lseeki64 6 API calls 20385->20386 20386->20390 20388 6cc940c4 20387->20388 20387->20390 20392 6cc984f5 20387->20392 20388->20390 20391 6cc984f5 __flsbuf 101 API calls 20388->20391 20390->20373 20390->20375 20391->20390 20413 6cc9fbb6 20392->20413 20395 6cc98510 20398 6cc95348 __lseeki64 67 API calls 20395->20398 20396 6cc98527 20397 6cc9852b 20396->20397 20400 6cc98538 __flswbuf 20396->20400 20399 6cc95348 __lseeki64 67 API calls 20397->20399 20407 6cc98515 20398->20407 20399->20407 20400->20407 20409 6cc9858e 20400->20409 20412 6cc98599 20400->20412 20419 6cc9f99d 20400->20419 20401 6cc98628 20403 6cc9f878 __locking 101 API calls 20401->20403 20402 6cc985a8 20404 6cc985bf 20402->20404 20408 6cc985dc 20402->20408 20403->20407 20431 6cc9f878 20404->20431 20407->20388 20408->20407 20456 6cc9f02c 20408->20456 20409->20412 20428 6cc9f954 20409->20428 20412->20401 20412->20402 20414 6cc98505 20413->20414 20415 6cc9fbc5 20413->20415 20414->20395 20414->20396 20416 6cc95348 __lseeki64 67 API calls 20415->20416 20417 6cc9fbca 20416->20417 20418 6cc9815c __lseeki64 6 API calls 20417->20418 20418->20414 20420 6cc9f9b9 20419->20420 20421 6cc9f9aa 20419->20421 20424 6cc9f9dd 20420->20424 20425 6cc95348 __lseeki64 67 API calls 20420->20425 20422 6cc95348 __lseeki64 67 API calls 20421->20422 20423 6cc9f9af 20422->20423 20423->20409 20424->20409 20426 6cc9f9cd 20425->20426 20427 6cc9815c __lseeki64 6 API calls 20426->20427 20427->20424 20429 6cc9a5c3 __malloc_crt 67 API calls 20428->20429 20430 6cc9f969 20429->20430 20430->20412 20432 6cc9f884 __lseeki64 20431->20432 20433 6cc9f88c 20432->20433 20434 6cc9f8a7 20432->20434 20488 6cc9535b 20433->20488 20436 6cc9f8b5 20434->20436 20439 6cc9f8f6 20434->20439 20438 6cc9535b __lseeki64 67 API calls 20436->20438 20441 6cc9f8ba 20438->20441 20491 6cca19c1 20439->20491 20440 6cc95348 __lseeki64 67 API calls 20451 6cc9f899 __lseeki64 20440->20451 20443 6cc95348 __lseeki64 67 API calls 20441->20443 20445 6cc9f8c1 20443->20445 20444 6cc9f8fc 20446 6cc9f909 20444->20446 20447 6cc9f91f 20444->20447 20448 6cc9815c __lseeki64 6 API calls 20445->20448 20501 6cc9f145 20446->20501 20450 6cc95348 __lseeki64 67 API calls 20447->20450 20448->20451 20453 6cc9f924 20450->20453 20451->20407 20452 6cc9f917 20560 6cc9f94a 20452->20560 20454 6cc9535b __lseeki64 67 API calls 20453->20454 20454->20452 20457 6cc9f038 __lseeki64 20456->20457 20458 6cc9f049 20457->20458 20459 6cc9f065 20457->20459 20460 6cc9535b __lseeki64 67 API calls 20458->20460 20461 6cc9f073 20459->20461 20463 6cc9f094 20459->20463 20462 6cc9f04e 20460->20462 20464 6cc9535b __lseeki64 67 API calls 20461->20464 20468 6cc95348 __lseeki64 67 API calls 20462->20468 20466 6cc9f0da 20463->20466 20467 6cc9f0b4 20463->20467 20465 6cc9f078 20464->20465 20469 6cc95348 __lseeki64 67 API calls 20465->20469 20471 6cca19c1 ___lock_fhandle 68 API calls 20466->20471 20470 6cc9535b __lseeki64 67 API calls 20467->20470 20482 6cc9f056 __lseeki64 20468->20482 20472 6cc9f07f 20469->20472 20473 6cc9f0b9 20470->20473 20474 6cc9f0e0 20471->20474 20477 6cc9815c __lseeki64 6 API calls 20472->20477 20478 6cc95348 __lseeki64 67 API calls 20473->20478 20475 6cc9f109 20474->20475 20476 6cc9f0ed 20474->20476 20480 6cc95348 __lseeki64 67 API calls 20475->20480 20479 6cc9efa7 __lseeki64_nolock 69 API calls 20476->20479 20477->20482 20481 6cc9f0c0 20478->20481 20483 6cc9f0fe 20479->20483 20484 6cc9f10e 20480->20484 20485 6cc9815c __lseeki64 6 API calls 20481->20485 20482->20407 20602 6cc9f13b 20483->20602 20486 6cc9535b __lseeki64 67 API calls 20484->20486 20485->20482 20486->20483 20489 6cc9a206 __getptd_noexit 67 API calls 20488->20489 20490 6cc95360 20489->20490 20490->20440 20492 6cca19cd __lseeki64 20491->20492 20493 6cca1a28 20492->20493 20494 6cc9a914 __lock 67 API calls 20492->20494 20495 6cca1a2d EnterCriticalSection 20493->20495 20496 6cca1a4a __lseeki64 20493->20496 20498 6cca19f9 20494->20498 20495->20496 20496->20444 20497 6cca1a10 20563 6cca1a58 20497->20563 20498->20497 20499 6cc9e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20498->20499 20499->20497 20502 6cc9f154 __write_nolock 20501->20502 20503 6cc9f1ad 20502->20503 20504 6cc9f186 20502->20504 20533 6cc9f17b 20502->20533 20507 6cc9f1ef 20503->20507 20508 6cc9f215 20503->20508 20506 6cc9535b __lseeki64 67 API calls 20504->20506 20505 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20509 6cc9f876 20505->20509 20510 6cc9f18b 20506->20510 20511 6cc9535b __lseeki64 67 API calls 20507->20511 20512 6cc9f229 20508->20512 20567 6cc9efa7 20508->20567 20509->20452 20513 6cc95348 __lseeki64 67 API calls 20510->20513 20514 6cc9f1f4 20511->20514 20517 6cc9f99d __write_nolock 67 API calls 20512->20517 20516 6cc9f192 20513->20516 20518 6cc95348 __lseeki64 67 API calls 20514->20518 20519 6cc9815c __lseeki64 6 API calls 20516->20519 20520 6cc9f234 20517->20520 20521 6cc9f1fd 20518->20521 20519->20533 20522 6cc9f4da 20520->20522 20524 6cc9a27f __getptd 67 API calls 20520->20524 20523 6cc9815c __lseeki64 6 API calls 20521->20523 20525 6cc9f7a9 WriteFile 20522->20525 20526 6cc9f4ea 20522->20526 20523->20533 20527 6cc9f24f GetConsoleMode 20524->20527 20528 6cc9f7dc GetLastError 20525->20528 20557 6cc9f4bc 20525->20557 20529 6cc9f5c8 20526->20529 20549 6cc9f4fe 20526->20549 20527->20522 20531 6cc9f27a 20527->20531 20528->20557 20548 6cc9f6a8 20529->20548 20552 6cc9f5d7 20529->20552 20530 6cc9f827 20530->20533 20535 6cc95348 __lseeki64 67 API calls 20530->20535 20531->20522 20532 6cc9f28c GetConsoleCP 20531->20532 20534 6cc9f2af 20532->20534 20532->20557 20533->20505 20534->20528 20554 6cca0932 79 API calls __fassign 20534->20554 20555 6cca1a88 11 API calls __putwch_nolock 20534->20555 20556 6cc9f35b WideCharToMultiByte 20534->20556 20534->20557 20559 6cc9f3e0 WriteFile 20534->20559 20577 6cca0984 20534->20577 20538 6cc9f84a 20535->20538 20536 6cc9f7fa 20540 6cc9f819 20536->20540 20541 6cc9f805 20536->20541 20537 6cc9f56c WriteFile 20537->20528 20537->20549 20544 6cc9535b __lseeki64 67 API calls 20538->20544 20539 6cc9f70e WideCharToMultiByte 20539->20528 20546 6cc9f745 WriteFile 20539->20546 20580 6cc9536e 20540->20580 20545 6cc95348 __lseeki64 67 API calls 20541->20545 20542 6cc9f64c WriteFile 20542->20528 20542->20552 20544->20533 20550 6cc9f80a 20545->20550 20547 6cc9f77c GetLastError 20546->20547 20546->20548 20547->20548 20548->20530 20548->20539 20548->20546 20548->20557 20549->20530 20549->20537 20549->20557 20551 6cc9535b __lseeki64 67 API calls 20550->20551 20551->20533 20552->20530 20552->20542 20552->20557 20554->20534 20555->20534 20556->20557 20558 6cc9f38c WriteFile 20556->20558 20557->20530 20557->20533 20557->20536 20558->20528 20558->20534 20559->20528 20559->20534 20601 6cca1a61 LeaveCriticalSection 20560->20601 20562 6cc9f952 20562->20451 20566 6cc9a83a LeaveCriticalSection 20563->20566 20565 6cca1a5f 20565->20493 20566->20565 20585 6cca194a 20567->20585 20569 6cc9efc5 20570 6cc9efcd 20569->20570 20571 6cc9efde SetFilePointer 20569->20571 20573 6cc95348 __lseeki64 67 API calls 20570->20573 20572 6cc9eff6 GetLastError 20571->20572 20576 6cc9efd2 20571->20576 20574 6cc9f000 20572->20574 20572->20576 20573->20576 20575 6cc9536e __dosmaperr 67 API calls 20574->20575 20575->20576 20576->20512 20598 6cca094c 20577->20598 20581 6cc9535b __lseeki64 67 API calls 20580->20581 20582 6cc95379 __expand 20581->20582 20583 6cc95348 __lseeki64 67 API calls 20582->20583 20584 6cc9538c 20583->20584 20584->20533 20586 6cca196f 20585->20586 20587 6cca1957 20585->20587 20590 6cc9535b __lseeki64 67 API calls 20586->20590 20592 6cca19b4 20586->20592 20588 6cc9535b __lseeki64 67 API calls 20587->20588 20589 6cca195c 20588->20589 20591 6cc95348 __lseeki64 67 API calls 20589->20591 20593 6cca199d 20590->20593 20594 6cca1964 20591->20594 20592->20569 20595 6cc95348 __lseeki64 67 API calls 20593->20595 20594->20569 20596 6cca19a4 20595->20596 20597 6cc9815c __lseeki64 6 API calls 20596->20597 20597->20592 20599 6cc98659 _LocaleUpdate::_LocaleUpdate 77 API calls 20598->20599 20600 6cca095f 20599->20600 20600->20534 20601->20562 20605 6cca1a61 LeaveCriticalSection 20602->20605 20604 6cc9f143 20604->20482 20605->20604 20607 6cc87352 __EH_prolog3_catch_GS 20606->20607 20608 6cc87381 ctype 20607->20608 20609 6cc87202 ctype 70 API calls 20607->20609 20612 6cc951c4 20608->20612 20609->20608 20613 6cc93f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20612->20613 20614 6cc951ce 20613->20614 20614->20614 20615 6cca72b3 20618 6cc88495 20615->20618 20619 6cc8aef1 ctype 31 API calls 20618->20619 20620 6cc884a0 20619->20620 20621 6cc8c220 ctype 7 API calls 20620->20621 20622 6cc884a9 20621->20622 20623 6cc8bbbf ctype 2 API calls 20622->20623 20624 6cc884b4 20623->20624 20625 6cc8c292 ctype 3 API calls 20624->20625 20626 6cc884bb 20625->20626

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 25 6cc863f0-6cc863f8 26 6cc8649c-6cc864c1 25->26 27 6cc863fe-6cc8640f 25->27 28 6cc864c3 26->28 29 6cc86524 26->29 30 6cc86413-6cc8641e 27->30 31 6cc864c5-6cc864cb 28->31 34 6cc86526-6cc86551 29->34 32 6cc86420 30->32 33 6cc86481 30->33 31->31 38 6cc864cd-6cc864cf 31->38 39 6cc86422-6cc86427 32->39 35 6cc86483-6cc86487 33->35 36 6cc865f1 34->36 37 6cc86557-6cc86568 34->37 41 6cc8671b-6cc8671e 35->41 42 6cc8648d-6cc86492 35->42 40 6cc865f3-6cc86661 LoadLibraryA VirtualProtect call 6cc867f8 VirtualProtect 36->40 43 6cc8656c-6cc86577 37->43 38->29 44 6cc864d1-6cc864d7 38->44 39->39 45 6cc86429-6cc8642b 39->45 60 6cc86682-6cc866a9 40->60 61 6cc86663 40->61 42->30 47 6cc86498 42->47 48 6cc86579 43->48 49 6cc865da 43->49 50 6cc864dd-6cc864e6 44->50 51 6cc866f0 44->51 45->33 52 6cc8642d-6cc86433 45->52 47->26 54 6cc8657b-6cc86580 48->54 55 6cc865dc-6cc865e0 49->55 56 6cc864ea-6cc86501 50->56 57 6cc86439-6cc86443 52->57 58 6cc866e6 52->58 54->54 62 6cc86582-6cc86584 54->62 64 6cc86704-6cc86716 55->64 65 6cc865e6-6cc865eb 55->65 56->56 59 6cc86503-6cc86513 56->59 63 6cc86447-6cc8645e 57->63 67 6cc866fa 58->67 59->34 66 6cc86515-6cc86522 59->66 68 6cc86667-6cc86680 61->68 62->49 69 6cc86586-6cc8658c 62->69 63->63 70 6cc86460-6cc86471 63->70 64->40 65->36 65->43 66->34 67->64 68->60 68->68 69->67 72 6cc86592-6cc8659c 69->72 70->35 73 6cc86473-6cc8647f 70->73 74 6cc865a0-6cc865b7 72->74 73->35 74->74 75 6cc865b9-6cc865ca 74->75 75->55 76 6cc865cc-6cc865d8 75->76 76->55
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6CC86602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6CC8663B
                              • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6CC86654
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ProtectVirtual$LibraryLoad
                              • String ID:
                              • API String ID: 895956442-0
                              • Opcode ID: 022c86efc9e4b61c5089885ec19a68f7057a8831831274c9067a319cf350a39b
                              • Instruction ID: bb605f7a66ae4c177bd7781fc56165d73ce3324bc8f11d0dcb51061565b7a3a4
                              • Opcode Fuzzy Hash: 022c86efc9e4b61c5089885ec19a68f7057a8831831274c9067a319cf350a39b
                              • Instruction Fuzzy Hash: 73A1DC31609B568FC315CF29C88062BFBE2BFC9308F19896DE89597746E731E941CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 105 6cc85ca0-6cc85d95 call 6cc8af9c * 2 call 6cc8afc3 * 2 call 6cc864e0 GetPEB 116 6cc85de4 105->116 117 6cc85d97 105->117 118 6cc85de6-6cc85e1d 116->118 119 6cc85d99-6cc85da3 117->119 120 6cc85eba-6cc85f0c GlobalAlloc 118->120 121 6cc85e23-6cc85e3c 118->121 122 6cc85da5-6cc85dab 119->122 123 6cc85dd6-6cc85dd8 119->123 128 6cc85fad 120->128 129 6cc85f12-6cc85f2b 120->129 126 6cc85e40-6cc85e4e 121->126 127 6cc85dae-6cc85db5 122->127 124 6cc85dde-6cc85de2 123->124 125 6cc867e1-6cc867e4 123->125 124->116 124->119 125->118 130 6cc85e50 126->130 131 6cc85ea3 126->131 133 6cc85dc1-6cc85dcd 127->133 134 6cc85db7-6cc85dbd 127->134 132 6cc85faf-6cc85fce 128->132 135 6cc85f2f-6cc85f3d 129->135 137 6cc85e52-6cc85e58 130->137 136 6cc85ea5-6cc85ea9 131->136 154 6cc85fd0 132->154 155 6cc85fe7-6cc85fea 132->155 133->127 141 6cc85dcf-6cc85dd3 133->141 134->133 138 6cc85dbf 134->138 139 6cc85f3f 135->139 140 6cc85f92 135->140 143 6cc85eaf-6cc85eb4 136->143 144 6cc867c3-6cc867dc 136->144 137->137 145 6cc85e5a-6cc85e5c 137->145 138->133 147 6cc85f41-6cc85f47 139->147 142 6cc85f94-6cc85f98 140->142 141->123 151 6cc85f9e-6cc85fa3 142->151 152 6cc867a5-6cc867be 142->152 143->126 150 6cc85eb6 143->150 145->131 153 6cc85e5e-6cc85e64 145->153 147->147 148 6cc85f49-6cc85f4b 147->148 148->140 158 6cc85f4d-6cc85f53 148->158 150->120 151->135 159 6cc85fa5-6cc85fa9 151->159 152->132 160 6cc866aa-6cc866af 153->160 161 6cc85e6a-6cc85e6e 153->161 162 6cc85fd2-6cc85fe5 154->162 156 6cc85fec 155->156 157 6cc85ffe-6cc86038 155->157 163 6cc85fee-6cc85ffc 156->163 166 6cc860d9 157->166 167 6cc8603e-6cc86057 157->167 164 6cc85f59-6cc85f5d 158->164 165 6cc866b4 158->165 159->128 160->136 170 6cc85e97-6cc85ea1 160->170 161->120 162->155 162->162 163->157 163->163 171 6cc85f5f-6cc85f75 164->171 177 6cc866be 165->177 169 6cc860db-6cc86139 CreateFileW 166->169 172 6cc8605b-6cc86069 167->172 178 6cc861de-6cc86780 169->178 179 6cc8613f-6cc8615c 169->179 170->136 171->171 174 6cc85f77-6cc85f84 171->174 175 6cc8606b 172->175 176 6cc860be 172->176 174->142 180 6cc85f86-6cc85f90 174->180 181 6cc8606d-6cc86073 175->181 182 6cc860c0-6cc860c4 176->182 185 6cc86788-6cc867a0 177->185 179->125 180->142 181->181 184 6cc86075-6cc86077 181->184 182->185 186 6cc860ca-6cc860cf 182->186 184->176 187 6cc86079-6cc8607f 184->187 185->169 186->172 189 6cc860d1-6cc860d5 186->189 187->177 190 6cc86085-6cc86089 187->190 189->166 192 6cc8608b-6cc860a1 190->192 192->192 194 6cc860a3-6cc860b0 192->194 194->182 196 6cc860b2-6cc860bc 194->196 196->182
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoad_memset
                              • String ID:
                              • API String ID: 2997193564-0
                              • Opcode ID: 7a778e247d2c852cedac3806965fa8aa0bd16e7844337abd5d47c5537c882089
                              • Instruction ID: 3edda75ec5ffdfd0c77493bdcacedeeeb5e772a1828b32ad26bb9b0f24541f45
                              • Opcode Fuzzy Hash: 7a778e247d2c852cedac3806965fa8aa0bd16e7844337abd5d47c5537c882089
                              • Instruction Fuzzy Hash: 6CE167B0A097068FC714CF5AC48062BFBF5BF88308F55892DE89A87751E770E855CB95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 355 6cc85e70-6cc85e86 355->355 356 6cc85e88-6cc85e8c 355->356 357 6cc85e90-6cc85e95 356->357 358 6cc85ea5-6cc85ea9 357->358 359 6cc85e97-6cc85ea1 357->359 360 6cc85eaf-6cc85eb4 358->360 361 6cc867c3-6cc867dc 358->361 359->358 363 6cc85e40-6cc85e4e 360->363 364 6cc85eb6 360->364 365 6cc85e50 363->365 366 6cc85ea3 363->366 367 6cc85eba-6cc85f0c GlobalAlloc 364->367 368 6cc85e52-6cc85e58 365->368 366->358 369 6cc85fad 367->369 370 6cc85f12-6cc85f2b 367->370 368->368 371 6cc85e5a-6cc85e5c 368->371 372 6cc85faf-6cc85fce 369->372 373 6cc85f2f-6cc85f3d 370->373 371->366 374 6cc85e5e-6cc85e64 371->374 385 6cc85fd0 372->385 386 6cc85fe7-6cc85fea 372->386 375 6cc85f3f 373->375 376 6cc85f92 373->376 378 6cc866aa-6cc866af 374->378 379 6cc85e6a-6cc85e6e 374->379 381 6cc85f41-6cc85f47 375->381 377 6cc85f94-6cc85f98 376->377 383 6cc85f9e-6cc85fa3 377->383 384 6cc867a5-6cc867be 377->384 378->357 379->367 381->381 382 6cc85f49-6cc85f4b 381->382 382->376 389 6cc85f4d-6cc85f53 382->389 383->373 390 6cc85fa5-6cc85fa9 383->390 384->372 391 6cc85fd2-6cc85fe5 385->391 387 6cc85fec 386->387 388 6cc85ffe-6cc86038 386->388 392 6cc85fee-6cc85ffc 387->392 395 6cc860d9 388->395 396 6cc8603e-6cc86057 388->396 393 6cc85f59-6cc85f5d 389->393 394 6cc866b4 389->394 390->369 391->386 391->391 392->388 392->392 398 6cc85f5f-6cc85f75 393->398 404 6cc866be 394->404 397 6cc860db-6cc86139 CreateFileW 395->397 399 6cc8605b-6cc86069 396->399 405 6cc861de-6cc86780 397->405 406 6cc8613f-6cc867e4 397->406 398->398 401 6cc85f77-6cc85f84 398->401 402 6cc8606b 399->402 403 6cc860be 399->403 401->377 407 6cc85f86-6cc85f90 401->407 408 6cc8606d-6cc86073 402->408 409 6cc860c0-6cc860c4 403->409 412 6cc86788-6cc867a0 404->412 406->367 421 6cc85e23-6cc85e3c 406->421 407->377 408->408 411 6cc86075-6cc86077 408->411 409->412 413 6cc860ca-6cc860cf 409->413 411->403 415 6cc86079-6cc8607f 411->415 412->397 413->399 417 6cc860d1-6cc860d5 413->417 415->404 419 6cc86085-6cc86089 415->419 417->395 422 6cc8608b-6cc860a1 419->422 421->363 422->422 424 6cc860a3-6cc860b0 422->424 424->409 426 6cc860b2-6cc860bc 424->426 426->409
                              APIs
                              • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6CC85ECA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 5223b06925a14f693ffc34b6b1dd8109b11025c9336ea1af97f8a96fd8a022b0
                              • Instruction ID: 49659ecf52b173314569e4d74ac83e46ce67d2189f674a98c1fddb958497d585
                              • Opcode Fuzzy Hash: 5223b06925a14f693ffc34b6b1dd8109b11025c9336ea1af97f8a96fd8a022b0
                              • Instruction Fuzzy Hash: F3A1BE706097068FD708CF29C49062BBBF2BF89308F14852DE89687356E770E852CB95

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(6CCB32EC,?,?,?,6CCB32D0,6CCB32D0,?,6CC8C0A4,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8BC61
                              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,6CCB32D0,6CCB32D0,?,6CC8C0A4,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8BCB7
                              • GlobalHandle.KERNEL32(00E3A068), ref: 6CC8BCC0
                              • GlobalUnlock.KERNEL32(00000000), ref: 6CC8BCCA
                              • GlobalReAlloc.KERNEL32(6CCAC168,00000000,00002002), ref: 6CC8BCE3
                              • GlobalHandle.KERNEL32(00E3A068), ref: 6CC8BCF5
                              • GlobalLock.KERNEL32(00000000), ref: 6CC8BCFC
                              • LeaveCriticalSection.KERNEL32(?,?,?,6CCB32D0,6CCB32D0,?,6CC8C0A4,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8BD05
                              • GlobalLock.KERNEL32(00000000), ref: 6CC8BD11
                              • _memset.LIBCMT ref: 6CC8BD2B
                              • LeaveCriticalSection.KERNEL32(?,?), ref: 6CC8BD59
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                              • String ID:
                              • API String ID: 496899490-0
                              • Opcode ID: 16aa60baebc62cfbe2b4c06157503d1dea75819049362a1dff3047c85be55373
                              • Instruction ID: ef54a676f88a8b98fe9f3951c109beaafe763db11c11aac648675396cb0253c7
                              • Opcode Fuzzy Hash: 16aa60baebc62cfbe2b4c06157503d1dea75819049362a1dff3047c85be55373
                              • Instruction Fuzzy Hash: C031B271A01744AFDB208FA4CC4DE5FBBF9FF44309B14496AE656D7A50EB30E8448B90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 77 6cc864e0-6cc864e8 78 6cc864ea-6cc86501 77->78 78->78 79 6cc86503-6cc86513 78->79 80 6cc86515-6cc86522 79->80 81 6cc86526-6cc86551 79->81 80->81 82 6cc865f1 81->82 83 6cc86557-6cc86568 81->83 84 6cc865f3-6cc86661 LoadLibraryA VirtualProtect call 6cc867f8 VirtualProtect 82->84 85 6cc8656c-6cc86577 83->85 92 6cc86682-6cc866a9 84->92 93 6cc86663 84->93 87 6cc86579 85->87 88 6cc865da 85->88 90 6cc8657b-6cc86580 87->90 91 6cc865dc-6cc865e0 88->91 90->90 94 6cc86582-6cc86584 90->94 95 6cc86704-6cc86716 91->95 96 6cc865e6-6cc865eb 91->96 97 6cc86667-6cc86680 93->97 94->88 98 6cc86586-6cc8658c 94->98 95->84 96->82 96->85 97->92 97->97 100 6cc866fa 98->100 101 6cc86592-6cc8659c 98->101 100->95 102 6cc865a0-6cc865b7 101->102 102->102 103 6cc865b9-6cc865ca 102->103 103->91 104 6cc865cc-6cc865d8 103->104 104->91
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6CC86602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6CC8663B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoadProtectVirtual
                              • String ID:
                              • API String ID: 3279857687-0
                              • Opcode ID: dcc6f817535b11e61b601f9286e0792e74e54a8693b99319e6a4c700245cb1fb
                              • Instruction ID: b9f63e28e938707487a76f938606bd9258de213334adeb04823e09c714395cd6
                              • Opcode Fuzzy Hash: dcc6f817535b11e61b601f9286e0792e74e54a8693b99319e6a4c700245cb1fb
                              • Instruction Fuzzy Hash: DC5110316097558FC710CF28C88062BFBF6BFC9308F19896DE88587356E631E906CB85

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 197 6cc86750-6cc86762 ReadFile 199 6cc8630a-6cc86323 197->199 200 6cc861f0-6cc86207 197->200 201 6cc8634d-6cc86368 199->201 202 6cc86325-6cc86329 199->202 203 6cc8636a 201->203 204 6cc863cb 201->204 206 6cc86738 202->206 207 6cc8632f 202->207 208 6cc8636c-6cc86372 203->208 209 6cc863cd-6cc863ee 204->209 206->197 210 6cc86331-6cc8633c 207->210 208->208 211 6cc86374-6cc86376 208->211 212 6cc866dc 209->212 210->210 213 6cc8633e-6cc86347 210->213 211->204 214 6cc86378-6cc8637e 211->214 212->206 213->201 215 6cc86349 213->215 214->212 216 6cc86384-6cc8638d 214->216 215->201 217 6cc86391-6cc863a8 216->217 217->217 218 6cc863aa-6cc863ba 217->218 218->209 219 6cc863bc-6cc863c9 218->219 219->209
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6CCAC168), ref: 6CC86300
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 4085b330d581c379e13af0e5fd3b8aa482a6f546bb550483511ceadd6e3399c6
                              • Instruction ID: d28bcdf14701bfacf2f476a43c74a83f4c078f3f6fe56fde13a362f1c9b6c5a3
                              • Opcode Fuzzy Hash: 4085b330d581c379e13af0e5fd3b8aa482a6f546bb550483511ceadd6e3399c6
                              • Instruction Fuzzy Hash: 1941BF31A0AB058FC714CF19C88066BBBF6FBC5318F19896CE889D7716E631F8558B81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 220 6cc862d0-6cc862d5 221 6cc862db-6cc862e0 220->221 222 6cc86742-6cc8674e 220->222 223 6cc8626d-6cc8627b 221->223 224 6cc862e2-6cc862f1 221->224 226 6cc8627d 223->226 227 6cc862cf 223->227 229 6cc862f3-6cc86304 ReadFile 224->229 230 6cc8627f-6cc86284 226->230 228 6cc862d1-6cc862d5 227->228 228->221 228->222 232 6cc8630a-6cc86323 229->232 233 6cc861f0-6cc86207 229->233 230->230 231 6cc86286-6cc86288 230->231 231->227 234 6cc8628a-6cc86290 231->234 235 6cc8634d-6cc86368 232->235 236 6cc86325-6cc86329 232->236 239 6cc866d2 234->239 240 6cc86296-6cc8629a 234->240 237 6cc8636a 235->237 238 6cc863cb 235->238 242 6cc86738-6cc86762 236->242 243 6cc8632f 236->243 244 6cc8636c-6cc86372 237->244 246 6cc863cd-6cc863ee 238->246 239->222 245 6cc8629c-6cc862b2 240->245 242->229 247 6cc86331-6cc8633c 243->247 244->244 248 6cc86374-6cc86376 244->248 245->245 249 6cc862b4-6cc862c1 245->249 250 6cc866dc 246->250 247->247 251 6cc8633e-6cc86347 247->251 248->238 253 6cc86378-6cc8637e 248->253 249->228 254 6cc862c3-6cc862cd 249->254 250->242 251->235 255 6cc86349 251->255 253->250 256 6cc86384-6cc8638d 253->256 254->228 255->235 257 6cc86391-6cc863a8 256->257 257->257 258 6cc863aa-6cc863ba 257->258 258->246 259 6cc863bc-6cc863c9 258->259 259->246
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6CCAC168), ref: 6CC86300
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: a157ee528788153a6790b00a7c0e947df397d8f38c69ba32e1c7448e350a0560
                              • Instruction ID: fb548d08418a3cdbb4a2d71f0019cee75bdda0ad7ffc94734c6c4b11731ec83d
                              • Opcode Fuzzy Hash: a157ee528788153a6790b00a7c0e947df397d8f38c69ba32e1c7448e350a0560
                              • Instruction Fuzzy Hash: DD31BF31A1AB058FC715CF19C88066BBBF2BFC4318F19896CE89697316E631F855CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 260 6cc8c050-6cc8c068 call 6cc950c9 263 6cc8c06a call 6cc86dc1 260->263 264 6cc8c06f-6cc8c072 260->264 263->264 266 6cc8c0aa-6cc8c0bb call 6cc8ba5b 264->266 267 6cc8c074-6cc8c07c 264->267 276 6cc8c0bd-6cc8c0cb call 6cc8be0d 266->276 277 6cc8c0d0-6cc8c0d7 call 6cc951a1 266->277 268 6cc8c07e-6cc8c09d call 6cc8bd66 267->268 269 6cc8c09f call 6cc8bc4e 267->269 268->263 268->269 275 6cc8c0a4-6cc8c0a8 269->275 275->263 275->266 276->277
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6CC8C057
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: H_prolog3$Exception@8Throw
                              • String ID:
                              • API String ID: 2489616738-0
                              • Opcode ID: 28f188d1e8c941115d27b4c1207b7f4fabe5507d2fe7a8146843beafd0387557
                              • Instruction ID: 899cfb29417020f3f3e8a999f4b6a6247a620eab421a1191142aa0b3340a35d8
                              • Opcode Fuzzy Hash: 28f188d1e8c941115d27b4c1207b7f4fabe5507d2fe7a8146843beafd0387557
                              • Instruction Fuzzy Hash: BA017130602A03CBDB19AFB5C82069F7AB1AB8139DF14862DD452C7B90FF31C946CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 282 6cc860f0-6cc86139 CreateFileW 283 6cc861de-6cc86780 282->283 284 6cc8613f-6cc867e4 282->284 290 6cc85eba-6cc85f0c GlobalAlloc 284->290 291 6cc85e23-6cc85e3c 284->291 294 6cc85fad 290->294 295 6cc85f12-6cc85f2b 290->295 293 6cc85e40-6cc85e4e 291->293 297 6cc85e50 293->297 298 6cc85ea3 293->298 299 6cc85faf-6cc85fce 294->299 300 6cc85f2f-6cc85f3d 295->300 302 6cc85e52-6cc85e58 297->302 301 6cc85ea5-6cc85ea9 298->301 317 6cc85fd0 299->317 318 6cc85fe7-6cc85fea 299->318 303 6cc85f3f 300->303 304 6cc85f92 300->304 306 6cc85eaf-6cc85eb4 301->306 307 6cc867c3-6cc867dc 301->307 302->302 308 6cc85e5a-6cc85e5c 302->308 310 6cc85f41-6cc85f47 303->310 305 6cc85f94-6cc85f98 304->305 314 6cc85f9e-6cc85fa3 305->314 315 6cc867a5-6cc867be 305->315 306->293 313 6cc85eb6 306->313 308->298 316 6cc85e5e-6cc85e64 308->316 310->310 311 6cc85f49-6cc85f4b 310->311 311->304 321 6cc85f4d-6cc85f53 311->321 313->290 314->300 322 6cc85fa5-6cc85fa9 314->322 315->299 323 6cc866aa-6cc866af 316->323 324 6cc85e6a-6cc85e6e 316->324 325 6cc85fd2-6cc85fe5 317->325 319 6cc85fec 318->319 320 6cc85ffe-6cc86038 318->320 326 6cc85fee-6cc85ffc 319->326 329 6cc860d9 320->329 330 6cc8603e-6cc86057 320->330 327 6cc85f59-6cc85f5d 321->327 328 6cc866b4 321->328 322->294 323->301 333 6cc85e97-6cc85ea1 323->333 324->290 325->318 325->325 326->320 326->326 334 6cc85f5f-6cc85f75 327->334 339 6cc866be 328->339 332 6cc860db-6cc860ef 329->332 335 6cc8605b-6cc86069 330->335 332->282 333->301 334->334 336 6cc85f77-6cc85f84 334->336 337 6cc8606b 335->337 338 6cc860be 335->338 336->305 340 6cc85f86-6cc85f90 336->340 341 6cc8606d-6cc86073 337->341 342 6cc860c0-6cc860c4 338->342 344 6cc86788-6cc867a0 339->344 340->305 341->341 343 6cc86075-6cc86077 341->343 342->344 345 6cc860ca-6cc860cf 342->345 343->338 346 6cc86079-6cc8607f 343->346 344->332 345->335 347 6cc860d1-6cc860d5 345->347 346->339 348 6cc86085-6cc86089 346->348 347->329 349 6cc8608b-6cc860a1 348->349 349->349 350 6cc860a3-6cc860b0 349->350 350->342 351 6cc860b2-6cc860bc 350->351 351->342
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6CC860F6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 44560c934a96525291fab0bc77122d41bf765f05b295d5faa0501a0cee3f2b37
                              • Instruction ID: 35c4fa2897f4bcd771e1b10d953c9067bfa98cb6c5190baeb95f530f63e013d9
                              • Opcode Fuzzy Hash: 44560c934a96525291fab0bc77122d41bf765f05b295d5faa0501a0cee3f2b37
                              • Instruction Fuzzy Hash: B501E8B1A087019FC718CF4EC89090ABBF6FFC8308F16852DA84897316D630E851CF89

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 352 6cc9a6f4-6cc9a716 HeapCreate 353 6cc9a718-6cc9a719 352->353 354 6cc9a71a-6cc9a723 352->354
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6CC94776,00000001,?,?,?,6CC948EF,?,?,?,6CCAE848,0000000C,6CC949AA), ref: 6CC9A709
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 700f95b89151f49afe9c6ac744b96a4f1f2162ffcd64eee86b73efebefb76563
                              • Instruction ID: 121c3ae5ae1982bb414a31bd2289efaffa4a4cd1293d1d5efc342065dca92819
                              • Opcode Fuzzy Hash: 700f95b89151f49afe9c6ac744b96a4f1f2162ffcd64eee86b73efebefb76563
                              • Instruction Fuzzy Hash: 03D05E76B543859ADB009EB2AC09B673BFC9385796F148436F80CC7580F570C590DA08
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6CC87498
                              • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6CC876D5,?,00000000,?,00000000,00000104,00000000,?,6CCABEF4,00000000), ref: 6CC874D6
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6CC87546
                              • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6CC8756D
                              • CharUpperW.USER32(00000000), ref: 6CC875A0
                              • FindFirstFileW.KERNEL32(?,?), ref: 6CC875BC
                              • FindClose.KERNEL32(00000000), ref: 6CC875C8
                              • lstrlenW.KERNEL32(?), ref: 6CC875E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                              • String ID:
                              • API String ID: 624941980-0
                              • Opcode ID: a54a6eb218543f1a996458eee6a3895bafafc6ee010ea6da93e5e3325a198c66
                              • Instruction ID: 64f5b4a3b92f3cd5b416734e12f20c998d1a6438dd7dfcbd398b834d22d74c79
                              • Opcode Fuzzy Hash: a54a6eb218543f1a996458eee6a3895bafafc6ee010ea6da93e5e3325a198c66
                              • Instruction Fuzzy Hash: B8419F70A066159BDF159BA4CC9CBEF7E78AF0131CF140399B81992991FB358A88DF20
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 6CC97C6C
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CC97C81
                              • UnhandledExceptionFilter.KERNEL32(6CCAA4B8), ref: 6CC97C8C
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 6CC97CA8
                              • TerminateProcess.KERNEL32(00000000), ref: 6CC97CAF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: f86bdf4831beff3318b1a68f03d9a8ac644f9e29bfdb6042cc61a1a137543f64
                              • Instruction ID: 4c2e6fc2bc1bda25b36034e2aff73e1e849b77eee354273227ad223ed281123e
                              • Opcode Fuzzy Hash: f86bdf4831beff3318b1a68f03d9a8ac644f9e29bfdb6042cc61a1a137543f64
                              • Instruction Fuzzy Hash: 1721F3B9A03B05DFDF81DFE9D449A493BB4FB0A304F50411AE4089B750E7709585CF4A
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6CC889FC
                              • __snwprintf_s.LIBCMT ref: 6CC88A2E
                              • LoadLibraryW.KERNEL32(?), ref: 6CC88A69
                                • Part of subcall function 6CC95348: __getptd_noexit.LIBCMT ref: 6CC95348
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                              • String ID: LOC
                              • API String ID: 3175857669-519433814
                              • Opcode ID: afad129d8913dfde9679c0689c2f38b67977e475c4f7f7e7ffd90a4c3f75576c
                              • Instruction ID: d9910ab6b7f9e6c5d6f61276b84d9169cba14d6a854904b32bae12549073d7cb
                              • Opcode Fuzzy Hash: afad129d8913dfde9679c0689c2f38b67977e475c4f7f7e7ffd90a4c3f75576c
                              • Instruction Fuzzy Hash: 2211DA71A41308ABDB10ABA4CC48FEF7BBCBB0235DF100666A114E79C0FB749948D761
                              APIs
                                • Part of subcall function 6CC92C57: GetWindowLongW.USER32(?,000000F0), ref: 6CC92C62
                              • GetKeyState.USER32(00000010), ref: 6CC90514
                              • GetKeyState.USER32(00000011), ref: 6CC9051D
                              • GetKeyState.USER32(00000012), ref: 6CC90526
                              • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6CC9053C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: State$LongMessageSendWindow
                              • String ID:
                              • API String ID: 1063413437-0
                              • Opcode ID: 4a141e7e9e77caedf541458991b5c2cc5e55811592f1ea8358f2d3cd5deb4373
                              • Instruction ID: ca5d26576b2b730db59775574af476e987d7cac4abfb360113db078ad1b1495e
                              • Opcode Fuzzy Hash: 4a141e7e9e77caedf541458991b5c2cc5e55811592f1ea8358f2d3cd5deb4373
                              • Instruction Fuzzy Hash: 56F02E357423CFA6FA1021B54C05FFD19365F89FD8F0000316645EB9E0EFA0C8466574
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f2e96e3173c8766d23888731ef280116773cc7eb4125694070aeb27c4401a57
                              • Instruction ID: 1d9b83d743fc5fb33efb33edf76a85590d1503880e07dfe27a8db75ab6452173
                              • Opcode Fuzzy Hash: 4f2e96e3173c8766d23888731ef280116773cc7eb4125694070aeb27c4401a57
                              • Instruction Fuzzy Hash: 6BF0193164324ABBDF029FA5C808A9F7F79BB1234DF408022F929D5410EB30DA54DB60
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 369e71457e2037c2055dde8a5669f1ed74740de1c581bed3f97036c0d9e125b2
                              • Instruction ID: 4d3792afeb0b23d1b433a625972f3485241c6085592560e88f30bda9bd2f7614
                              • Opcode Fuzzy Hash: 369e71457e2037c2055dde8a5669f1ed74740de1c581bed3f97036c0d9e125b2
                              • Instruction Fuzzy Hash: B331A876A0A3058BDB24CF49C58062BBBF2FBC8708F56886DDC8957701EB70E841CB91
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6CC88BE9
                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6CC88EB7,?,?), ref: 6CC88C19
                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6CC88C2D
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6CC88C69
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6CC88C77
                              • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6CC88C94
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6CC88CBF
                              • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6CC88CC8
                              • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6CC88CE1
                              • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6CC88CFE
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6CC88D31
                              • ConvertDefaultLocale.KERNEL32(00000000), ref: 6CC88D3A
                              • GetModuleFileNameW.KERNEL32(6CC80000,?,00000105), ref: 6CC88D7F
                              • _memset.LIBCMT ref: 6CC88D9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                              • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                              • API String ID: 3537336938-2299501126
                              • Opcode ID: 177d14b5b98ea0355a26e5eadb01e39b491163190ae0339e3b79df15dd5fae51
                              • Instruction ID: 78a7bd42eb955ec520c3616a5ed9bfb276236eb27f27e7fe9b53a99ad7b5ce5e
                              • Opcode Fuzzy Hash: 177d14b5b98ea0355a26e5eadb01e39b491163190ae0339e3b79df15dd5fae51
                              • Instruction Fuzzy Hash: 2E513F75D02229ABCB60DFA59C8CBAEBAB4EB58308F1001D79448E7680E7749E81CF54
                              APIs
                              • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75C04A40,6CC8DE36,?,?,?,?,?,?,?,6CC8FCC6,00000000,00000002,00000028), ref: 6CC8DCF9
                              • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6CC8DD15
                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6CC8DD2A
                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6CC8DD3B
                              • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6CC8DD4C
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6CC8DD5D
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6CC8DD6E
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6CC8DD8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                              • API String ID: 667068680-2451437823
                              • Opcode ID: 71150c67525566b3aca692cc8d60c7c4c040b728c2d21b19ee41786b3d08ace4
                              • Instruction ID: 07552cbd4adce126e1fe28f4d835e9a7761f9baaebf023d60f528e85d45db96c
                              • Opcode Fuzzy Hash: 71150c67525566b3aca692cc8d60c7c4c040b728c2d21b19ee41786b3d08ace4
                              • Instruction Fuzzy Hash: AE211A71A1A163AFCF02EFEA88C942B7FF4B68B659321897FD105D3904E37140828B24
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6CC919B8
                                • Part of subcall function 6CC8C050: __EH_prolog3.LIBCMT ref: 6CC8C057
                              • CallNextHookEx.USER32(?,?,?,?), ref: 6CC919F8
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              • _memset.LIBCMT ref: 6CC91A51
                              • GetClassLongW.USER32(?,000000E0), ref: 6CC91A85
                              • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6CC91ADA
                              • GetClassNameW.USER32(?,?,00000100), ref: 6CC91B20
                              • GetWindowLongW.USER32(?,000000FC), ref: 6CC91B46
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6CC91B5D
                              • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6CC91B6F
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6CC91B77
                              • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6CC91B86
                              • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6CC91B94
                              • CallNextHookEx.USER32(?,00000003,?,?), ref: 6CC91BA6
                              • UnhookWindowsHookEx.USER32(?), ref: 6CC91BBA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                              • String ID: #32768$AfxOldWndProc423
                              • API String ID: 4265692241-2141921550
                              • Opcode ID: 244a3e1ae7e0b1154b915765b5df46cbae7c6b24b087718e6739ceec6c413f2d
                              • Instruction ID: 75e8ef080db4b111e04ff6e26c71e465f6ff9052f66bdd77aa010089df6b5587
                              • Opcode Fuzzy Hash: 244a3e1ae7e0b1154b915765b5df46cbae7c6b24b087718e6739ceec6c413f2d
                              • Instruction Fuzzy Hash: 1951B675541225ABCB11AB65CC4DFDE7BB9BF05359F100285F419E7A90FB34CA81CBA0
                              APIs
                                • Part of subcall function 6CC92C57: GetWindowLongW.USER32(?,000000F0), ref: 6CC92C62
                              • GetParent.USER32(?), ref: 6CC8FC05
                              • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6CC8FC28
                              • GetWindowRect.USER32(?,?), ref: 6CC8FC42
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6CC8FC58
                              • CopyRect.USER32(?,?), ref: 6CC8FCA5
                              • CopyRect.USER32(?,?), ref: 6CC8FCAF
                              • GetWindowRect.USER32(00000000,?), ref: 6CC8FCB8
                                • Part of subcall function 6CC8DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6CC8DED6
                              • CopyRect.USER32(?,?), ref: 6CC8FCD4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                              • String ID: (
                              • API String ID: 1385303425-3887548279
                              • Opcode ID: 1b4fcc808f835d3131fe30488b8014338992c1f0e20b4bfdba47911ae015867e
                              • Instruction ID: 1617638af14843fc0096d5aea7c8eabdddebf7e5947d282477503c2ef4e7c029
                              • Opcode Fuzzy Hash: 1b4fcc808f835d3131fe30488b8014338992c1f0e20b4bfdba47911ae015867e
                              • Instruction Fuzzy Hash: 90514072A02519AFDB10CFA8CD88EEFBBB9BF48358F154116E915F3640E730E9458B60
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6CCAE928,0000000C,6CC9A25A,00000000,00000000,?,6CC86905,6CCAC168,?,?,6CC93DB8,6CCAC168,?,?,?), ref: 6CC9A131
                              • __crt_waiting_on_module_handle.LIBCMT ref: 6CC9A13C
                                • Part of subcall function 6CC95BCF: Sleep.KERNEL32(000003E8,6CCAC168,?,6CC9A082,KERNEL32.DLL,?,6CC9C09E,?,6CC94AB7,6CCAC168,?,?,6CC86905,6CCAC168,?), ref: 6CC95BDB
                                • Part of subcall function 6CC95BCF: GetModuleHandleW.KERNEL32(6CCAC168,?,6CC9A082,KERNEL32.DLL,?,6CC9C09E,?,6CC94AB7,6CCAC168,?,?,6CC86905,6CCAC168,?,?,6CC93DB8), ref: 6CC95BE4
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6CC9A165
                              • GetProcAddress.KERNEL32(00000003,DecodePointer), ref: 6CC9A175
                              • __lock.LIBCMT ref: 6CC9A197
                              • InterlockedIncrement.KERNEL32(6CCAD544), ref: 6CC9A1A4
                              • __lock.LIBCMT ref: 6CC9A1B8
                              • ___addlocaleref.LIBCMT ref: 6CC9A1D6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 1028249917-2843748187
                              • Opcode ID: bcba46142e33cd0b0dde0f3e4e3f24f29f10e7df5e74d0e073726c7f07e4874d
                              • Instruction ID: 307134edad2864527354a7758a30f915bb1910e9b699268a37fd9fc5d0be3d36
                              • Opcode Fuzzy Hash: bcba46142e33cd0b0dde0f3e4e3f24f29f10e7df5e74d0e073726c7f07e4874d
                              • Instruction Fuzzy Hash: 70118E71900702DFD7208FB9C808B9ABBF0AF85318F108919E49AD3F90EB349A45CF54
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6CC88503
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6CC88520
                              • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6CC8852D
                              • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6CC8853A
                              • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6CC88547
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 667068680-2424895508
                              • Opcode ID: 8c9638e248e532642d5e201b8daa25b99a80c296206b13c84c4a2ac2b8a0acd4
                              • Instruction ID: 08742cd2cd9050722fdc2deaabb3fed63d7f9650a59b96798f0f6738d22ad6ad
                              • Opcode Fuzzy Hash: 8c9638e248e532642d5e201b8daa25b99a80c296206b13c84c4a2ac2b8a0acd4
                              • Instruction Fuzzy Hash: 2B1128B1A06692AFDF109FE6988DC07BFB4EA4631C31D453FE10593A41FA305441CA1A
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32,6CC8A6B6), ref: 6CC8A5AA
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6CC8A5CB
                              • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6CC8A5DD
                              • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6CC8A5EF
                              • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6CC8A601
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 417325364-2424895508
                              • Opcode ID: 4f99f56e13ad3dee668b87bcf286bd0c32f014169a58252065465239db622ad9
                              • Instruction ID: 5060a682f56e08fc9ca826637cc7b4187fbc6ac01b9630dc7315ec55f200570f
                              • Opcode Fuzzy Hash: 4f99f56e13ad3dee668b87bcf286bd0c32f014169a58252065465239db622ad9
                              • Instruction Fuzzy Hash: C9F07474A06A67ABCF415BF298089467EB8A706358709491BA900A3752FB7480498F4A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                              • String ID: .CHM$.HLP$.INI
                              • API String ID: 2477486372-4017452060
                              • Opcode ID: 9d0be604d9a05b5e12ee9fdec4905a051ecea1a24c79d771e0a47e0b5c72b692
                              • Instruction ID: 5a4cab01d0a3f644a257caf260652f72c640e76da0b7de763e5d93f2c78dc6b1
                              • Opcode Fuzzy Hash: 9d0be604d9a05b5e12ee9fdec4905a051ecea1a24c79d771e0a47e0b5c72b692
                              • Instruction Fuzzy Hash: EF4180B19027199BDB10EB75C844ADB7BFCAF4431CF140AEA9556D7A40FB31E988CB60
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6CC91868
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6CC91877
                              • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6CC918D1
                                • Part of subcall function 6CC90C2C: GetWindowRect.USER32(?,10000000), ref: 6CC90C56
                              • SetWindowLongW.USER32(?,000000FC,?), ref: 6CC918F8
                              • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6CC91900
                              • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6CC91907
                              • GlobalDeleteAtom.KERNEL32(?), ref: 6CC91911
                              • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6CC91965
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                              • String ID: AfxOldWndProc423
                              • API String ID: 2109165785-1060338832
                              • Opcode ID: a0295e89808487eb542f8a45a23c9ffd1fca8de703f17304b1a21605cc385bbe
                              • Instruction ID: 581203f1a1daa1d3976c559153d22c46db99dc2ddd25d2c306ee68d175687f7a
                              • Opcode Fuzzy Hash: a0295e89808487eb542f8a45a23c9ffd1fca8de703f17304b1a21605cc385bbe
                              • Instruction Fuzzy Hash: C6317C3290115AABCF019FE9DD4EDFF7ABCBF0A315F000115FA01A6950E735C925ABA1
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6CC81BE9,?,?,?,?), ref: 6CC81C39
                              • GetLastError.KERNEL32(?,?,?,?,?,6CC81BE9,?,?,?,?), ref: 6CC81C48
                              • __aullrem.LIBCMT ref: 6CC81C60
                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6CC81CE8
                              • _memset.LIBCMT ref: 6CC81CF5
                              • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6CC81BE9,?,?,?,?), ref: 6CC81D07
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                              • String ID:
                              • API String ID: 123228641-0
                              • Opcode ID: 9dd8c3bf5a38f52cd3b32db020dbbfa1010f046d580b839f73f1c91a4f62feb1
                              • Instruction ID: d10ce3b47e8610407d0063c673c25ef6c5ba02a7863e81d8da1349ce52270402
                              • Opcode Fuzzy Hash: 9dd8c3bf5a38f52cd3b32db020dbbfa1010f046d580b839f73f1c91a4f62feb1
                              • Instruction Fuzzy Hash: 5B515171A05311AFD740DF6DD844B9BBBF8FB88758F044A1AF968D7241E770E9048BA2
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6CC8BE14
                              • EnterCriticalSection.KERNEL32(?,00000010,6CC8C0D0,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BE25
                              • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BE43
                              • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8BE77
                              • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BEE3
                              • _memset.LIBCMT ref: 6CC8BF02
                              • TlsSetValue.KERNEL32(?,00000000,?), ref: 6CC8BF13
                              • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BF34
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                              • String ID:
                              • API String ID: 1891723912-0
                              • Opcode ID: 7216908efa2b44b21f6520523ac17d2c55e04ea796b762e34201dbad64ae90e6
                              • Instruction ID: c0768a19c3ae22b0b396786aee025d99e999df90721bed10a320b9290f26f972
                              • Opcode Fuzzy Hash: 7216908efa2b44b21f6520523ac17d2c55e04ea796b762e34201dbad64ae90e6
                              • Instruction Fuzzy Hash: EA31AD74502606AFDB109F94CC95C9BBBB1FF05318B20C62EE62A97E50EB30A954CF90
                              APIs
                                • Part of subcall function 6CC8815A: GetParent.USER32(?), ref: 6CC881AE
                                • Part of subcall function 6CC8815A: GetLastActivePopup.USER32(?), ref: 6CC881BF
                                • Part of subcall function 6CC8815A: IsWindowEnabled.USER32(?), ref: 6CC881D3
                                • Part of subcall function 6CC8815A: EnableWindow.USER32(?,00000000), ref: 6CC881E6
                              • EnableWindow.USER32(?,00000001), ref: 6CC88247
                              • GetWindowThreadProcessId.USER32(?,?), ref: 6CC8825B
                              • GetCurrentProcessId.KERNEL32(?,?), ref: 6CC88265
                              • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6CC8827D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6CC882F9
                              • EnableWindow.USER32(00000000,00000001), ref: 6CC88340
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                              • String ID: 0
                              • API String ID: 1877664794-4108050209
                              • Opcode ID: c48fc92d8d32d6a777e12cf55ee2c34e5b4f93b9b875c18323e3e41433c575c6
                              • Instruction ID: 94f0e89b5fd218f8ebf03d210c33dc7707537476782b73350f333e2470651576
                              • Opcode Fuzzy Hash: c48fc92d8d32d6a777e12cf55ee2c34e5b4f93b9b875c18323e3e41433c575c6
                              • Instruction Fuzzy Hash: 1A417271A4261D9BDB109F64CC88F9BBBB4FF05718F20059AE515E6A81E770DA808B90
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6CC8DED6
                              • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6CC8DF00
                              • GetSystemMetrics.USER32(00000000), ref: 6CC8DF17
                              • GetSystemMetrics.USER32(00000001), ref: 6CC8DF1E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6CC8DF49
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                              • String ID: B$DISPLAY
                              • API String ID: 381819527-3316187204
                              • Opcode ID: dec087d176ade68e1c5beb4b239a13db432dd93ef09022ef323130da2337af2e
                              • Instruction ID: 68b5235d4187191ea0031bbb94268f4d8e45b472a49521749958ba65159813ca
                              • Opcode Fuzzy Hash: dec087d176ade68e1c5beb4b239a13db432dd93ef09022ef323130da2337af2e
                              • Instruction Fuzzy Hash: 4021F571606222ABDF10DF58CC84B5B7FB8EF46769F114227FD189B581E6B0D840CBA1
                              APIs
                              • GlobalLock.KERNEL32(?), ref: 6CC888E7
                              • lstrcmpW.KERNEL32(00000000,?), ref: 6CC888F4
                              • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6CC88906
                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6CC88926
                              • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6CC8892E
                              • GlobalLock.KERNEL32(00000000), ref: 6CC88938
                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6CC88945
                              • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 6CC8895D
                                • Part of subcall function 6CC8DAD1: GlobalFlags.KERNEL32(?), ref: 6CC8DAE0
                                • Part of subcall function 6CC8DAD1: GlobalUnlock.KERNEL32(?), ref: 6CC8DAF2
                                • Part of subcall function 6CC8DAD1: GlobalFree.KERNEL32(?), ref: 6CC8DAFD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                              • String ID:
                              • API String ID: 168474834-0
                              • Opcode ID: cc08590fb536d13b6289345835021866df4b0ba124e34fa7fde0d5373e644c73
                              • Instruction ID: 5ca4cf8ca403786d8216583c8ed4fd5539aef167b989dbc33ea6b423fb50493d
                              • Opcode Fuzzy Hash: cc08590fb536d13b6289345835021866df4b0ba124e34fa7fde0d5373e644c73
                              • Instruction Fuzzy Hash: FF118C71901A05BBCF129BA5CC48CAF7EBDFB85B08B10841AFA05D2920EB35D951D720
                              APIs
                              • GetSystemMetrics.USER32(0000000B), ref: 6CC8CD75
                              • GetSystemMetrics.USER32(0000000C), ref: 6CC8CD7C
                              • GetSystemMetrics.USER32(00000002), ref: 6CC8CD83
                              • GetSystemMetrics.USER32(00000003), ref: 6CC8CD8D
                              • GetDC.USER32(00000000), ref: 6CC8CD97
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 6CC8CDA8
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6CC8CDB0
                              • ReleaseDC.USER32(00000000,00000000), ref: 6CC8CDB8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: MetricsSystem$CapsDevice$Release
                              • String ID:
                              • API String ID: 1151147025-0
                              • Opcode ID: a82cfe582ed146fb82d41cfad389de1030d99eff61483cb0c7ad7b07a3da93a2
                              • Instruction ID: 3c538427dbac5cccfdd4728a786bce804b4b8fdc72b29044a7b8c41f9496d6f7
                              • Opcode Fuzzy Hash: a82cfe582ed146fb82d41cfad389de1030d99eff61483cb0c7ad7b07a3da93a2
                              • Instruction Fuzzy Hash: D3F049B1F40714BBEB105BB28C4DF2A7F78EB42721F008517E6058B280CAB998118FD0
                              APIs
                              • _memset.LIBCMT ref: 6CC9029B
                              • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6CC902C4
                              • GetWindowLongW.USER32(?,000000FC), ref: 6CC902D6
                              • GetWindowLongW.USER32(?,000000FC), ref: 6CC902E7
                              • SetWindowLongW.USER32(?,000000FC,?), ref: 6CC90303
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend_memset
                              • String ID: ,
                              • API String ID: 2997958587-3772416878
                              • Opcode ID: bd010024a7ca7fa9f391732f18741c3bfe635fed6b211e8cf75706667c59fa02
                              • Instruction ID: 257e670eaccf6937491571cd61f4cd19ccc63161d5dece8d565940996002e186
                              • Opcode Fuzzy Hash: bd010024a7ca7fa9f391732f18741c3bfe635fed6b211e8cf75706667c59fa02
                              • Instruction Fuzzy Hash: DE31DE71602B509FDB109FB9C888A9EBBF4BF4C318F10062DE55697A91EB30E804CB51
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6CC8A20A
                              • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6CC8A2F0
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6CC8A30D
                              • RegCloseKey.ADVAPI32(?), ref: 6CC8A32D
                              • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6CC8A348
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseEnumH_prolog3_OpenQueryValue
                              • String ID: Software\
                              • API String ID: 1666054129-964853688
                              • Opcode ID: 6a648f7cbe6cf4eeb75b40da1100f6b5f2353926a9601972f262538ede7224f2
                              • Instruction ID: bdbfaebfe08546afa8518dbe0e68023493e657f4a44ff96634105ea89abf46c0
                              • Opcode Fuzzy Hash: 6a648f7cbe6cf4eeb75b40da1100f6b5f2353926a9601972f262538ede7224f2
                              • Instruction Fuzzy Hash: 5E415431902518ABCB21DBA5DC48EDFBBB9AF89318F1406D5E119D2690EB34DB85CF50
                              APIs
                              • __EH_prolog3_catch_GS.LIBCMT ref: 6CC8A08C
                              • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6CC8A11A
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6CC8A13D
                                • Part of subcall function 6CC8A02D: __EH_prolog3.LIBCMT ref: 6CC8A034
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: EnumH_prolog3H_prolog3_catch_Open
                              • String ID: Software\Classes\
                              • API String ID: 3518408925-1121929649
                              • Opcode ID: 553a89aa8530ea5ed3258fee8868904ab3a0dfef6bcc1fe6f6eb6183663b342f
                              • Instruction ID: 046e831e25e8d150cf868532650a97ae7839d10c23ec0e22ce9889a70c387434
                              • Opcode Fuzzy Hash: 553a89aa8530ea5ed3258fee8868904ab3a0dfef6bcc1fe6f6eb6183663b342f
                              • Instruction Fuzzy Hash: B9315231C02168EBCB219BE4DC48BDEBBB4AF49318F1402D5E959A3690EB308F84DF51
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6CC8D0AE
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6CC8D0D1
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6CC8D0ED
                              • RegCloseKey.ADVAPI32(?), ref: 6CC8D0FD
                              • RegCloseKey.ADVAPI32(?), ref: 6CC8D107
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseCreate$Open
                              • String ID: software
                              • API String ID: 1740278721-2010147023
                              • Opcode ID: f5c90e16490c57b01f640907020122569fb3856dddd7ca5ff59921fa9fb5b6e0
                              • Instruction ID: 5027998d26c02000ee54371143acf2793815e52eda01264bc616332124f8ac21
                              • Opcode Fuzzy Hash: f5c90e16490c57b01f640907020122569fb3856dddd7ca5ff59921fa9fb5b6e0
                              • Instruction Fuzzy Hash: 0C11E972D01159BBCB11DADACD88DDFBFBDEF85754B10406AA504A2111E7319A01DB60
                              APIs
                              • LeaveCriticalSection.KERNEL32(?), ref: 6CC8BEB5
                              • __CxxThrowException@8.LIBCMT ref: 6CC8BEBF
                                • Part of subcall function 6CC9527B: RaiseException.KERNEL32(?,00000003,000000FF,6CC8279F), ref: 6CC952BD
                              • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?), ref: 6CC8BED6
                              • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BEE3
                                • Part of subcall function 6CC86D89: __CxxThrowException@8.LIBCMT ref: 6CC86D9F
                              • _memset.LIBCMT ref: 6CC8BF02
                              • TlsSetValue.KERNEL32(?,00000000,?), ref: 6CC8BF13
                              • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BF34
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                              • String ID:
                              • API String ID: 356813703-0
                              • Opcode ID: 4c6932f24ec3ab3dccf83a15a5dabe846ed5aa115279c3da8f4f88d5758935d1
                              • Instruction ID: dea8e951e3cc98ce4e6574d0b575d9478dd4329122302fad0ad839141fe643fb
                              • Opcode Fuzzy Hash: 4c6932f24ec3ab3dccf83a15a5dabe846ed5aa115279c3da8f4f88d5758935d1
                              • Instruction Fuzzy Hash: B4118E74200605AFDB10AFA4DC89C6FBBB5FF04318B10C52AE659D7A20EB30AC64CF50
                              APIs
                              • SetErrorMode.KERNEL32(00000000), ref: 6CC8CA85
                              • SetErrorMode.KERNEL32(00000000), ref: 6CC8CA8D
                                • Part of subcall function 6CC8A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6CC8A6D0
                                • Part of subcall function 6CC8A698: SetLastError.KERNEL32(0000006F), ref: 6CC8A6E7
                              • GetModuleHandleW.KERNEL32(user32.dll), ref: 6CC8CADC
                              • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6CC8CAEC
                                • Part of subcall function 6CC8C8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6CC8C91F
                                • Part of subcall function 6CC8C8E2: PathFindExtensionW.SHLWAPI(?), ref: 6CC8C939
                                • Part of subcall function 6CC8C8E2: __wcsdup.LIBCMT ref: 6CC8C983
                                • Part of subcall function 6CC8C8E2: __wcsdup.LIBCMT ref: 6CC8C9C2
                                • Part of subcall function 6CC8C8E2: __wcsdup.LIBCMT ref: 6CC8CA14
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                              • String ID: NotifyWinEvent$user32.dll
                              • API String ID: 3531328582-597752486
                              • Opcode ID: 841a0605230b5dc608e623195e8acbcf08ce807b13f58a970b650fdea06778f4
                              • Instruction ID: abe861bef26f03b924f9888a685ea8ec3d10172ca653608cdd191b104ef5f4db
                              • Opcode Fuzzy Hash: 841a0605230b5dc608e623195e8acbcf08ce807b13f58a970b650fdea06778f4
                              • Instruction Fuzzy Hash: 9C01DF706122444FCB10EFA5C808E8F3FA8EF88318B05845AFA05DBB80EB35C8408F65
                              APIs
                              • GetSysColor.USER32(0000000F), ref: 6CC8CD2E
                              • GetSysColor.USER32(00000010), ref: 6CC8CD35
                              • GetSysColor.USER32(00000014), ref: 6CC8CD3C
                              • GetSysColor.USER32(00000012), ref: 6CC8CD43
                              • GetSysColor.USER32(00000006), ref: 6CC8CD4A
                              • GetSysColorBrush.USER32(0000000F), ref: 6CC8CD57
                              • GetSysColorBrush.USER32(00000006), ref: 6CC8CD5E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Color$Brush
                              • String ID:
                              • API String ID: 2798902688-0
                              • Opcode ID: dbcd79f9c527fe45e75742f889067fa56dc9e9fac7e67e8b9b2309305ccf74d6
                              • Instruction ID: 237854340aa2c3507f76115a80a48b58e4d2d26c6d8bb262f2697312590cfd53
                              • Opcode Fuzzy Hash: dbcd79f9c527fe45e75742f889067fa56dc9e9fac7e67e8b9b2309305ccf74d6
                              • Instruction Fuzzy Hash: 5DF0FE71A417445BDB30BBB25909F47BAE1FFC4710F16092EE2458B990D6B6E441DF40
                              APIs
                              • GetWindowLongW.USER32(?,000000F0), ref: 6CC8818D
                              • GetParent.USER32(?), ref: 6CC8819B
                              • GetParent.USER32(?), ref: 6CC881AE
                              • GetLastActivePopup.USER32(?), ref: 6CC881BF
                              • IsWindowEnabled.USER32(?), ref: 6CC881D3
                              • EnableWindow.USER32(?,00000000), ref: 6CC881E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                              • String ID:
                              • API String ID: 670545878-0
                              • Opcode ID: 8d8e76e7b00e8b20cf527e96ca9e9cb831c301b71a35017f79b52abd93e03896
                              • Instruction ID: d16ab863f4443fbf120f25458144ec92c4a80bb32a8e6c47c265d374c09a9fec
                              • Opcode Fuzzy Hash: 8d8e76e7b00e8b20cf527e96ca9e9cb831c301b71a35017f79b52abd93e03896
                              • Instruction Fuzzy Hash: B3119132A07631ABD7120AAA8C44F5FBEB86F45B6CF150227ED14E7E04FF64C80146E1
                              APIs
                              • __CreateFrameInfo.LIBCMT ref: 6CC9C43E
                                • Part of subcall function 6CC94FC4: __getptd.LIBCMT ref: 6CC94FD2
                                • Part of subcall function 6CC94FC4: __getptd.LIBCMT ref: 6CC94FE0
                              • __getptd.LIBCMT ref: 6CC9C448
                                • Part of subcall function 6CC9A27F: __getptd_noexit.LIBCMT ref: 6CC9A282
                                • Part of subcall function 6CC9A27F: __amsg_exit.LIBCMT ref: 6CC9A28F
                              • __getptd.LIBCMT ref: 6CC9C456
                              • __getptd.LIBCMT ref: 6CC9C464
                              • __getptd.LIBCMT ref: 6CC9C46F
                              • _CallCatchBlock2.LIBCMT ref: 6CC9C495
                                • Part of subcall function 6CC95069: __CallSettingFrame@12.LIBCMT ref: 6CC950B5
                                • Part of subcall function 6CC9C53C: __getptd.LIBCMT ref: 6CC9C54B
                                • Part of subcall function 6CC9C53C: __getptd.LIBCMT ref: 6CC9C559
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                              • String ID:
                              • API String ID: 1602911419-0
                              • Opcode ID: bd724f9712053408485dfc835ee6d91e1fa55e5332bd6f9ce4c9004e435d8c31
                              • Instruction ID: 676e7ec5dd4b1f1b61879ab5303c981ba0d36032cb337fb8fd157177d2eb88f0
                              • Opcode Fuzzy Hash: bd724f9712053408485dfc835ee6d91e1fa55e5332bd6f9ce4c9004e435d8c31
                              • Instruction Fuzzy Hash: 1911C3B1C04209DFDF00EFA4C844AED7BB1FF18319F108569E814A7750EB399A199F51
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 6CC8DB6D
                              • GetDlgCtrlID.USER32(00000000), ref: 6CC8DB81
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6CC8DB91
                              • GetWindowRect.USER32(00000000,?), ref: 6CC8DBA3
                              • PtInRect.USER32(?,?,?), ref: 6CC8DBB3
                              • GetWindow.USER32(?,00000005), ref: 6CC8DBC0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Rect$ClientCtrlLongScreen
                              • String ID:
                              • API String ID: 1315500227-0
                              • Opcode ID: eaa2f991e55e9faee87949c8b54355fb26d229828a8f2effd0504a47f95dc8ac
                              • Instruction ID: 20860944b19e0fcbf495a0de2b56eccb8219a58cace70ab3174c2eebd6218f8e
                              • Opcode Fuzzy Hash: eaa2f991e55e9faee87949c8b54355fb26d229828a8f2effd0504a47f95dc8ac
                              • Instruction Fuzzy Hash: 0F014B3260216ABBDB115B959C0CEAF3B78FF46B69F014122F91196090E734D5168B94
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: _memset
                              • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                              • API String ID: 2102423945-1093365818
                              • Opcode ID: f5981529e65721ec7e37d93d09d44dee735bfeeb7fd994d4bb8862ab9a521e8f
                              • Instruction ID: 10ed6d6b135418e419dcb80fb70bdbe231319232714d599f8f9f2159575330ba
                              • Opcode Fuzzy Hash: f5981529e65721ec7e37d93d09d44dee735bfeeb7fd994d4bb8862ab9a521e8f
                              • Instruction Fuzzy Hash: E9912072D0124DAEDB40CF98C599BDEBBF8AF49348F218165ED58E6680F774C644C7A0
                              APIs
                              • GetMenuCheckMarkDimensions.USER32 ref: 6CC896F2
                              • _memset.LIBCMT ref: 6CC8976A
                              • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6CC897CD
                              • LoadBitmapW.USER32(00000000,00007FE3), ref: 6CC897E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                              • String ID:
                              • API String ID: 4271682439-3916222277
                              • Opcode ID: 4460068195bb9d2db58a2f202500d34099540aff70e3408ef89b196f3b16c1da
                              • Instruction ID: a004ae6a2c1f2a8d0328e54bbf1e8afc3eeed6ea7fbe89a1b55de21030c190b1
                              • Opcode Fuzzy Hash: 4460068195bb9d2db58a2f202500d34099540aff70e3408ef89b196f3b16c1da
                              • Instruction Fuzzy Hash: 78310971B002559FEF108FA89CC8B9E7BB5FB45308F5540AAE549EB681EF309D498F50
                              APIs
                              • __getptd.LIBCMT ref: 6CC9C17F
                                • Part of subcall function 6CC9A27F: __getptd_noexit.LIBCMT ref: 6CC9A282
                                • Part of subcall function 6CC9A27F: __amsg_exit.LIBCMT ref: 6CC9A28F
                              • __getptd.LIBCMT ref: 6CC9C190
                              • __getptd.LIBCMT ref: 6CC9C19E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: MOC$csm
                              • API String ID: 803148776-1389381023
                              • Opcode ID: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                              • Instruction ID: ccff254544173485d733cbb3644009fa1c7dd06939f3afc8e80448ac8d364368
                              • Opcode Fuzzy Hash: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                              • Instruction Fuzzy Hash: 15E04F329145048FD700ABB4C045B5837A4FBA9718F2501A1D40CCBB21F735E644C943
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,?,?,6CC849D6,?,00000003), ref: 6CC85685
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6CC856B4
                              • GetLastError.KERNEL32 ref: 6CC856C5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6CC856E5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6CC85709
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                              • String ID:
                              • API String ID: 3322701435-0
                              • Opcode ID: 0f4ac35a4d60b24a488b6d75d20dc54d335add93a346653fbe634269116f6980
                              • Instruction ID: 2378a5d5f60acf84a9ed9be288dcc436661ccf337fffc651936d37f4d53d9fa4
                              • Opcode Fuzzy Hash: 0f4ac35a4d60b24a488b6d75d20dc54d335add93a346653fbe634269116f6980
                              • Instruction Fuzzy Hash: 0411B475390305ABE610DEA4DCC4F6B77BCE785748F100928F642973C0D6A4BC088670
                              APIs
                              • lstrlenW.KERNEL32(?,?,?), ref: 6CC8DA3D
                              • _memset.LIBCMT ref: 6CC8DA5B
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 6CC8DA75
                              • lstrcmpW.KERNEL32(?,?,?,?), ref: 6CC8DA87
                              • SetWindowTextW.USER32(00000000,?), ref: 6CC8DA93
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                              • String ID:
                              • API String ID: 4273134663-0
                              • Opcode ID: 1b775fc22a874a4e0968d5d3400692d37ad3499fc71262f5dd600d18149f1f09
                              • Instruction ID: 06ceae675c4d9f4b129466d456b150bf4051db4922a89f6c1437bdab4bfee6d1
                              • Opcode Fuzzy Hash: 1b775fc22a874a4e0968d5d3400692d37ad3499fc71262f5dd600d18149f1f09
                              • Instruction Fuzzy Hash: 2B0184B6A0225A77CB00DAB59C8CDDF77BDEF45748F104466E915D3241EA34D94887A0
                              APIs
                              • __getptd.LIBCMT ref: 6CC9FE1A
                                • Part of subcall function 6CC9A27F: __getptd_noexit.LIBCMT ref: 6CC9A282
                                • Part of subcall function 6CC9A27F: __amsg_exit.LIBCMT ref: 6CC9A28F
                              • __amsg_exit.LIBCMT ref: 6CC9FE3A
                              • __lock.LIBCMT ref: 6CC9FE4A
                              • InterlockedDecrement.KERNEL32(?), ref: 6CC9FE67
                              • InterlockedIncrement.KERNEL32(02922808), ref: 6CC9FE92
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: a320f5b836c9af127071dab57894664b1965bb637351eab1995f2725cf0301cc
                              • Instruction ID: d67927f7126d7dd58de98ff4367dd5b617419cd61e6381b6f060815ea4335613
                              • Opcode Fuzzy Hash: a320f5b836c9af127071dab57894664b1965bb637351eab1995f2725cf0301cc
                              • Instruction Fuzzy Hash: 8501B932E02715DFDB119BE5840879D77B0BF06729F110209F92067F91E734A951CBD5
                              APIs
                              • __lock.LIBCMT ref: 6CC94636
                                • Part of subcall function 6CC9A914: __mtinitlocknum.LIBCMT ref: 6CC9A92A
                                • Part of subcall function 6CC9A914: __amsg_exit.LIBCMT ref: 6CC9A936
                                • Part of subcall function 6CC9A914: EnterCriticalSection.KERNEL32(6CC82790,6CC82790,?,6CC9B48C,00000004,6CCAE998,0000000C,6CC9A61E,6CCAC168,6CC8279F,00000000,00000000,00000000,?,6CC9A231,00000001), ref: 6CC9A93E
                              • ___sbh_find_block.LIBCMT ref: 6CC94641
                              • ___sbh_free_block.LIBCMT ref: 6CC94650
                              • HeapFree.KERNEL32(00000000,6CCAC168,6CCAE828,0000000C,6CC9A8F5,00000000,6CCAE978,0000000C,6CC9A92F,6CCAC168,6CC82790,?,6CC9B48C,00000004,6CCAE998,0000000C), ref: 6CC94680
                              • GetLastError.KERNEL32(?,6CC9B48C,00000004,6CCAE998,0000000C,6CC9A61E,6CCAC168,6CC8279F,00000000,00000000,00000000,?,6CC9A231,00000001,00000214), ref: 6CC94691
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: d20657846d30bfda7da13464d2fcd4203657fc7e8e449d861eb1bd2517f48015
                              • Instruction ID: 1654370589f66fc42527339fd9d84e9f22ca6ffa2ab5644de2117038e4d25144
                              • Opcode Fuzzy Hash: d20657846d30bfda7da13464d2fcd4203657fc7e8e449d861eb1bd2517f48015
                              • Instruction Fuzzy Hash: 9101A971D45715EBDF209FB1A808B9E3BB4BF0176EF214209E124A6EC0FB74D544CA98
                              APIs
                              • TlsFree.KERNEL32(?,?,?,6CC8C179), ref: 6CC8C13B
                              • GlobalHandle.KERNEL32(?), ref: 6CC8C149
                              • GlobalUnlock.KERNEL32(00000000), ref: 6CC8C152
                              • GlobalFree.KERNEL32(00000000), ref: 6CC8C159
                              • DeleteCriticalSection.KERNEL32(?,?,?,6CC8C179), ref: 6CC8C163
                                • Part of subcall function 6CC8BF5D: EnterCriticalSection.KERNEL32(?), ref: 6CC8BFBC
                                • Part of subcall function 6CC8BF5D: LeaveCriticalSection.KERNEL32(?), ref: 6CC8BFCC
                                • Part of subcall function 6CC8BF5D: LocalFree.KERNEL32(?), ref: 6CC8BFD5
                                • Part of subcall function 6CC8BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6CC8BFE7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                              • String ID:
                              • API String ID: 1549993015-0
                              • Opcode ID: 471f5d7357b558e491d251b3d262cbdd05ac19075bda43523eacc3b28732e294
                              • Instruction ID: f9499517fffefe07236acaa192b6d2cc9af9a3e2aa9ed1740e60bf41aac52fba
                              • Opcode Fuzzy Hash: 471f5d7357b558e491d251b3d262cbdd05ac19075bda43523eacc3b28732e294
                              • Instruction Fuzzy Hash: 7AF089363026409BDB10AB78AC4CE6F3BB9EF867687650709F525D3641DB34D8038B70
                              APIs
                                • Part of subcall function 6CC8C220: EnterCriticalSection.KERNEL32(6CCB34A8,?,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8C25A
                                • Part of subcall function 6CC8C220: InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8C26C
                                • Part of subcall function 6CC8C220: LeaveCriticalSection.KERNEL32(6CCB34A8,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8C279
                                • Part of subcall function 6CC8C220: EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8C289
                                • Part of subcall function 6CC8BB0C: __EH_prolog3_catch.LIBCMT ref: 6CC8BB13
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6CC91458
                              • FreeLibrary.KERNEL32(?), ref: 6CC91468
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                              • String ID: HtmlHelpW$hhctrl.ocx
                              • API String ID: 2853499158-3773518134
                              • Opcode ID: c8204ba9452fdc3c5d984a08aedafd6597c38614efb34846476762984acd80c5
                              • Instruction ID: 524b7c4852c124fdc8acf9646dbec5b8665fe1e5cda9218515da5164c536ece2
                              • Opcode Fuzzy Hash: c8204ba9452fdc3c5d984a08aedafd6597c38614efb34846476762984acd80c5
                              • Instruction Fuzzy Hash: 5101D631200706A7CB116FAADD0AF8B7FB8AF0875CF00C91AF54B96D50FB31D4548A51
                              APIs
                              • ___BuildCatchObject.LIBCMT ref: 6CC9C7D6
                                • Part of subcall function 6CC9C731: ___BuildCatchObjectHelper.LIBCMT ref: 6CC9C767
                              • _UnwindNestedFrames.LIBCMT ref: 6CC9C7ED
                              • ___FrameUnwindToState.LIBCMT ref: 6CC9C7FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                              • String ID: csm
                              • API String ID: 2163707966-1018135373
                              • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction ID: 6ac35f948637a1ae0850768d9b8d1914c5365e45e1f3e4d831d2042c5a2834e2
                              • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction Fuzzy Hash: D001F632001109BBDF12AF51CC84EEA7F6AFF18398F104010FD2855A20E732D9B1EBA5
                              APIs
                              • GetModuleHandleA.KERNEL32(KERNEL32,6CC977D7), ref: 6CC9ED7C
                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6CC9ED8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: IsProcessorFeaturePresent$KERNEL32
                              • API String ID: 1646373207-3105848591
                              • Opcode ID: 15df415d0e26689c2bba6eea7f12a85e9acb4d47e03508340d3100b8efaae946
                              • Instruction ID: 861f3d702ba454007e35fd8c71863654f950e3955678901d032b3b7567721b3c
                              • Opcode Fuzzy Hash: 15df415d0e26689c2bba6eea7f12a85e9acb4d47e03508340d3100b8efaae946
                              • Instruction Fuzzy Hash: 45F03031A01A0AD2DF001BE1BD1D66F7A79BBC2746F8209D4E195E1494EF3180B19685
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: File$SizeTime_memset
                              • String ID:
                              • API String ID: 151880914-0
                              • Opcode ID: e7e3adb5257b1e94108ae53e89ed8f785695853b16171a9ebd70a9cc9a4c1bf0
                              • Instruction ID: 4d5d97232134479a0ee0c7ae42f9729d94e0d350071593c6f2c7351ab298ecb2
                              • Opcode Fuzzy Hash: e7e3adb5257b1e94108ae53e89ed8f785695853b16171a9ebd70a9cc9a4c1bf0
                              • Instruction Fuzzy Hash: 4B511E726056059FDB20CF65C944DABBBF8FF09318B144A1EE5A6D3A90F730E944DB60
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6CCA084F
                              • __isleadbyte_l.LIBCMT ref: 6CCA0883
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6CC940D8,6CCABF84,00000000,00000000,?,?,?,?,6CC940D8,00000000,?), ref: 6CCA08B4
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6CC940D8,00000001,00000000,00000000,?,?,?,?,6CC940D8,00000000,?), ref: 6CCA0922
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 1e461e46e6739f7cb0546d75e78a0145e905c683a77dae3d0d461de2d0b8413a
                              • Instruction ID: c1e479e858cf976451f1b0a987b57a5bd686565f0412157ea8cae7568f693830
                              • Opcode Fuzzy Hash: 1e461e46e6739f7cb0546d75e78a0145e905c683a77dae3d0d461de2d0b8413a
                              • Instruction Fuzzy Hash: FC31E231A012C7EFDB04CFE4C8889AE3BB5BF01394F148669E4669B591FB31C942DB94
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6CC88ED0
                                • Part of subcall function 6CC89C7C: __EH_prolog3.LIBCMT ref: 6CC89C83
                              • __wcsdup.LIBCMT ref: 6CC88EF2
                              • GetCurrentThread.KERNEL32 ref: 6CC88F1F
                              • GetCurrentThreadId.KERNEL32 ref: 6CC88F28
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentH_prolog3Thread$__wcsdup
                              • String ID:
                              • API String ID: 190065205-0
                              • Opcode ID: b385ba4ee7c6a4ae4d25983c7c62129835b578c5efdbe07656fd0777cb218228
                              • Instruction ID: e6c0caaa596fe1e8bbd0aa0ff8b03e092fd13e6047677a91fd0f5554c20b7f26
                              • Opcode Fuzzy Hash: b385ba4ee7c6a4ae4d25983c7c62129835b578c5efdbe07656fd0777cb218228
                              • Instruction Fuzzy Hash: 22217EB0901B408FC7218F7A854568AFEF4BFA4708F10895FD1AAC7B21EBB0A045CF45
                              APIs
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6CC91D33
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6CC91D5E
                              • GetCapture.USER32 ref: 6CC91D70
                              • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6CC91D7F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: MessageSend$Capture
                              • String ID:
                              • API String ID: 1665607226-0
                              • Opcode ID: 5ab8c660621f62f6b54603eccd7a3569dc76acb8d43831134326f344771b0152
                              • Instruction ID: cf80ff68d52a3a5e4c7985df63e06bf7aad738d504da34c94209a9a38e60813d
                              • Opcode Fuzzy Hash: 5ab8c660621f62f6b54603eccd7a3569dc76acb8d43831134326f344771b0152
                              • Instruction Fuzzy Hash: D90184713502947BDF311B668CCDFEB3E7AEFCAF14F1100B9B6059A1E6DAA18804D620
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6CC86A8A
                                • Part of subcall function 6CC868E2: _malloc.LIBCMT ref: 6CC86900
                              • __CxxThrowException@8.LIBCMT ref: 6CC86AC0
                              • FormatMessageW.KERNEL32(00001100,00000000,6CCAC050,00000800,000000FF,00000000,00000000,?,?,6CCAD898,00000004,6CC816A6,?,6CC8155A,8007000E,6CC813DE), ref: 6CC86AEA
                              • LocalFree.KERNEL32(000000FF,000000FF,6CC8279F), ref: 6CC86B12
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                              • String ID:
                              • API String ID: 1776251131-0
                              • Opcode ID: 3b2b89ab4b29cd8e6fa67e0f74f3f5e83f8eac5f52b2beac5eb58ec20dd9d5d8
                              • Instruction ID: f240bc549db9c0f962f2dfc8a09bb4f285a26195d0f6d4570e6b6829db37eac7
                              • Opcode Fuzzy Hash: 3b2b89ab4b29cd8e6fa67e0f74f3f5e83f8eac5f52b2beac5eb58ec20dd9d5d8
                              • Instruction Fuzzy Hash: 47118C71651649AFDF048FA8CC44EEE3BB9EF48318F20C529B529CB690F73189508B50
                              APIs
                              • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6CC8D194
                              • RegCloseKey.ADVAPI32(00000000), ref: 6CC8D19D
                              • swprintf.LIBCMT ref: 6CC8D1BA
                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6CC8D1CB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ClosePrivateProfileStringValueWriteswprintf
                              • String ID:
                              • API String ID: 22681860-0
                              • Opcode ID: dce61cbc9e0240de27cf65f65c77fcc03bef84248163a16e5b7ad582d078f8ed
                              • Instruction ID: c978fc69042eccb1c0fa4b1855207e82e757bbe743cc1d00ee330c6f9d6e281f
                              • Opcode Fuzzy Hash: dce61cbc9e0240de27cf65f65c77fcc03bef84248163a16e5b7ad582d078f8ed
                              • Instruction Fuzzy Hash: 3C01A172A01209ABDF009F648C49FAFB7BCAF49718F10041AFA01E7540EB71E90587A4
                              APIs
                                • Part of subcall function 6CC868E2: _malloc.LIBCMT ref: 6CC86900
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6CC872BB
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 6CC872C1
                              • DuplicateHandle.KERNEL32(00000000), ref: 6CC872C4
                              • GetLastError.KERNEL32(?), ref: 6CC872DF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                              • String ID:
                              • API String ID: 3704204646-0
                              • Opcode ID: 496380d6393d9a367de2bbe3aa534c5c7abc33c9567abbdbcc1e179c744470d0
                              • Instruction ID: 0728094b2f5427a9c2d297707e5007585d49fa51f057b04485a7c827539dbbd9
                              • Opcode Fuzzy Hash: 496380d6393d9a367de2bbe3aa534c5c7abc33c9567abbdbcc1e179c744470d0
                              • Instruction Fuzzy Hash: B7017131701605ABDB009BA6DD89F5B7FB9EF85758F244525F508CB641FB71DC009760
                              APIs
                              • GetTopWindow.USER32(?), ref: 6CC90F9D
                              • GetTopWindow.USER32(00000000), ref: 6CC90FDC
                              • GetWindow.USER32(00000000,00000002), ref: 6CC90FFA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window
                              • String ID:
                              • API String ID: 2353593579-0
                              • Opcode ID: e3a673d12146e25841475bbdfb8874c56d3290738a600b5df3e66ff9587d0f2f
                              • Instruction ID: 9278d84d42e55b7e67dfe39b65683694a9e327e74b3508a68b7c1959766dfdc0
                              • Opcode Fuzzy Hash: e3a673d12146e25841475bbdfb8874c56d3290738a600b5df3e66ff9587d0f2f
                              • Instruction Fuzzy Hash: 2001293200569ABBCF025E959D09EDF3F3ABF49794F004011FA1191520E736C672EBA1
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction ID: 5a04dfc87731c8cac3141b82b7ddf9ebcd56259c21d0da406081d57cae9c868b
                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction Fuzzy Hash: 1F11407284418EBBCF125F84CC41CDE3F62BB29358B598419FA6859570E736CAB1AB81
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 6CC903DC
                              • GetTopWindow.USER32(00000000), ref: 6CC903EF
                                • Part of subcall function 6CC903CF: GetWindow.USER32(00000000,00000002), ref: 6CC90436
                              • GetTopWindow.USER32(?), ref: 6CC9041F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Item
                              • String ID:
                              • API String ID: 369458955-0
                              • Opcode ID: 313414d34feba34b179b801e81998901c26e9a593383f6440190b72f58dd3a48
                              • Instruction ID: dd142270bd92c325a517e41c33923150fbd5850a759cf1665f412781aeba5081
                              • Opcode Fuzzy Hash: 313414d34feba34b179b801e81998901c26e9a593383f6440190b72f58dd3a48
                              • Instruction Fuzzy Hash: 4D0184321465AAAB8B122E668D04ECF3A79AF4D394B458121FD1491D01F731C51296A5
                              APIs
                              • __getptd.LIBCMT ref: 6CCA0586
                                • Part of subcall function 6CC9A27F: __getptd_noexit.LIBCMT ref: 6CC9A282
                                • Part of subcall function 6CC9A27F: __amsg_exit.LIBCMT ref: 6CC9A28F
                              • __getptd.LIBCMT ref: 6CCA059D
                              • __amsg_exit.LIBCMT ref: 6CCA05AB
                              • __lock.LIBCMT ref: 6CCA05BB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 3d5163103c3c5710315665a06302f4466bcd9302e03ad058be76100cae126990
                              • Instruction ID: 88e60d02585113a471eaeb8904775749feaac91b2282130e9b3404f81e7267b2
                              • Opcode Fuzzy Hash: 3d5163103c3c5710315665a06302f4466bcd9302e03ad058be76100cae126990
                              • Instruction Fuzzy Hash: DEF0B432D01715DFDB20ABF4840978C73B06F42769F510609D45567F90FB34A606CB5A
                              APIs
                                • Part of subcall function 6CC8A59C: GetModuleHandleW.KERNEL32(KERNEL32,6CC8A6B6), ref: 6CC8A5AA
                                • Part of subcall function 6CC8A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6CC8A5CB
                                • Part of subcall function 6CC8A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6CC8A5DD
                                • Part of subcall function 6CC8A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6CC8A5EF
                                • Part of subcall function 6CC8A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6CC8A601
                              • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6CC8A6D0
                              • SetLastError.KERNEL32(0000006F), ref: 6CC8A6E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Module$ErrorFileHandleLastName
                              • String ID:
                              • API String ID: 2524245154-3916222277
                              • Opcode ID: b38b215a92b5becbfd42a11099f01a6176bdfa7b23d0b1bce3a5fe8a56e6225c
                              • Instruction ID: d0c0f4b364c88e36df5bcb5bdfde34ec7192cad3be11a103073c5658f8f26267
                              • Opcode Fuzzy Hash: b38b215a92b5becbfd42a11099f01a6176bdfa7b23d0b1bce3a5fe8a56e6225c
                              • Instruction Fuzzy Hash: A8215E709012289EDB20DF75D8587DEBBB4BF44328F10869AD069E72C0EB749A89DF54
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6CC88E78
                              • PathFindExtensionW.SHLWAPI(?), ref: 6CC88E8E
                                • Part of subcall function 6CC88BDF: __EH_prolog3_GS.LIBCMT ref: 6CC88BE9
                                • Part of subcall function 6CC88BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6CC88EB7,?,?), ref: 6CC88C19
                                • Part of subcall function 6CC88BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6CC88C2D
                                • Part of subcall function 6CC88BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6CC88C69
                                • Part of subcall function 6CC88BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6CC88C77
                                • Part of subcall function 6CC88BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6CC88C94
                                • Part of subcall function 6CC88BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6CC88CBF
                                • Part of subcall function 6CC88BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6CC88CC8
                                • Part of subcall function 6CC88BDF: GetModuleFileNameW.KERNEL32(6CC80000,?,00000105), ref: 6CC88D7F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                              • String ID: %s%s.dll
                              • API String ID: 1311856149-1649984862
                              • Opcode ID: 511f6d40180034e23e68de62d20b83ab84b4d043c1c2aa6e998f0384538215e4
                              • Instruction ID: 5759dcebc78d7c053ea2d20e02c6279d6c8a037254561d903980eb5d66185278
                              • Opcode Fuzzy Hash: 511f6d40180034e23e68de62d20b83ab84b4d043c1c2aa6e998f0384538215e4
                              • Instruction Fuzzy Hash: A3018B71A12118BBCB11DBA8EC49DEF77F9FF49704F0104A6A505EB540E770DA05CB54
                              APIs
                                • Part of subcall function 6CC95017: __getptd.LIBCMT ref: 6CC9501D
                                • Part of subcall function 6CC95017: __getptd.LIBCMT ref: 6CC9502D
                              • __getptd.LIBCMT ref: 6CC9C54B
                                • Part of subcall function 6CC9A27F: __getptd_noexit.LIBCMT ref: 6CC9A282
                                • Part of subcall function 6CC9A27F: __amsg_exit.LIBCMT ref: 6CC9A28F
                              • __getptd.LIBCMT ref: 6CC9C559
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: csm
                              • API String ID: 803148776-1018135373
                              • Opcode ID: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                              • Instruction ID: e52b9c035538658905de0229753826611e83c2d4661e8451afe8f2721e1c729f
                              • Opcode Fuzzy Hash: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                              • Instruction Fuzzy Hash: 3201D170805201CFCF20AF61C48069EBFB5AF20319F64052ED451D6E50FB30D684EF41
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 6CC8BFBC
                              • LeaveCriticalSection.KERNEL32(?), ref: 6CC8BFCC
                              • LocalFree.KERNEL32(?), ref: 6CC8BFD5
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6CC8BFE7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterFreeLeaveLocalValue
                              • String ID:
                              • API String ID: 2949335588-0
                              • Opcode ID: defb0684372e5899f82d4dc7a92e8248faee83cd9638636caf80a8e64552129d
                              • Instruction ID: f157ed241b027a109cc4e417e3f89fda0710588e60de1a959095c126ead23042
                              • Opcode Fuzzy Hash: defb0684372e5899f82d4dc7a92e8248faee83cd9638636caf80a8e64552129d
                              • Instruction Fuzzy Hash: 72117C35602604EFD714CF98C894F5ABBB4FF46319F208469F2528B9A1DB71B850CF10
                              APIs
                              • EnterCriticalSection.KERNEL32(6CCB34A8,?,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8C25A
                              • InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8C26C
                              • LeaveCriticalSection.KERNEL32(6CCB34A8,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8C279
                              • EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6CC8BB27,00000010,00000008,6CC8AF1F,6CC8AEC2,6CC86DDD,6CC8A591,6CC82BC2,?,?,?), ref: 6CC8C289
                                • Part of subcall function 6CC86DC1: __CxxThrowException@8.LIBCMT ref: 6CC86DD7
                                • Part of subcall function 6CC86DC1: __EH_prolog3.LIBCMT ref: 6CC86DE4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                              • String ID:
                              • API String ID: 2895727460-0
                              • Opcode ID: 07c9f87a8c2abc2c2ce882f50a948559940afef805b02abaf4e6a636f22898c5
                              • Instruction ID: 84c5626be05f17f5a86c6bdd1efd26054852f10791c8673e165c83821c8327e3
                              • Opcode Fuzzy Hash: 07c9f87a8c2abc2c2ce882f50a948559940afef805b02abaf4e6a636f22898c5
                              • Instruction Fuzzy Hash: ECF0F673601104AFCB002BD9DC8AB4BBF79EBD336CF190616E204A3D41EF30A481CAA5
                              APIs
                              • EnterCriticalSection.KERNEL32(6CCB32EC,?,?,?,?,6CC8C0B7,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?), ref: 6CC8BA69
                              • TlsGetValue.KERNEL32(6CCB32D0,?,?,?,6CC8C0B7,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BA7D
                              • LeaveCriticalSection.KERNEL32(6CCB32EC,?,?,?,6CC8C0B7,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BA93
                              • LeaveCriticalSection.KERNEL32(6CCB32EC,?,?,?,6CC8C0B7,?,00000004,6CC8AF00,6CC86DDD,6CC8A591,6CC82BC2,?,?,?,?,?), ref: 6CC8BA9E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1768915976.000000006CC81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CC80000, based on PE: true
                              • Associated: 00000001.00000002.1768876785.000000006CC80000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769033320.000000006CCA8000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB1000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769078361.000000006CCB5000.00000004.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000001.00000002.1769135755.000000006CCB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_6cc80000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterValue
                              • String ID:
                              • API String ID: 3969253408-0
                              • Opcode ID: 95c992f550539a74cff19dcb688c698fe16bbc9fd673ed197e057e0ca085a0c9
                              • Instruction ID: c5e90d2d59ba7b0b566ec790fbcec47571ed41ffd441b59b85e680531f21d552
                              • Opcode Fuzzy Hash: 95c992f550539a74cff19dcb688c698fe16bbc9fd673ed197e057e0ca085a0c9
                              • Instruction Fuzzy Hash: 2BF054763052049FD7208F98DC9CC4BBBBDEB853683154426E759D3501E634F8859BA0

                              Execution Graph

                              Execution Coverage:3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1679
                              Total number of Limit Nodes:23
                              execution_graph 18539 6c8a498c 18540 6c8a499c 18539->18540 18541 6c8a4997 18539->18541 18545 6c8a4896 18540->18545 18557 6c8abe02 18541->18557 18544 6c8a49aa 18546 6c8a48a2 ___DllMainCRTStartup 18545->18546 18547 6c8a48ef 18546->18547 18554 6c8a493f ___DllMainCRTStartup 18546->18554 18561 6c8a4761 18546->18561 18547->18554 18608 6c896894 18547->18608 18551 6c8a491f 18552 6c8a4761 __CRT_INIT@12 156 API calls 18551->18552 18551->18554 18552->18554 18553 6c896894 ___DllMainCRTStartup 31 API calls 18555 6c8a4916 18553->18555 18554->18544 18556 6c8a4761 __CRT_INIT@12 156 API calls 18555->18556 18556->18551 18558 6c8abe27 18557->18558 18559 6c8abe34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 18557->18559 18558->18559 18560 6c8abe2b 18558->18560 18559->18560 18560->18540 18562 6c8a47ec 18561->18562 18563 6c8a4770 18561->18563 18565 6c8a47f2 18562->18565 18566 6c8a4823 18562->18566 18612 6c8aa6f4 HeapCreate 18563->18612 18570 6c8a480d 18565->18570 18607 6c8a477b 18565->18607 18745 6c8a5e85 18565->18745 18568 6c8a4828 18566->18568 18569 6c8a4881 18566->18569 18748 6c8aa0ae TlsGetValue 18568->18748 18569->18607 18800 6c8aa3c8 18569->18800 18578 6c8ab77d __ioterm 68 API calls 18570->18578 18570->18607 18577 6c8a4787 __RTC_Initialize 18585 6c8a4797 GetCommandLineA 18577->18585 18600 6c8a478b 18577->18600 18580 6c8a4817 18578->18580 18582 6c8aa0e2 __mtterm 70 API calls 18580->18582 18584 6c8a481c 18582->18584 18587 6c8aa724 __heap_term 4 API calls 18584->18587 18648 6c8abafe 18585->18648 18587->18607 18591 6c8a485e 18769 6c8aa11f 18591->18769 18592 6c8a4875 18787 6c8a4618 18592->18787 18593 6c8a47b1 18594 6c8a47b5 18593->18594 18689 6c8aba43 18593->18689 18729 6c8aa0e2 18594->18729 18599 6c8a4865 GetCurrentThreadId 18599->18607 18723 6c8aa724 18600->18723 18602 6c8a47d5 18602->18607 18740 6c8ab77d 18602->18740 18607->18547 18609 6c8968a2 18608->18609 18611 6c8967cb 18608->18611 18609->18611 19618 6c89aef1 18609->19618 18611->18551 18611->18553 18613 6c8a4776 18612->18613 18613->18607 18614 6c8aa436 GetModuleHandleW 18613->18614 18615 6c8aa44a 18614->18615 18616 6c8aa451 18614->18616 18811 6c8a5bcf 18615->18811 18618 6c8aa45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 18616->18618 18619 6c8aa5b9 18616->18619 18621 6c8aa4a4 TlsAlloc 18618->18621 18622 6c8aa0e2 __mtterm 70 API calls 18619->18622 18624 6c8aa5be 18621->18624 18625 6c8aa4f2 TlsSetValue 18621->18625 18622->18624 18624->18577 18625->18624 18626 6c8aa503 18625->18626 18815 6c8a5e94 18626->18815 18631 6c8a9fb8 __encode_pointer 6 API calls 18632 6c8aa523 18631->18632 18633 6c8a9fb8 __encode_pointer 6 API calls 18632->18633 18634 6c8aa533 18633->18634 18635 6c8a9fb8 __encode_pointer 6 API calls 18634->18635 18636 6c8aa543 18635->18636 18832 6c8aa798 18636->18832 18639 6c8aa033 __decode_pointer 6 API calls 18640 6c8aa564 18639->18640 18640->18619 18641 6c8aa608 __calloc_crt 67 API calls 18640->18641 18642 6c8aa57d 18641->18642 18642->18619 18643 6c8aa033 __decode_pointer 6 API calls 18642->18643 18644 6c8aa597 18643->18644 18644->18619 18645 6c8aa59e 18644->18645 18646 6c8aa11f __mtinit 67 API calls 18645->18646 18647 6c8aa5a6 GetCurrentThreadId 18646->18647 18647->18624 18649 6c8abb3b 18648->18649 18650 6c8abb1c GetEnvironmentStringsW 18648->18650 18652 6c8abb24 18649->18652 18654 6c8abbd4 18649->18654 18651 6c8abb30 GetLastError 18650->18651 18650->18652 18651->18649 18653 6c8abb57 GetEnvironmentStringsW 18652->18653 18657 6c8abb66 18652->18657 18653->18657 18658 6c8a47a7 18653->18658 18655 6c8abbdd GetEnvironmentStrings 18654->18655 18654->18658 18655->18658 18659 6c8abbed 18655->18659 18656 6c8abb7b WideCharToMultiByte 18661 6c8abb9a 18656->18661 18662 6c8abbc9 FreeEnvironmentStringsW 18656->18662 18657->18656 18657->18657 18674 6c8ab529 18658->18674 18663 6c8aa5c3 __malloc_crt 67 API calls 18659->18663 18847 6c8aa5c3 18661->18847 18662->18658 18665 6c8abc07 18663->18665 18667 6c8abc1a ___crtGetEnvironmentStringsA 18665->18667 18668 6c8abc0e FreeEnvironmentStringsA 18665->18668 18672 6c8abc24 FreeEnvironmentStringsA 18667->18672 18668->18658 18669 6c8abba8 WideCharToMultiByte 18670 6c8abbba 18669->18670 18671 6c8abbc2 18669->18671 18673 6c8a4618 __freebuf 67 API calls 18670->18673 18671->18662 18672->18658 18673->18671 19092 6c8a53bc 18674->19092 18676 6c8ab535 GetStartupInfoA 18677 6c8aa608 __calloc_crt 67 API calls 18676->18677 18678 6c8ab556 18677->18678 18679 6c8ab774 ___DllMainCRTStartup 18678->18679 18682 6c8aa608 __calloc_crt 67 API calls 18678->18682 18684 6c8ab6bb 18678->18684 18685 6c8ab63e 18678->18685 18679->18593 18680 6c8ab6f1 GetStdHandle 18680->18684 18681 6c8ab756 SetHandleCount 18681->18679 18682->18678 18683 6c8ab703 GetFileType 18683->18684 18684->18679 18684->18680 18684->18681 18684->18683 18687 6c8ae1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 18684->18687 18685->18679 18685->18684 18686 6c8ab667 GetFileType 18685->18686 18688 6c8ae1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 18685->18688 18686->18685 18687->18684 18688->18685 18690 6c8aba58 18689->18690 18691 6c8aba5d GetModuleFileNameA 18689->18691 19099 6c8b02ad 18690->19099 18693 6c8aba84 18691->18693 19093 6c8ab8a9 18693->19093 18696 6c8a47c1 18696->18602 18702 6c8ab7cb 18696->18702 18697 6c8abac0 18698 6c8aa5c3 __malloc_crt 67 API calls 18697->18698 18699 6c8abac6 18698->18699 18699->18696 18700 6c8ab8a9 _parse_cmdline 77 API calls 18699->18700 18701 6c8abae0 18700->18701 18701->18696 18703 6c8ab7d4 18702->18703 18705 6c8ab7d9 _strlen 18702->18705 18704 6c8b02ad ___initmbctable 111 API calls 18703->18704 18704->18705 18706 6c8aa608 __calloc_crt 67 API calls 18705->18706 18709 6c8a47ca 18705->18709 18712 6c8ab80e _strlen 18706->18712 18707 6c8ab86c 18708 6c8a4618 __freebuf 67 API calls 18707->18708 18708->18709 18709->18602 18717 6c8a5cbe 18709->18717 18710 6c8aa608 __calloc_crt 67 API calls 18710->18712 18711 6c8ab892 18713 6c8a4618 __freebuf 67 API calls 18711->18713 18712->18707 18712->18709 18712->18710 18712->18711 18714 6c8b0997 _strcpy_s 67 API calls 18712->18714 18715 6c8ab853 18712->18715 18713->18709 18714->18712 18715->18712 18716 6c8a8034 __invoke_watson 10 API calls 18715->18716 18716->18715 18719 6c8a5ccc __IsNonwritableInCurrentImage 18717->18719 19403 6c8adf82 18719->19403 18720 6c8a5cea __initterm_e 18722 6c8a5d09 __IsNonwritableInCurrentImage __initterm 18720->18722 19407 6c8a44b4 18720->19407 18722->18602 18724 6c8aa72d 18723->18724 18725 6c8aa784 HeapDestroy 18723->18725 18726 6c8aa772 HeapFree 18724->18726 18727 6c8aa749 VirtualFree HeapFree 18724->18727 18725->18607 18726->18725 18727->18727 18728 6c8aa771 18727->18728 18728->18726 18730 6c8aa0ec 18729->18730 18731 6c8aa0f8 18729->18731 18732 6c8aa033 __decode_pointer 6 API calls 18730->18732 18733 6c8aa11a 18731->18733 18734 6c8aa10c TlsFree 18731->18734 18732->18731 18735 6c8aa7ff RtlDeleteCriticalSection 18733->18735 18736 6c8aa817 18733->18736 18734->18733 18737 6c8a4618 __freebuf 67 API calls 18735->18737 18738 6c8aa829 RtlDeleteCriticalSection 18736->18738 18739 6c8aa837 18736->18739 18737->18733 18738->18736 18739->18600 18741 6c8ab786 18740->18741 18742 6c8ab7c8 18741->18742 18743 6c8ab79a RtlDeleteCriticalSection 18741->18743 18744 6c8a4618 __freebuf 67 API calls 18741->18744 18742->18594 18743->18741 18744->18741 19510 6c8a5d43 18745->19510 18747 6c8a5e90 18747->18570 18749 6c8a482d 18748->18749 18750 6c8aa0c3 18748->18750 18753 6c8aa608 18749->18753 18751 6c8aa033 __decode_pointer 6 API calls 18750->18751 18752 6c8aa0ce TlsSetValue 18751->18752 18752->18749 18756 6c8aa611 18753->18756 18755 6c8a4839 18755->18607 18759 6c8aa033 TlsGetValue 18755->18759 18756->18755 18757 6c8aa62f Sleep 18756->18757 19533 6c8ab40b 18756->19533 18758 6c8aa644 18757->18758 18758->18755 18758->18756 18760 6c8aa04b 18759->18760 18761 6c8aa06c GetModuleHandleW 18759->18761 18760->18761 18762 6c8aa055 TlsGetValue 18760->18762 18763 6c8aa07c 18761->18763 18764 6c8aa087 GetProcAddress 18761->18764 18766 6c8aa060 18762->18766 18765 6c8a5bcf __crt_waiting_on_module_handle 2 API calls 18763->18765 18768 6c8a4857 18764->18768 18767 6c8aa082 18765->18767 18766->18761 18766->18768 18767->18764 18767->18768 18768->18591 18768->18592 19550 6c8a53bc 18769->19550 18771 6c8aa12b GetModuleHandleW 18772 6c8aa13b 18771->18772 18773 6c8aa141 18771->18773 18774 6c8a5bcf __crt_waiting_on_module_handle 2 API calls 18772->18774 18775 6c8aa159 GetProcAddress GetProcAddress 18773->18775 18776 6c8aa17d 18773->18776 18774->18773 18775->18776 18777 6c8aa914 __lock 63 API calls 18776->18777 18778 6c8aa19c InterlockedIncrement 18777->18778 19551 6c8aa1f4 18778->19551 18781 6c8aa914 __lock 63 API calls 18782 6c8aa1bd 18781->18782 18783 6c8b0414 ___addlocaleref 8 API calls 18782->18783 18784 6c8aa1db 18783->18784 19554 6c8aa1fd 18784->19554 18786 6c8aa1e8 ___DllMainCRTStartup 18786->18599 18788 6c8a4624 ___DllMainCRTStartup 18787->18788 18790 6c8aa914 __lock 65 API calls 18788->18790 18794 6c8a469d __dosmaperr ___DllMainCRTStartup 18788->18794 18799 6c8a4663 18788->18799 18789 6c8a4678 HeapFree 18791 6c8a468a 18789->18791 18789->18794 18795 6c8a463b ___sbh_find_block 18790->18795 18792 6c8a5348 strtoxl 65 API calls 18791->18792 18793 6c8a468f GetLastError 18792->18793 18793->18794 18794->18607 18796 6c8a4655 18795->18796 19559 6c8aa977 18795->19559 19566 6c8a466e 18796->19566 18799->18789 18799->18794 18801 6c8aa421 18800->18801 18802 6c8aa3d6 18800->18802 18803 6c8aa42b TlsSetValue 18801->18803 18804 6c8aa434 18801->18804 18805 6c8aa3dc TlsGetValue 18802->18805 18806 6c8aa3ff 18802->18806 18803->18804 18804->18607 18805->18806 18807 6c8aa3ef TlsGetValue 18805->18807 18808 6c8aa033 __decode_pointer 6 API calls 18806->18808 18807->18806 18809 6c8aa416 18808->18809 19574 6c8aa299 18809->19574 18812 6c8a5bda Sleep GetModuleHandleW 18811->18812 18813 6c8a5bf8 18812->18813 18814 6c8a5bfc 18812->18814 18813->18812 18813->18814 18814->18616 18836 6c8aa02a 18815->18836 18817 6c8a5e9c __init_pointers __initp_misc_winsig 18839 6c8acdf3 18817->18839 18820 6c8a9fb8 __encode_pointer 6 API calls 18821 6c8a5ed8 18820->18821 18822 6c8a9fb8 TlsGetValue 18821->18822 18823 6c8a9fd0 18822->18823 18824 6c8a9ff1 GetModuleHandleW 18822->18824 18823->18824 18825 6c8a9fda TlsGetValue 18823->18825 18826 6c8aa00c GetProcAddress 18824->18826 18827 6c8aa001 18824->18827 18830 6c8a9fe5 18825->18830 18828 6c8a9fe9 18826->18828 18829 6c8a5bcf __crt_waiting_on_module_handle 2 API calls 18827->18829 18828->18631 18831 6c8aa007 18829->18831 18830->18824 18830->18828 18831->18826 18831->18828 18833 6c8aa7a3 18832->18833 18835 6c8aa550 18833->18835 18842 6c8ae1d3 18833->18842 18835->18619 18835->18639 18837 6c8a9fb8 __encode_pointer 6 API calls 18836->18837 18838 6c8aa031 18837->18838 18838->18817 18840 6c8a9fb8 __encode_pointer 6 API calls 18839->18840 18841 6c8a5ece 18840->18841 18841->18820 18846 6c8a53bc 18842->18846 18844 6c8ae1df InitializeCriticalSectionAndSpinCount 18845 6c8ae223 ___DllMainCRTStartup 18844->18845 18845->18833 18846->18844 18849 6c8aa5cc 18847->18849 18850 6c8aa602 18849->18850 18851 6c8aa5e3 Sleep 18849->18851 18852 6c8a49fe 18849->18852 18850->18662 18850->18669 18851->18849 18853 6c8a4ab1 18852->18853 18862 6c8a4a10 18852->18862 18854 6c8ac08e _realloc 6 API calls 18853->18854 18855 6c8a4ab7 18854->18855 18857 6c8a5348 strtoxl 66 API calls 18855->18857 18868 6c8a4aa9 18857->18868 18860 6c8a4a6d RtlAllocateHeap 18860->18862 18862->18860 18863 6c8a4a9d 18862->18863 18866 6c8a4aa2 18862->18866 18862->18868 18869 6c8ac046 18862->18869 18878 6c8abe9b 18862->18878 18912 6c8a5c53 18862->18912 18915 6c8a49af 18862->18915 18923 6c8ac08e 18862->18923 18926 6c8a5348 18863->18926 18867 6c8a5348 strtoxl 66 API calls 18866->18867 18867->18868 18868->18849 18929 6c8b0cfc 18869->18929 18872 6c8abe9b __NMSG_WRITE 67 API calls 18874 6c8ac072 18872->18874 18873 6c8b0cfc __set_error_mode 67 API calls 18876 6c8ac05a 18873->18876 18877 6c8abe9b __NMSG_WRITE 67 API calls 18874->18877 18875 6c8ac07c 18875->18862 18876->18872 18876->18875 18877->18875 18879 6c8abeaf 18878->18879 18880 6c8b0cfc __set_error_mode 64 API calls 18879->18880 18911 6c8ac00a 18879->18911 18881 6c8abed1 18880->18881 18882 6c8ac00f GetStdHandle 18881->18882 18883 6c8b0cfc __set_error_mode 64 API calls 18881->18883 18885 6c8ac01d _strlen 18882->18885 18882->18911 18884 6c8abee2 18883->18884 18884->18882 18886 6c8abef4 18884->18886 18887 6c8ac036 WriteFile 18885->18887 18885->18911 18886->18911 18938 6c8b0997 18886->18938 18887->18911 18890 6c8abf2a GetModuleFileNameA 18892 6c8abf48 18890->18892 18896 6c8abf6b _strlen 18890->18896 18894 6c8b0997 _strcpy_s 64 API calls 18892->18894 18895 6c8abf58 18894->18895 18895->18896 18898 6c8a8034 __invoke_watson 10 API calls 18895->18898 18897 6c8abfae 18896->18897 18954 6c8b0c47 18896->18954 18963 6c8b0bd3 18897->18963 18898->18896 18902 6c8abfd2 18905 6c8b0bd3 _strcat_s 64 API calls 18902->18905 18904 6c8a8034 __invoke_watson 10 API calls 18904->18902 18906 6c8abfe6 18905->18906 18908 6c8abff7 18906->18908 18909 6c8a8034 __invoke_watson 10 API calls 18906->18909 18907 6c8a8034 __invoke_watson 10 API calls 18907->18897 18972 6c8b0a6a 18908->18972 18909->18908 18911->18862 19010 6c8a5c28 GetModuleHandleW 18912->19010 18916 6c8a49bb ___DllMainCRTStartup 18915->18916 18917 6c8a49ec ___DllMainCRTStartup 18916->18917 19013 6c8aa914 18916->19013 18917->18862 18919 6c8a49d1 19020 6c8ab126 18919->19020 18924 6c8aa033 __decode_pointer 6 API calls 18923->18924 18925 6c8ac09e 18924->18925 18925->18862 19078 6c8aa206 GetLastError 18926->19078 18928 6c8a534d 18928->18866 18930 6c8b0d0b 18929->18930 18931 6c8a5348 strtoxl 67 API calls 18930->18931 18932 6c8ac04d 18930->18932 18933 6c8b0d2e 18931->18933 18932->18873 18932->18876 18935 6c8a815c 18933->18935 18936 6c8aa033 __decode_pointer 6 API calls 18935->18936 18937 6c8a816c __invoke_watson 18936->18937 18939 6c8b09a8 18938->18939 18940 6c8b09af 18938->18940 18939->18940 18943 6c8b09d5 18939->18943 18941 6c8a5348 strtoxl 67 API calls 18940->18941 18946 6c8b09b4 18941->18946 18942 6c8a815c strtoxl 6 API calls 18945 6c8abf16 18942->18945 18944 6c8a5348 strtoxl 67 API calls 18943->18944 18943->18945 18944->18946 18945->18890 18947 6c8a8034 18945->18947 18946->18942 18999 6c8a55b0 18947->18999 18949 6c8a8061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18950 6c8a813d GetCurrentProcess TerminateProcess 18949->18950 18951 6c8a8131 __invoke_watson 18949->18951 19001 6c8a3f34 18950->19001 18951->18950 18953 6c8a815a 18953->18890 18957 6c8b0c59 18954->18957 18955 6c8b0c5d 18956 6c8a5348 strtoxl 67 API calls 18955->18956 18958 6c8abf9b 18955->18958 18962 6c8b0c79 18956->18962 18957->18955 18957->18958 18960 6c8b0ca3 18957->18960 18958->18897 18958->18907 18959 6c8a815c strtoxl 6 API calls 18959->18958 18960->18958 18961 6c8a5348 strtoxl 67 API calls 18960->18961 18961->18962 18962->18959 18966 6c8b0beb 18963->18966 18967 6c8b0be4 18963->18967 18964 6c8a5348 strtoxl 67 API calls 18965 6c8b0bf0 18964->18965 18968 6c8a815c strtoxl 6 API calls 18965->18968 18966->18964 18967->18966 18970 6c8b0c1f 18967->18970 18969 6c8abfc1 18968->18969 18969->18902 18969->18904 18970->18969 18971 6c8a5348 strtoxl 67 API calls 18970->18971 18971->18965 18973 6c8aa02a _doexit 6 API calls 18972->18973 18974 6c8b0a7a 18973->18974 18975 6c8b0a8d LoadLibraryA 18974->18975 18977 6c8b0b15 18974->18977 18976 6c8b0aa2 GetProcAddress 18975->18976 18985 6c8b0bb7 18975->18985 18978 6c8b0ab8 18976->18978 18976->18985 18981 6c8aa033 __decode_pointer 6 API calls 18977->18981 18994 6c8b0b3f 18977->18994 18982 6c8a9fb8 __encode_pointer 6 API calls 18978->18982 18979 6c8aa033 __decode_pointer 6 API calls 18979->18985 18980 6c8aa033 __decode_pointer 6 API calls 18992 6c8b0b82 18980->18992 18983 6c8b0b32 18981->18983 18984 6c8b0abe GetProcAddress 18982->18984 18986 6c8aa033 __decode_pointer 6 API calls 18983->18986 18987 6c8a9fb8 __encode_pointer 6 API calls 18984->18987 18985->18911 18986->18994 18988 6c8b0ad3 GetProcAddress 18987->18988 18989 6c8a9fb8 __encode_pointer 6 API calls 18988->18989 18990 6c8b0ae8 GetProcAddress 18989->18990 18991 6c8a9fb8 __encode_pointer 6 API calls 18990->18991 18995 6c8b0afd 18991->18995 18993 6c8aa033 __decode_pointer 6 API calls 18992->18993 18996 6c8b0b6a 18992->18996 18993->18996 18994->18980 18994->18996 18995->18977 18997 6c8b0b07 GetProcAddress 18995->18997 18996->18979 18998 6c8a9fb8 __encode_pointer 6 API calls 18997->18998 18998->18977 19000 6c8a55bc __VEC_memzero 18999->19000 19000->18949 19002 6c8a3f3e IsDebuggerPresent 19001->19002 19003 6c8a3f3c 19001->19003 19009 6c8aee35 19002->19009 19003->18953 19006 6c8a7c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 19007 6c8a7c9b __invoke_watson 19006->19007 19008 6c8a7ca3 GetCurrentProcess TerminateProcess 19006->19008 19007->19008 19008->18953 19009->19006 19011 6c8a5c3c GetProcAddress 19010->19011 19012 6c8a5c4c ExitProcess 19010->19012 19011->19012 19014 6c8aa929 19013->19014 19015 6c8aa93c RtlEnterCriticalSection 19013->19015 19029 6c8aa851 19014->19029 19015->18919 19017 6c8aa92f 19017->19015 19055 6c8a5bff 19017->19055 19021 6c8ab154 19020->19021 19022 6c8ab1ed 19021->19022 19025 6c8a49dc 19021->19025 19066 6c8aac8d 19021->19066 19022->19025 19073 6c8aad3d 19022->19073 19026 6c8a49f5 19025->19026 19077 6c8aa83a RtlLeaveCriticalSection 19026->19077 19028 6c8a49fc 19028->18917 19030 6c8aa85d ___DllMainCRTStartup 19029->19030 19031 6c8aa883 19030->19031 19032 6c8ac046 __FF_MSGBANNER 67 API calls 19030->19032 19033 6c8aa5c3 __malloc_crt 67 API calls 19031->19033 19037 6c8aa893 ___DllMainCRTStartup 19031->19037 19034 6c8aa872 19032->19034 19036 6c8aa89e 19033->19036 19035 6c8abe9b __NMSG_WRITE 67 API calls 19034->19035 19038 6c8aa879 19035->19038 19039 6c8aa8b4 19036->19039 19040 6c8aa8a5 19036->19040 19037->19017 19041 6c8a5c53 _doexit 3 API calls 19038->19041 19043 6c8aa914 __lock 67 API calls 19039->19043 19042 6c8a5348 strtoxl 67 API calls 19040->19042 19041->19031 19042->19037 19044 6c8aa8bb 19043->19044 19045 6c8aa8ef 19044->19045 19046 6c8aa8c3 19044->19046 19048 6c8a4618 __freebuf 67 API calls 19045->19048 19047 6c8ae1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 19046->19047 19049 6c8aa8ce 19047->19049 19050 6c8aa8e0 19048->19050 19049->19050 19051 6c8a4618 __freebuf 67 API calls 19049->19051 19062 6c8aa90b 19050->19062 19053 6c8aa8da 19051->19053 19054 6c8a5348 strtoxl 67 API calls 19053->19054 19054->19050 19056 6c8ac046 __FF_MSGBANNER 67 API calls 19055->19056 19057 6c8a5c09 19056->19057 19058 6c8abe9b __NMSG_WRITE 67 API calls 19057->19058 19059 6c8a5c11 19058->19059 19060 6c8aa033 __decode_pointer 6 API calls 19059->19060 19061 6c8a5c1c 19060->19061 19061->19015 19065 6c8aa83a RtlLeaveCriticalSection 19062->19065 19064 6c8aa912 19064->19037 19065->19064 19067 6c8aaca0 RtlReAllocateHeap 19066->19067 19068 6c8aacd4 RtlAllocateHeap 19066->19068 19069 6c8aacbe 19067->19069 19070 6c8aacc2 19067->19070 19068->19069 19071 6c8aacf7 VirtualAlloc 19068->19071 19069->19022 19070->19068 19071->19069 19072 6c8aad11 HeapFree 19071->19072 19072->19069 19074 6c8aad54 VirtualAlloc 19073->19074 19076 6c8aad9b 19074->19076 19076->19025 19077->19028 19079 6c8aa0ae ___set_flsgetvalue 8 API calls 19078->19079 19080 6c8aa21d 19079->19080 19081 6c8aa273 SetLastError 19080->19081 19082 6c8aa608 __calloc_crt 64 API calls 19080->19082 19081->18928 19083 6c8aa231 19082->19083 19083->19081 19084 6c8aa033 __decode_pointer 6 API calls 19083->19084 19085 6c8aa24b 19084->19085 19086 6c8aa26a 19085->19086 19087 6c8aa252 19085->19087 19089 6c8a4618 __freebuf 64 API calls 19086->19089 19088 6c8aa11f __mtinit 64 API calls 19087->19088 19090 6c8aa25a GetCurrentThreadId 19088->19090 19091 6c8aa270 19089->19091 19090->19081 19091->19081 19092->18676 19095 6c8ab8c8 19093->19095 19097 6c8ab935 19095->19097 19103 6c8b0a52 19095->19103 19096 6c8aba33 19096->18696 19096->18697 19097->19096 19098 6c8b0a52 77 API calls _parse_cmdline 19097->19098 19098->19097 19100 6c8b02bd 19099->19100 19101 6c8b02b6 19099->19101 19100->18691 19225 6c8b0113 19101->19225 19106 6c8b09ff 19103->19106 19109 6c8a8659 19106->19109 19110 6c8a866c 19109->19110 19116 6c8a86b9 19109->19116 19117 6c8aa27f 19110->19117 19113 6c8a8699 19113->19116 19137 6c8afe0e 19113->19137 19116->19095 19118 6c8aa206 __getptd_noexit 67 API calls 19117->19118 19119 6c8aa287 19118->19119 19120 6c8a8671 19119->19120 19121 6c8a5bff __amsg_exit 67 API calls 19119->19121 19120->19113 19122 6c8b057a 19120->19122 19121->19120 19123 6c8b0586 ___DllMainCRTStartup 19122->19123 19124 6c8aa27f __getptd 67 API calls 19123->19124 19125 6c8b058b 19124->19125 19126 6c8b05b9 19125->19126 19128 6c8b059d 19125->19128 19127 6c8aa914 __lock 67 API calls 19126->19127 19129 6c8b05c0 19127->19129 19130 6c8aa27f __getptd 67 API calls 19128->19130 19153 6c8b053c 19129->19153 19132 6c8b05a2 19130->19132 19135 6c8b05b0 ___DllMainCRTStartup 19132->19135 19136 6c8a5bff __amsg_exit 67 API calls 19132->19136 19135->19113 19136->19135 19138 6c8afe1a ___DllMainCRTStartup 19137->19138 19139 6c8aa27f __getptd 67 API calls 19138->19139 19140 6c8afe1f 19139->19140 19141 6c8aa914 __lock 67 API calls 19140->19141 19150 6c8afe31 19140->19150 19142 6c8afe4f 19141->19142 19143 6c8afe98 19142->19143 19147 6c8afe80 InterlockedIncrement 19142->19147 19148 6c8afe66 InterlockedDecrement 19142->19148 19221 6c8afea9 19143->19221 19144 6c8a5bff __amsg_exit 67 API calls 19146 6c8afe3f ___DllMainCRTStartup 19144->19146 19146->19116 19147->19143 19148->19147 19149 6c8afe71 19148->19149 19149->19147 19151 6c8a4618 __freebuf 67 API calls 19149->19151 19150->19144 19150->19146 19152 6c8afe7f 19151->19152 19152->19147 19154 6c8b0540 19153->19154 19160 6c8b0572 19153->19160 19154->19160 19164 6c8b0414 InterlockedIncrement 19154->19164 19156 6c8b0553 19156->19160 19176 6c8b04a3 19156->19176 19161 6c8b05e4 19160->19161 19220 6c8aa83a RtlLeaveCriticalSection 19161->19220 19163 6c8b05eb 19163->19132 19165 6c8b0432 InterlockedIncrement 19164->19165 19166 6c8b0435 19164->19166 19165->19166 19167 6c8b043f InterlockedIncrement 19166->19167 19168 6c8b0442 19166->19168 19167->19168 19169 6c8b044f 19168->19169 19170 6c8b044c InterlockedIncrement 19168->19170 19171 6c8b0459 InterlockedIncrement 19169->19171 19173 6c8b045c 19169->19173 19170->19169 19171->19173 19172 6c8b0475 InterlockedIncrement 19172->19173 19173->19172 19174 6c8b0485 InterlockedIncrement 19173->19174 19175 6c8b0490 InterlockedIncrement 19173->19175 19174->19173 19175->19156 19177 6c8b0537 19176->19177 19178 6c8b04b4 InterlockedDecrement 19176->19178 19177->19160 19190 6c8b02cb 19177->19190 19179 6c8b04c9 InterlockedDecrement 19178->19179 19180 6c8b04cc 19178->19180 19179->19180 19181 6c8b04d9 19180->19181 19182 6c8b04d6 InterlockedDecrement 19180->19182 19183 6c8b04e3 InterlockedDecrement 19181->19183 19184 6c8b04e6 19181->19184 19182->19181 19183->19184 19185 6c8b04f0 InterlockedDecrement 19184->19185 19187 6c8b04f3 19184->19187 19185->19187 19186 6c8b050c InterlockedDecrement 19186->19187 19187->19186 19188 6c8b051c InterlockedDecrement 19187->19188 19189 6c8b0527 InterlockedDecrement 19187->19189 19188->19187 19189->19177 19191 6c8b034f 19190->19191 19192 6c8b02e2 19190->19192 19193 6c8b039c 19191->19193 19194 6c8a4618 __freebuf 67 API calls 19191->19194 19192->19191 19201 6c8a4618 __freebuf 67 API calls 19192->19201 19203 6c8b0316 19192->19203 19195 6c8b2365 ___free_lc_time 67 API calls 19193->19195 19204 6c8b03c3 19193->19204 19196 6c8b0370 19194->19196 19197 6c8b03bc 19195->19197 19198 6c8a4618 __freebuf 67 API calls 19196->19198 19202 6c8a4618 __freebuf 67 API calls 19197->19202 19205 6c8b0383 19198->19205 19199 6c8a4618 __freebuf 67 API calls 19206 6c8b0344 19199->19206 19200 6c8b0408 19207 6c8a4618 __freebuf 67 API calls 19200->19207 19208 6c8b030b 19201->19208 19202->19204 19209 6c8a4618 __freebuf 67 API calls 19203->19209 19219 6c8b0337 19203->19219 19204->19200 19213 6c8a4618 67 API calls __freebuf 19204->19213 19210 6c8a4618 __freebuf 67 API calls 19205->19210 19214 6c8a4618 __freebuf 67 API calls 19206->19214 19215 6c8b040e 19207->19215 19216 6c8b253f ___free_lconv_mon 67 API calls 19208->19216 19211 6c8b032c 19209->19211 19212 6c8b0391 19210->19212 19217 6c8b24fa ___free_lconv_num 67 API calls 19211->19217 19218 6c8a4618 __freebuf 67 API calls 19212->19218 19213->19204 19214->19191 19215->19160 19216->19203 19217->19219 19218->19193 19219->19199 19220->19163 19224 6c8aa83a RtlLeaveCriticalSection 19221->19224 19223 6c8afeb0 19223->19150 19224->19223 19226 6c8b011f ___DllMainCRTStartup 19225->19226 19227 6c8aa27f __getptd 67 API calls 19226->19227 19228 6c8b0128 19227->19228 19229 6c8afe0e _LocaleUpdate::_LocaleUpdate 69 API calls 19228->19229 19230 6c8b0132 19229->19230 19256 6c8afeb2 19230->19256 19233 6c8aa5c3 __malloc_crt 67 API calls 19234 6c8b0153 19233->19234 19235 6c8b0272 ___DllMainCRTStartup 19234->19235 19263 6c8aff2e 19234->19263 19235->19100 19238 6c8b027f 19238->19235 19244 6c8a4618 __freebuf 67 API calls 19238->19244 19248 6c8b0292 19238->19248 19239 6c8b0183 InterlockedDecrement 19240 6c8b01a4 InterlockedIncrement 19239->19240 19241 6c8b0193 19239->19241 19240->19235 19243 6c8b01ba 19240->19243 19241->19240 19242 6c8a4618 __freebuf 67 API calls 19241->19242 19246 6c8b01a3 19242->19246 19243->19235 19247 6c8aa914 __lock 67 API calls 19243->19247 19244->19248 19245 6c8a5348 strtoxl 67 API calls 19245->19235 19246->19240 19250 6c8b01ce InterlockedDecrement 19247->19250 19248->19245 19251 6c8b024a 19250->19251 19252 6c8b025d InterlockedIncrement 19250->19252 19251->19252 19254 6c8a4618 __freebuf 67 API calls 19251->19254 19273 6c8b0274 19252->19273 19255 6c8b025c 19254->19255 19255->19252 19257 6c8a8659 _LocaleUpdate::_LocaleUpdate 77 API calls 19256->19257 19258 6c8afec6 19257->19258 19259 6c8afeef 19258->19259 19260 6c8afed1 GetOEMCP 19258->19260 19261 6c8afef4 GetACP 19259->19261 19262 6c8afee1 19259->19262 19260->19262 19261->19262 19262->19233 19262->19235 19264 6c8afeb2 getSystemCP 79 API calls 19263->19264 19265 6c8aff4e 19264->19265 19266 6c8aff59 setSBCS 19265->19266 19269 6c8aff9d IsValidCodePage 19265->19269 19272 6c8affc2 _memset __setmbcp_nolock 19265->19272 19267 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19266->19267 19268 6c8b0111 19267->19268 19268->19238 19268->19239 19269->19266 19270 6c8affaf GetCPInfo 19269->19270 19270->19266 19270->19272 19276 6c8afc7b GetCPInfo 19272->19276 19402 6c8aa83a RtlLeaveCriticalSection 19273->19402 19275 6c8b027b 19275->19235 19277 6c8afd61 19276->19277 19282 6c8afcaf _memset 19276->19282 19281 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19277->19281 19284 6c8afe0c 19281->19284 19286 6c8b2323 19282->19286 19284->19272 19285 6c8b2124 ___crtLCMapStringA 102 API calls 19285->19277 19287 6c8a8659 _LocaleUpdate::_LocaleUpdate 77 API calls 19286->19287 19288 6c8b2336 19287->19288 19296 6c8b2169 19288->19296 19291 6c8b2124 19292 6c8a8659 _LocaleUpdate::_LocaleUpdate 77 API calls 19291->19292 19293 6c8b2137 19292->19293 19355 6c8b1d7f 19293->19355 19297 6c8b218a GetStringTypeW 19296->19297 19301 6c8b21b5 19296->19301 19298 6c8b21aa GetLastError 19297->19298 19300 6c8b21a2 19297->19300 19298->19301 19299 6c8b229c 19324 6c8b4dbc GetLocaleInfoA 19299->19324 19302 6c8b21ee MultiByteToWideChar 19300->19302 19319 6c8b2296 19300->19319 19301->19299 19301->19300 19308 6c8b221b 19302->19308 19302->19319 19305 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19306 6c8afd1c 19305->19306 19306->19291 19307 6c8b22ed GetStringTypeA 19311 6c8b2308 19307->19311 19307->19319 19312 6c8b2230 _memset __crtGetStringTypeA_stat 19308->19312 19313 6c8a49fe _malloc 67 API calls 19308->19313 19310 6c8b2269 MultiByteToWideChar 19315 6c8b227f GetStringTypeW 19310->19315 19316 6c8b2290 19310->19316 19317 6c8a4618 __freebuf 67 API calls 19311->19317 19312->19310 19312->19319 19313->19312 19315->19316 19320 6c8b1006 19316->19320 19317->19319 19319->19305 19321 6c8b1012 19320->19321 19322 6c8b1023 19320->19322 19321->19322 19323 6c8a4618 __freebuf 67 API calls 19321->19323 19322->19319 19323->19322 19325 6c8b4dea 19324->19325 19326 6c8b4def 19324->19326 19328 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19325->19328 19327 6c8b1026 __tzset_nolock 90 API calls 19326->19327 19327->19325 19329 6c8b22c0 19328->19329 19329->19307 19329->19319 19330 6c8b4e05 19329->19330 19331 6c8b4e45 GetCPInfo 19330->19331 19335 6c8b4ecf 19330->19335 19332 6c8b4eba MultiByteToWideChar 19331->19332 19333 6c8b4e5c 19331->19333 19332->19335 19339 6c8b4e75 _strlen 19332->19339 19333->19332 19336 6c8b4e62 GetCPInfo 19333->19336 19334 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19337 6c8b22e1 19334->19337 19335->19334 19336->19332 19338 6c8b4e6f 19336->19338 19337->19307 19337->19319 19338->19332 19338->19339 19340 6c8a49fe _malloc 67 API calls 19339->19340 19342 6c8b4ea7 _memset __crtGetStringTypeA_stat 19339->19342 19340->19342 19341 6c8b4f04 MultiByteToWideChar 19343 6c8b4f1c 19341->19343 19347 6c8b4f3b 19341->19347 19342->19335 19342->19341 19345 6c8b4f23 WideCharToMultiByte 19343->19345 19346 6c8b4f40 19343->19346 19344 6c8b1006 __freea 67 API calls 19344->19335 19345->19347 19348 6c8b4f4b WideCharToMultiByte 19346->19348 19349 6c8b4f5f 19346->19349 19347->19344 19348->19347 19348->19349 19350 6c8aa608 __calloc_crt 67 API calls 19349->19350 19351 6c8b4f67 19350->19351 19351->19347 19352 6c8b4f70 WideCharToMultiByte 19351->19352 19352->19347 19353 6c8b4f82 19352->19353 19354 6c8a4618 __freebuf 67 API calls 19353->19354 19354->19347 19356 6c8b1da0 LCMapStringW 19355->19356 19360 6c8b1dbb 19355->19360 19357 6c8b1dc3 GetLastError 19356->19357 19356->19360 19357->19360 19358 6c8b1fb9 19362 6c8b4dbc ___ansicp 91 API calls 19358->19362 19359 6c8b1e15 19361 6c8b1e2e MultiByteToWideChar 19359->19361 19376 6c8b1fb0 19359->19376 19360->19358 19360->19359 19370 6c8b1e5b 19361->19370 19361->19376 19364 6c8b1fe1 19362->19364 19363 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19365 6c8afd3c 19363->19365 19366 6c8b1ffa 19364->19366 19367 6c8b20d5 LCMapStringA 19364->19367 19364->19376 19365->19285 19368 6c8b4e05 ___convertcp 74 API calls 19366->19368 19381 6c8b2031 19367->19381 19373 6c8b200c 19368->19373 19369 6c8b1eac MultiByteToWideChar 19374 6c8b1ec5 LCMapStringW 19369->19374 19397 6c8b1fa7 19369->19397 19371 6c8b1e74 __crtGetStringTypeA_stat 19370->19371 19372 6c8a49fe _malloc 67 API calls 19370->19372 19371->19369 19371->19376 19372->19371 19373->19376 19378 6c8b2016 LCMapStringA 19373->19378 19380 6c8b1ee6 19374->19380 19374->19397 19375 6c8a4618 __freebuf 67 API calls 19377 6c8b20fc 19375->19377 19376->19363 19377->19376 19383 6c8a4618 __freebuf 67 API calls 19377->19383 19378->19381 19386 6c8b2038 19378->19386 19379 6c8b1006 __freea 67 API calls 19379->19376 19382 6c8b1eef 19380->19382 19385 6c8b1f18 19380->19385 19381->19375 19381->19377 19384 6c8b1f01 LCMapStringW 19382->19384 19382->19397 19383->19376 19384->19397 19388 6c8b1f33 __crtGetStringTypeA_stat 19385->19388 19390 6c8a49fe _malloc 67 API calls 19385->19390 19389 6c8b2049 _memset __crtGetStringTypeA_stat 19386->19389 19391 6c8a49fe _malloc 67 API calls 19386->19391 19387 6c8b1f67 LCMapStringW 19392 6c8b1f7f WideCharToMultiByte 19387->19392 19393 6c8b1fa1 19387->19393 19388->19387 19388->19397 19389->19381 19395 6c8b2087 LCMapStringA 19389->19395 19390->19388 19391->19389 19392->19393 19394 6c8b1006 __freea 67 API calls 19393->19394 19394->19397 19398 6c8b20a3 19395->19398 19399 6c8b20a7 19395->19399 19397->19379 19401 6c8b1006 __freea 67 API calls 19398->19401 19400 6c8b4e05 ___convertcp 74 API calls 19399->19400 19400->19398 19401->19381 19402->19275 19404 6c8adf88 19403->19404 19405 6c8a9fb8 __encode_pointer 6 API calls 19404->19405 19406 6c8adfa0 19404->19406 19405->19404 19406->18720 19410 6c8a4478 19407->19410 19409 6c8a44c1 19409->18722 19411 6c8a4484 ___DllMainCRTStartup 19410->19411 19418 6c8a5c6b 19411->19418 19417 6c8a44a5 ___DllMainCRTStartup 19417->19409 19419 6c8aa914 __lock 67 API calls 19418->19419 19420 6c8a4489 19419->19420 19421 6c8a438d 19420->19421 19422 6c8aa033 __decode_pointer 6 API calls 19421->19422 19423 6c8a43a1 19422->19423 19424 6c8aa033 __decode_pointer 6 API calls 19423->19424 19425 6c8a43b1 19424->19425 19426 6c8a4434 19425->19426 19444 6c8a7637 19425->19444 19441 6c8a44ae 19426->19441 19428 6c8a43cf 19431 6c8a43ea 19428->19431 19432 6c8a43f9 19428->19432 19440 6c8a441b 19428->19440 19429 6c8a9fb8 __encode_pointer 6 API calls 19430 6c8a4429 19429->19430 19433 6c8a9fb8 __encode_pointer 6 API calls 19430->19433 19457 6c8aa654 19431->19457 19432->19426 19435 6c8a43f3 19432->19435 19433->19426 19435->19432 19436 6c8aa654 __realloc_crt 73 API calls 19435->19436 19437 6c8a440f 19435->19437 19438 6c8a4409 19436->19438 19439 6c8a9fb8 __encode_pointer 6 API calls 19437->19439 19438->19426 19438->19437 19439->19440 19440->19429 19506 6c8a5c74 19441->19506 19445 6c8a7643 ___DllMainCRTStartup 19444->19445 19446 6c8a7653 19445->19446 19447 6c8a7670 19445->19447 19449 6c8a5348 strtoxl 67 API calls 19446->19449 19448 6c8a76b1 RtlSizeHeap 19447->19448 19450 6c8aa914 __lock 67 API calls 19447->19450 19453 6c8a7668 ___DllMainCRTStartup 19448->19453 19451 6c8a7658 19449->19451 19454 6c8a7680 ___sbh_find_block 19450->19454 19452 6c8a815c strtoxl 6 API calls 19451->19452 19452->19453 19453->19428 19462 6c8a76d1 19454->19462 19459 6c8aa65d 19457->19459 19460 6c8aa69c 19459->19460 19461 6c8aa67d Sleep 19459->19461 19466 6c8a4ac8 19459->19466 19460->19435 19461->19459 19465 6c8aa83a RtlLeaveCriticalSection 19462->19465 19464 6c8a76ac 19464->19448 19464->19453 19465->19464 19467 6c8a4ad4 ___DllMainCRTStartup 19466->19467 19468 6c8a4adb 19467->19468 19469 6c8a4ae9 19467->19469 19470 6c8a49fe _malloc 67 API calls 19468->19470 19471 6c8a4afc 19469->19471 19472 6c8a4af0 19469->19472 19474 6c8a4ae3 __dosmaperr ___DllMainCRTStartup 19470->19474 19479 6c8a4c6e 19471->19479 19488 6c8a4b09 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 19471->19488 19473 6c8a4618 __freebuf 67 API calls 19472->19473 19473->19474 19474->19459 19475 6c8a4ca1 19477 6c8ac08e _realloc 6 API calls 19475->19477 19476 6c8a4c73 RtlReAllocateHeap 19476->19474 19476->19479 19480 6c8a4ca7 19477->19480 19478 6c8aa914 __lock 67 API calls 19478->19488 19479->19475 19479->19476 19482 6c8a4cc5 19479->19482 19483 6c8ac08e _realloc 6 API calls 19479->19483 19485 6c8a4cbb 19479->19485 19481 6c8a5348 strtoxl 67 API calls 19480->19481 19481->19474 19482->19474 19484 6c8a5348 strtoxl 67 API calls 19482->19484 19483->19479 19486 6c8a4cce GetLastError 19484->19486 19489 6c8a5348 strtoxl 67 API calls 19485->19489 19486->19474 19488->19474 19488->19475 19488->19478 19490 6c8a4b94 RtlAllocateHeap 19488->19490 19491 6c8a4be9 RtlReAllocateHeap 19488->19491 19493 6c8ab126 ___sbh_alloc_block 5 API calls 19488->19493 19494 6c8a4c54 19488->19494 19495 6c8ac08e _realloc 6 API calls 19488->19495 19497 6c8aa977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19488->19497 19499 6c8a4c37 19488->19499 19502 6c8a4c0c 19488->19502 19501 6c8a4c3c 19489->19501 19490->19488 19491->19488 19492 6c8a4c41 GetLastError 19492->19474 19493->19488 19494->19474 19496 6c8a5348 strtoxl 67 API calls 19494->19496 19495->19488 19498 6c8a4c61 19496->19498 19497->19488 19498->19474 19498->19486 19500 6c8a5348 strtoxl 67 API calls 19499->19500 19500->19501 19501->19474 19501->19492 19505 6c8aa83a RtlLeaveCriticalSection 19502->19505 19504 6c8a4c13 19504->19488 19505->19504 19509 6c8aa83a RtlLeaveCriticalSection 19506->19509 19508 6c8a44b3 19508->19417 19509->19508 19511 6c8a5d4f ___DllMainCRTStartup 19510->19511 19512 6c8aa914 __lock 67 API calls 19511->19512 19513 6c8a5d56 19512->19513 19515 6c8aa033 __decode_pointer 6 API calls 19513->19515 19519 6c8a5e0f __initterm 19513->19519 19517 6c8a5d8d 19515->19517 19517->19519 19521 6c8aa033 __decode_pointer 6 API calls 19517->19521 19518 6c8a5e57 ___DllMainCRTStartup 19518->18747 19527 6c8a5e5a 19519->19527 19525 6c8a5da2 19521->19525 19522 6c8a5e4e 19523 6c8a5c53 _doexit 3 API calls 19522->19523 19523->19518 19524 6c8aa02a 6 API calls _doexit 19524->19525 19525->19519 19525->19524 19526 6c8aa033 6 API calls __decode_pointer 19525->19526 19526->19525 19528 6c8a5e3b 19527->19528 19529 6c8a5e60 19527->19529 19528->19518 19531 6c8aa83a RtlLeaveCriticalSection 19528->19531 19532 6c8aa83a RtlLeaveCriticalSection 19529->19532 19531->19522 19532->19528 19534 6c8ab417 ___DllMainCRTStartup 19533->19534 19535 6c8ab42f 19534->19535 19545 6c8ab44e _memset 19534->19545 19536 6c8a5348 strtoxl 66 API calls 19535->19536 19537 6c8ab434 19536->19537 19539 6c8a815c strtoxl 6 API calls 19537->19539 19538 6c8ab4c0 RtlAllocateHeap 19538->19545 19542 6c8ab444 ___DllMainCRTStartup 19539->19542 19540 6c8ac08e _realloc 6 API calls 19540->19545 19541 6c8aa914 __lock 66 API calls 19541->19545 19542->18756 19543 6c8ab126 ___sbh_alloc_block 5 API calls 19543->19545 19545->19538 19545->19540 19545->19541 19545->19542 19545->19543 19546 6c8ab507 19545->19546 19549 6c8aa83a RtlLeaveCriticalSection 19546->19549 19548 6c8ab50e 19548->19545 19549->19548 19550->18771 19557 6c8aa83a RtlLeaveCriticalSection 19551->19557 19553 6c8aa1b6 19553->18781 19558 6c8aa83a RtlLeaveCriticalSection 19554->19558 19556 6c8aa204 19556->18786 19557->19553 19558->19556 19560 6c8aa9b6 19559->19560 19561 6c8aac58 19559->19561 19560->19561 19562 6c8aaba2 VirtualFree 19560->19562 19561->18796 19563 6c8aac06 19562->19563 19563->19561 19564 6c8aac15 VirtualFree HeapFree 19563->19564 19569 6c8a8190 19564->19569 19573 6c8aa83a RtlLeaveCriticalSection 19566->19573 19568 6c8a4675 19568->18799 19570 6c8a81a8 19569->19570 19571 6c8a81d7 19570->19571 19572 6c8a81cf __VEC_memcpy 19570->19572 19571->19561 19572->19571 19573->19568 19575 6c8aa2a5 ___DllMainCRTStartup 19574->19575 19576 6c8aa3a7 ___DllMainCRTStartup 19575->19576 19577 6c8aa2bd 19575->19577 19578 6c8a4618 __freebuf 67 API calls 19575->19578 19576->18801 19579 6c8aa2cb 19577->19579 19580 6c8a4618 __freebuf 67 API calls 19577->19580 19578->19577 19581 6c8aa2d9 19579->19581 19582 6c8a4618 __freebuf 67 API calls 19579->19582 19580->19579 19583 6c8aa2e7 19581->19583 19584 6c8a4618 __freebuf 67 API calls 19581->19584 19582->19581 19585 6c8aa2f5 19583->19585 19586 6c8a4618 __freebuf 67 API calls 19583->19586 19584->19583 19587 6c8aa303 19585->19587 19588 6c8a4618 __freebuf 67 API calls 19585->19588 19586->19585 19589 6c8aa311 19587->19589 19590 6c8a4618 __freebuf 67 API calls 19587->19590 19588->19587 19591 6c8aa322 19589->19591 19592 6c8a4618 __freebuf 67 API calls 19589->19592 19590->19589 19593 6c8aa914 __lock 67 API calls 19591->19593 19592->19591 19594 6c8aa32a 19593->19594 19595 6c8aa34f 19594->19595 19596 6c8aa336 InterlockedDecrement 19594->19596 19610 6c8aa3b3 19595->19610 19596->19595 19598 6c8aa341 19596->19598 19598->19595 19600 6c8a4618 __freebuf 67 API calls 19598->19600 19600->19595 19601 6c8aa914 __lock 67 API calls 19602 6c8aa363 19601->19602 19603 6c8aa394 19602->19603 19605 6c8b04a3 ___removelocaleref 8 API calls 19602->19605 19613 6c8aa3bf 19603->19613 19608 6c8aa378 19605->19608 19607 6c8a4618 __freebuf 67 API calls 19607->19576 19608->19603 19609 6c8b02cb ___freetlocinfo 67 API calls 19608->19609 19609->19603 19616 6c8aa83a RtlLeaveCriticalSection 19610->19616 19612 6c8aa35c 19612->19601 19617 6c8aa83a RtlLeaveCriticalSection 19613->19617 19615 6c8aa3a1 19615->19607 19616->19612 19617->19615 19623 6c89c050 19618->19623 19620 6c89af00 19621 6c89af23 19620->19621 19634 6c89bb0c 19620->19634 19621->18611 19626 6c89c05c __EH_prolog3 19623->19626 19625 6c89c0aa 19658 6c89ba5b RtlEnterCriticalSection 19625->19658 19626->19625 19640 6c89bd66 TlsAlloc 19626->19640 19644 6c89bc4e RtlEnterCriticalSection 19626->19644 19665 6c896dc1 19626->19665 19631 6c89c0bd 19670 6c89be0d 19631->19670 19632 6c89c0d0 ctype 19632->19620 19635 6c89bb18 __EH_prolog3_catch 19634->19635 19636 6c89bb41 ctype 19635->19636 19712 6c89c220 19635->19712 19636->19620 19638 6c89bb27 19722 6c89c292 19638->19722 19641 6c89bd92 19640->19641 19642 6c89bd97 RtlInitializeCriticalSection 19640->19642 19692 6c896d89 19641->19692 19642->19626 19649 6c89bc71 19644->19649 19645 6c89bd47 RtlLeaveCriticalSection 19645->19626 19646 6c89bcaa ___DllMainCRTStartup 19650 6c89bcb2 GlobalAlloc 19646->19650 19647 6c89bcbf GlobalHandle GlobalUnlock 19698 6c8969d7 19647->19698 19649->19646 19649->19647 19657 6c89bd30 _memset 19649->19657 19652 6c89bce9 19650->19652 19651 6c89bcdd GlobalReAlloc 19651->19652 19653 6c89bd10 GlobalLock 19652->19653 19654 6c89bd02 RtlLeaveCriticalSection 19652->19654 19655 6c89bcf4 GlobalHandle GlobalLock 19652->19655 19653->19657 19656 6c896d89 ___DllMainCRTStartup RaiseException 19654->19656 19655->19654 19656->19653 19657->19645 19659 6c89ba9d RtlLeaveCriticalSection 19658->19659 19660 6c89ba76 19658->19660 19662 6c89baa6 19659->19662 19660->19659 19661 6c89ba7b TlsGetValue 19660->19661 19661->19659 19663 6c89ba87 19661->19663 19662->19631 19662->19632 19663->19659 19664 6c89ba8c RtlLeaveCriticalSection 19663->19664 19664->19662 19666 6c8a527b __CxxThrowException@8 RaiseException 19665->19666 19667 6c896ddc __EH_prolog3 19666->19667 19700 6c89ba28 LocalAlloc 19667->19700 19669 6c896df3 ctype 19669->19626 19704 6c8a50fc 19670->19704 19672 6c89be19 RtlEnterCriticalSection 19673 6c89be38 19672->19673 19678 6c89bf1c RtlLeaveCriticalSection 19672->19678 19675 6c89be41 TlsGetValue 19673->19675 19673->19678 19677 6c89be7f 19675->19677 19687 6c89be4f 19675->19687 19676 6c89bf3f ctype 19676->19632 19679 6c89ba28 ctype 2 API calls 19677->19679 19678->19676 19680 6c89be89 19679->19680 19705 6c89bbbf 19680->19705 19681 6c89be69 ___DllMainCRTStartup 19683 6c89be73 LocalAlloc 19681->19683 19682 6c89bec4 ___DllMainCRTStartup 19685 6c89bed0 LocalReAlloc 19682->19685 19686 6c89bedc 19683->19686 19685->19686 19688 6c89beee _memset 19686->19688 19689 6c89bee0 RtlLeaveCriticalSection 19686->19689 19687->19678 19687->19681 19687->19682 19691 6c89bf07 TlsSetValue 19688->19691 19690 6c896d89 ___DllMainCRTStartup RaiseException 19689->19690 19690->19688 19691->19678 19695 6c8a527b 19692->19695 19694 6c896da4 19696 6c8a52b0 RaiseException 19695->19696 19697 6c8a52a4 19695->19697 19696->19694 19697->19696 19699 6c8969ec ___DllMainCRTStartup 19698->19699 19699->19651 19701 6c89ba3c 19700->19701 19702 6c89ba41 19700->19702 19703 6c896d89 ___DllMainCRTStartup RaiseException 19701->19703 19702->19669 19703->19702 19704->19672 19708 6c89bba5 19705->19708 19709 6c89bbb0 19708->19709 19710 6c89bbb5 19708->19710 19711 6c896dc1 ctype 2 API calls 19709->19711 19710->19687 19711->19710 19713 6c89c230 19712->19713 19715 6c89c235 19712->19715 19714 6c896dc1 ctype 2 API calls 19713->19714 19714->19715 19716 6c89c243 19715->19716 19726 6c89c1b7 19715->19726 19717 6c89c27f RtlEnterCriticalSection 19716->19717 19718 6c89c255 RtlEnterCriticalSection 19716->19718 19717->19638 19720 6c89c261 RtlInitializeCriticalSection 19718->19720 19721 6c89c274 RtlLeaveCriticalSection 19718->19721 19720->19721 19721->19717 19723 6c89c29f 19722->19723 19724 6c89c2a4 RtlLeaveCriticalSection 19722->19724 19725 6c896dc1 ctype 2 API calls 19723->19725 19724->19636 19725->19724 19727 6c89c1c0 RtlInitializeCriticalSection 19726->19727 19728 6c89c1d5 19726->19728 19727->19728 19728->19716 19729 6c8b72b3 19732 6c898495 19729->19732 19733 6c89aef1 ___DllMainCRTStartup 31 API calls 19732->19733 19734 6c8984a0 19733->19734 19735 6c89c220 ___DllMainCRTStartup 7 API calls 19734->19735 19736 6c8984a9 19735->19736 19737 6c89bbbf ___DllMainCRTStartup 2 API calls 19736->19737 19738 6c8984b4 19737->19738 19739 6c89c292 ___DllMainCRTStartup 3 API calls 19738->19739 19740 6c8984bb 19739->19740 19741 6c8939b0 19742 6c8939ee 19741->19742 19775 6c891990 19742->19775 19744 6c893a0a 19781 6c892370 19744->19781 19746 6c893a69 19811 6c891a10 19746->19811 19748 6c893b12 19749 6c893b77 19748->19749 19750 6c893b16 19748->19750 19752 6c893c3b 19749->19752 19753 6c893b81 19749->19753 19785 6c891000 19750->19785 19879 6c892c10 19752->19879 19847 6c893090 19753->19847 19757 6c893c49 19889 6c8915f0 19757->19889 19759 6c893b8c 19856 6c8931f0 19759->19856 19766 6c893b4c ctype 19842 6c897202 19766->19842 19767 6c893b65 19898 6c895590 19767->19898 19776 6c8919b4 19775->19776 19914 6c8968e2 19776->19914 19779 6c8968e2 ctype 67 API calls 19780 6c8919e7 19779->19780 19780->19744 19782 6c89239f 19781->19782 19782->19782 19918 6c8914a0 19782->19918 19784 6c89240f 19784->19746 19786 6c89102d 19785->19786 19787 6c8931f0 102 API calls 19786->19787 19788 6c891068 19787->19788 19789 6c8915f0 67 API calls 19788->19789 19790 6c891077 19789->19790 19791 6c893e60 19790->19791 19954 6c8a3d6c 19791->19954 19793 6c894443 19794 6c8968e2 ctype 67 API calls 19793->19794 19796 6c894460 19794->19796 19795 6c893b35 19818 6c895070 19795->19818 19797 6c8a527b __CxxThrowException@8 RaiseException 19796->19797 19798 6c8944ae 19797->19798 19799 6c896dc1 ctype 2 API calls 19798->19799 19799->19795 19800 6c8968e2 ctype 67 API calls 19807 6c893ea7 _memset 19800->19807 19802 6c8940fd 19802->19807 19810 6c896750 ReadFile 19802->19810 19988 6c895e70 19802->19988 19994 6c896230 19802->19994 19999 6c8963f0 19802->19999 19806 6c89afc3 69 API calls 19806->19807 19807->19793 19807->19795 19807->19798 19807->19800 19807->19802 19807->19806 19964 6c895ca0 19807->19964 19977 6c896160 19807->19977 19982 6c89b1ec 19807->19982 19810->19802 20027 6c89764f 19811->20027 19813 6c891af7 19813->19748 19814 6c891a59 19814->19813 20042 6c8972fd 19814->20042 19816 6c891ab1 GetDiskFreeSpaceW 19816->19813 19840 6c8950a6 19818->19840 19819 6c8953de 19820 6c896dc1 ctype 2 API calls 19819->19820 19822 6c8953e3 19820->19822 19821 6c8952bf 20187 6c8947d0 19821->20187 19825 6c8968e2 ctype 67 API calls 19822->19825 19823 6c89538f 19827 6c8968e2 ctype 67 API calls 19823->19827 19831 6c8953ea 19825->19831 19826 6c89525a 19826->19819 19826->19821 19826->19822 20183 6c8945f0 19826->20183 19833 6c895396 19827->19833 19832 6c8a527b __CxxThrowException@8 RaiseException 19831->19832 19835 6c895432 19832->19835 19834 6c8a527b __CxxThrowException@8 RaiseException 19833->19834 19834->19819 19837 6c89530c 19837->19766 19838 6c8931f0 102 API calls 19838->19840 19839 6c892600 101 API calls 19839->19840 19840->19819 19840->19823 19840->19826 19840->19838 19840->19839 20129 6c894880 19840->20129 20149 6c894ac0 19840->20149 20172 6c8962d0 19840->20172 20177 6c895490 19840->20177 19843 6c897220 ctype 19842->19843 19844 6c897212 CloseHandle 19842->19844 19845 6c897244 ctype 19843->19845 19846 6c897236 GetLastError 19843->19846 19844->19843 19845->19767 19846->19845 20257 6c892f60 19847->20257 19849 6c89309f 19850 6c8930bc 19849->19850 19851 6c8930a7 19849->19851 20279 6c891580 19850->20279 20271 6c893370 19851->20271 19854 6c8930b8 19854->19759 19855 6c8930c7 19855->19759 19857 6c893222 19856->19857 19858 6c89aef1 ___DllMainCRTStartup 31 API calls 19857->19858 19859 6c893254 19858->19859 20288 6c8933f0 FindResourceExW 19859->20288 19861 6c893268 19862 6c89326c 19861->19862 19863 6c89aef1 ___DllMainCRTStartup 31 API calls 19861->19863 19864 6c891580 67 API calls 19862->19864 19865 6c8932bf 19863->19865 19866 6c893279 19864->19866 19867 6c8933f0 71 API calls 19865->19867 19876 6c892600 19866->19876 19868 6c8932d3 19867->19868 19869 6c893308 19868->19869 19870 6c8932d7 19868->19870 19872 6c89a58c 31 API calls 19869->19872 19871 6c891580 67 API calls 19870->19871 19871->19866 19873 6c89330e 19872->19873 19873->19862 19874 6c893325 19873->19874 19875 6c892b50 98 API calls 19874->19875 19875->19866 20302 6c891240 19876->20302 19878 6c892613 19878->19767 19880 6c892c51 19879->19880 19881 6c892cc0 19880->19881 19883 6c8931f0 102 API calls 19880->19883 19882 6c8931f0 102 API calls 19881->19882 19884 6c892cf9 19882->19884 19885 6c892cad 19883->19885 19886 6c892600 101 API calls 19884->19886 19887 6c8a44cb 67 API calls 19885->19887 19888 6c892d0b ctype 19886->19888 19887->19881 19888->19757 19890 6c89165a 19889->19890 19891 6c891606 19889->19891 19890->19767 19892 6c891646 19891->19892 19894 6c891616 19891->19894 19893 6c8914a0 67 API calls 19892->19893 19895 6c891652 19893->19895 19896 6c891580 67 API calls 19894->19896 19895->19767 19897 6c89161d 19896->19897 19897->19767 19899 6c8955bb 19898->19899 19903 6c893d8b 19898->19903 19900 6c8931f0 102 API calls 19899->19900 19899->19903 19901 6c8955d1 19900->19901 19902 6c892600 101 API calls 19901->19902 19902->19903 19904 6c892490 19903->19904 19905 6c8924d1 ctype 19904->19905 20566 6c897343 19905->20566 19916 6c8968ea 19914->19916 19915 6c8a49fe _malloc 67 API calls 19915->19916 19916->19915 19917 6c8919be 19916->19917 19917->19779 19919 6c8914ac ctype 19918->19919 19920 6c8914b6 19918->19920 19919->19784 19921 6c8914ed 19920->19921 19928 6c8913f0 19920->19928 19923 6c89150a 19921->19923 19924 6c8914fd 19921->19924 19945 6c8a3f43 19923->19945 19933 6c8a3fc0 19924->19933 19927 6c891508 19927->19784 19929 6c891330 19928->19929 19930 6c8913b0 19929->19930 19931 6c8a3f43 _memcpy_s 67 API calls 19929->19931 19930->19921 19932 6c89137d 19931->19932 19932->19921 19934 6c8a3fd0 19933->19934 19935 6c8a3fe9 19933->19935 19936 6c8a3fd5 19934->19936 19937 6c8a3ff5 19934->19937 19935->19927 19938 6c8a5348 strtoxl 67 API calls 19936->19938 19939 6c8a3ffa 19937->19939 19940 6c8a4008 19937->19940 19941 6c8a3fda 19938->19941 19942 6c8a5348 strtoxl 67 API calls 19939->19942 19943 6c8a8190 __cftoe2_l __VEC_memcpy 19940->19943 19944 6c8a815c strtoxl 6 API calls 19941->19944 19942->19941 19943->19935 19944->19935 19949 6c8a3f53 ___crtGetEnvironmentStringsA 19945->19949 19950 6c8a3f57 _memset 19945->19950 19946 6c8a3f5c 19947 6c8a5348 strtoxl 67 API calls 19946->19947 19948 6c8a3f61 19947->19948 19952 6c8a815c strtoxl 6 API calls 19948->19952 19949->19927 19950->19946 19950->19949 19951 6c8a3fa6 19950->19951 19951->19949 19953 6c8a5348 strtoxl 67 API calls 19951->19953 19952->19949 19953->19948 19956 6c8a3d7f 19954->19956 19955 6c896dc1 ctype 2 API calls 19955->19956 19956->19955 19957 6c8a3dad 19956->19957 19959 6c8a3e3c 19956->19959 19963 6c8a3d92 _memset ctype 19956->19963 19958 6c8968e2 ctype 67 API calls 19957->19958 19958->19963 19960 6c8968e2 ctype 67 API calls 19959->19960 19961 6c8a3e45 19960->19961 20006 6c895ac0 19961->20006 19963->19807 19965 6c895cd6 19964->19965 20009 6c89afc3 19965->20009 19967 6c895d57 19968 6c89afc3 69 API calls 19967->19968 19969 6c895d61 19968->19969 20019 6c8964e0 19969->20019 19972 6c895eba GlobalAlloc 19973 6c895d97 19972->19973 19973->19972 19973->19973 19974 6c8967c3 19973->19974 19975 6c8960f0 CreateFileW 19973->19975 19975->19973 19976 6c8961de 19975->19976 19981 6c895de6 19977->19981 19978 6c895eba GlobalAlloc 19978->19981 19979 6c8961d2 19980 6c8960f0 CreateFileW 19980->19979 19980->19981 19981->19978 19981->19979 19981->19980 19981->19981 19983 6c89b1fc 19982->19983 19984 6c89b201 19982->19984 19985 6c896dc1 ctype 2 API calls 19983->19985 19986 6c89b211 19984->19986 19987 6c8a3d6c 69 API calls 19984->19987 19985->19984 19986->19807 19987->19986 19988->19988 19991 6c895de6 19988->19991 19989 6c8967c3 19990 6c895eba GlobalAlloc 19990->19991 19991->19989 19991->19990 19991->19991 19992 6c8960f0 CreateFileW 19991->19992 19992->19991 19993 6c8961de 19992->19993 19998 6c896250 19994->19998 19995 6c8962f3 ReadFile 19996 6c8961f0 19995->19996 19995->19998 19996->19802 19997 6c8966d2 19998->19995 19998->19997 20004 6c8963fe 19999->20004 20000 6c8965f3 LoadLibraryA VirtualProtect 20002 6c8967f8 20000->20002 20001 6c8966f0 20003 6c896649 VirtualProtect 20002->20003 20005 6c896663 20003->20005 20004->20000 20004->20001 20005->19807 20007 6c8a3f43 _memcpy_s 67 API calls 20006->20007 20008 6c895ad9 20007->20008 20008->19963 20013 6c89afd6 20009->20013 20010 6c896dc1 ctype 2 API calls 20010->20013 20011 6c89b009 20012 6c8968e2 ctype 67 API calls 20011->20012 20018 6c89afe9 _memset ctype 20012->20018 20013->20010 20013->20011 20014 6c89b08c 20013->20014 20013->20018 20015 6c8968e2 ctype 67 API calls 20014->20015 20016 6c89b094 20015->20016 20017 6c895ac0 67 API calls 20016->20017 20017->20018 20018->19967 20023 6c8964ea LoadLibraryA VirtualProtect 20019->20023 20025 6c8967f8 20023->20025 20024 6c895d67 GetPEB 20024->19973 20026 6c896649 VirtualProtect 20025->20026 20026->20024 20029 6c897696 ctype 20027->20029 20028 6c897807 20041 6c8977fb 20028->20041 20091 6c892330 20028->20091 20029->20028 20031 6c8976bd 20029->20031 20048 6c89748e 20031->20048 20032 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20034 6c897835 20032->20034 20034->19814 20041->20032 20125 6c891440 20042->20125 20044 6c897312 _memset 20045 6c896a35 67 API calls 20044->20045 20046 6c897329 PathStripToRootW 20045->20046 20047 6c89733d 20046->20047 20047->19816 20049 6c89749d __EH_prolog3_GS 20048->20049 20050 6c896dc1 ctype 2 API calls 20049->20050 20051 6c8974c7 GetFullPathNameW 20049->20051 20050->20049 20052 6c8974e0 20051->20052 20053 6c897505 20051->20053 20098 6c896a35 20052->20098 20054 6c897509 20053->20054 20055 6c897524 20053->20055 20058 6c892330 67 API calls 20054->20058 20071 6c8974fe ctype 20054->20071 20060 6c8972fd 68 API calls 20055->20060 20057 6c8974ef 20059 6c89745f 68 API calls 20057->20059 20058->20071 20059->20071 20062 6c897540 PathIsUNCW 20060->20062 20064 6c897554 GetVolumeInformationW 20062->20064 20062->20071 20065 6c897577 20064->20065 20066 6c897596 20064->20066 20069 6c89745f 68 API calls 20065->20069 20067 6c89759f CharUpperW 20066->20067 20068 6c8975a6 20066->20068 20067->20068 20070 6c8975af FindFirstFileW 20068->20070 20068->20071 20069->20071 20070->20071 20072 6c8975c7 FindClose 20070->20072 20104 6c8a51b5 20071->20104 20072->20065 20073 6c8975d7 20072->20073 20073->20065 20074 6c8975df lstrlenW 20073->20074 20075 6c89762d 20074->20075 20076 6c8975fc 20074->20076 20075->20071 20078 6c892330 67 API calls 20075->20078 20101 6c896ea0 20076->20101 20078->20071 20092 6c89233b 20091->20092 20093 6c89234a 20091->20093 20094 6c8914a0 67 API calls 20092->20094 20096 6c8914a0 67 API calls 20093->20096 20095 6c892344 20094->20095 20095->20041 20097 6c892369 20096->20097 20097->20041 20107 6c8a44cb 20098->20107 20100 6c896a4b 20100->20057 20116 6c8a51ed 20101->20116 20103 6c896eb3 20103->20071 20105 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20104->20105 20106 6c8a51bf 20105->20106 20106->20106 20108 6c8a44dd 20107->20108 20110 6c8a44e6 20108->20110 20111 6c8a44e1 20108->20111 20113 6c8a452d 20108->20113 20109 6c8a5348 strtoxl 67 API calls 20115 6c8a44fd 20109->20115 20110->20100 20111->20109 20111->20110 20112 6c8a815c strtoxl 6 API calls 20112->20110 20113->20110 20114 6c8a5348 strtoxl 67 API calls 20113->20114 20114->20115 20115->20112 20117 6c8a51fe 20116->20117 20120 6c8a5205 20116->20120 20117->20120 20123 6c8a5231 20117->20123 20118 6c8a5348 strtoxl 67 API calls 20119 6c8a520a 20118->20119 20121 6c8a815c strtoxl 6 API calls 20119->20121 20120->20118 20122 6c8a5219 20121->20122 20122->20103 20123->20122 20124 6c8a5348 strtoxl 67 API calls 20123->20124 20124->20119 20126 6c89145d 20125->20126 20127 6c891465 20125->20127 20128 6c8913f0 67 API calls 20126->20128 20127->20044 20128->20127 20130 6c8948be 20129->20130 20131 6c8962d0 ReadFile 20130->20131 20132 6c89492c 20131->20132 20133 6c8915f0 67 API calls 20132->20133 20134 6c89493e 20133->20134 20191 6c8930e0 20134->20191 20136 6c89496f 20137 6c894a3d 20136->20137 20194 6c893150 20136->20194 20140 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20137->20140 20142 6c894aae 20140->20142 20141 6c8915f0 67 API calls 20143 6c894996 20141->20143 20142->19840 20198 6c895670 20143->20198 20145 6c8949d6 20146 6c89afc3 69 API calls 20145->20146 20147 6c8949f9 ___crtGetEnvironmentStringsA 20146->20147 20147->20137 20148 6c8a4618 __freebuf 67 API calls 20147->20148 20148->20137 20151 6c894b00 20149->20151 20248 6c893720 20151->20248 20173 6c8966d2 20172->20173 20176 6c89626d 20172->20176 20174 6c8962f3 ReadFile 20175 6c8961f0 20174->20175 20174->20176 20175->19840 20176->20173 20176->20174 20178 6c8954f7 20177->20178 20180 6c8954be 20177->20180 20179 6c8931f0 102 API calls 20178->20179 20178->20180 20181 6c89551a 20179->20181 20180->19840 20182 6c892600 101 API calls 20181->20182 20182->20180 20184 6c894616 20183->20184 20185 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20184->20185 20186 6c8946ee 20185->20186 20186->19826 20188 6c8947f9 20187->20188 20189 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20188->20189 20190 6c894873 20189->20190 20190->19837 20210 6c892b50 20191->20210 20193 6c8930f2 _wcspbrk 20193->20136 20195 6c89318b 20194->20195 20196 6c892600 101 API calls 20195->20196 20197 6c8931d7 20196->20197 20197->20141 20199 6c89567b 20198->20199 20200 6c895681 lstrlenW 20198->20200 20199->20145 20220 6c895730 20200->20220 20203 6c89571f 20203->20145 20204 6c8956c5 GetLastError 20205 6c8956d0 WideCharToMultiByte 20204->20205 20207 6c895716 20204->20207 20206 6c895730 73 API calls 20205->20206 20208 6c8956f4 WideCharToMultiByte 20206->20208 20207->20203 20228 6c895b00 GetLastError 20207->20228 20208->20207 20211 6c892b7e 20210->20211 20212 6c892bb9 20211->20212 20213 6c892bd1 20211->20213 20217 6c89a58c 20212->20217 20214 6c8914a0 67 API calls 20213->20214 20216 6c892bc2 20214->20216 20216->20193 20218 6c89aef1 ___DllMainCRTStartup 31 API calls 20217->20218 20219 6c89a591 20218->20219 20219->20216 20221 6c895734 20220->20221 20226 6c895788 20221->20226 20227 6c895771 20221->20227 20230 6c8a46a6 20221->20230 20224 6c8a4618 __freebuf 67 API calls 20224->20226 20225 6c89569f WideCharToMultiByte 20225->20203 20225->20204 20226->20225 20241 6c8a4721 20226->20241 20227->20224 20227->20226 20229 6c895b0a 20228->20229 20231 6c8a46dd 20230->20231 20232 6c8a46b5 20230->20232 20233 6c8a46f2 20231->20233 20235 6c8a7637 __onexit_nolock 68 API calls 20231->20235 20232->20231 20234 6c8a46c1 20232->20234 20236 6c8a4ac8 _realloc 72 API calls 20233->20236 20237 6c8a5348 strtoxl 67 API calls 20234->20237 20235->20233 20240 6c8a46d6 _memset 20236->20240 20238 6c8a46c6 20237->20238 20239 6c8a815c strtoxl 6 API calls 20238->20239 20239->20240 20240->20227 20242 6c8ab40b __calloc_impl 67 API calls 20241->20242 20243 6c8a473b 20242->20243 20244 6c8a4757 20243->20244 20245 6c8a5348 strtoxl 67 API calls 20243->20245 20244->20226 20246 6c8a474e 20245->20246 20246->20244 20247 6c8a5348 strtoxl 67 API calls 20246->20247 20247->20244 20249 6c893756 20248->20249 20250 6c89afc3 69 API calls 20249->20250 20251 6c893769 20250->20251 20252 6c8960f0 CreateFileW 20251->20252 20253 6c8961de 20252->20253 20255 6c895de6 20252->20255 20254 6c895eba GlobalAlloc 20254->20255 20255->20252 20255->20254 20256 6c8967c3 20255->20256 20258 6c891580 67 API calls 20257->20258 20259 6c892f92 20258->20259 20260 6c8913f0 67 API calls 20259->20260 20261 6c892fc2 __wcsrev 20259->20261 20260->20261 20262 6c892f60 67 API calls 20261->20262 20266 6c892fe0 _wcspbrk 20261->20266 20263 6c89309f 20262->20263 20264 6c8930bc 20263->20264 20265 6c8930a7 20263->20265 20268 6c891580 67 API calls 20264->20268 20267 6c893370 67 API calls 20265->20267 20266->19849 20269 6c8930b8 20267->20269 20270 6c8930c7 20268->20270 20269->19849 20270->19849 20272 6c893386 20271->20272 20273 6c893391 20272->20273 20276 6c8933af 20272->20276 20274 6c891580 67 API calls 20273->20274 20275 6c89339a 20274->20275 20275->19854 20284 6c893680 20276->20284 20280 6c89158f 20279->20280 20281 6c89159c 20280->20281 20282 6c8a3f43 _memcpy_s 67 API calls 20280->20282 20281->19855 20283 6c8915e1 20282->20283 20283->19855 20285 6c89368b 20284->20285 20286 6c8a3f43 _memcpy_s 67 API calls 20285->20286 20287 6c8933e6 20286->20287 20287->19854 20289 6c89341f 20288->20289 20290 6c89340e 20288->20290 20289->19861 20297 6c8928d0 LoadResource 20290->20297 20292 6c893416 20292->20289 20293 6c8913f0 67 API calls 20292->20293 20295 6c893447 20292->20295 20293->20295 20294 6c8a3f43 _memcpy_s 67 API calls 20296 6c89347e 20294->20296 20295->20294 20296->19861 20298 6c8928e9 LockResource 20297->20298 20299 6c8928e6 20297->20299 20300 6c89290a 20298->20300 20301 6c8928f7 SizeofResource 20298->20301 20299->20292 20300->20292 20301->20300 20303 6c89124c 20302->20303 20310 6c8a4320 20303->20310 20306 6c891286 20313 6c8a41a0 20306->20313 20307 6c8913f0 67 API calls 20307->20306 20309 6c891294 20309->19878 20316 6c8a42c9 20310->20316 20322 6c8a4115 20313->20322 20317 6c8a42d9 20316->20317 20318 6c891263 20316->20318 20319 6c8a5348 strtoxl 67 API calls 20317->20319 20318->20306 20318->20307 20320 6c8a42de 20319->20320 20321 6c8a815c strtoxl 6 API calls 20320->20321 20321->20318 20323 6c8a413f 20322->20323 20324 6c8a4122 20322->20324 20325 6c8a414c 20323->20325 20327 6c8a4159 20323->20327 20326 6c8a5348 strtoxl 67 API calls 20324->20326 20328 6c8a5348 strtoxl 67 API calls 20325->20328 20329 6c8a4127 20326->20329 20337 6c8a401d 20327->20337 20332 6c8a4151 20328->20332 20330 6c8a815c strtoxl 6 API calls 20329->20330 20335 6c8a4137 20330->20335 20334 6c8a815c strtoxl 6 API calls 20332->20334 20334->20335 20335->20309 20336 6c8a5348 strtoxl 67 API calls 20336->20332 20338 6c8a404d 20337->20338 20339 6c8a402d 20337->20339 20341 6c8a405d 20338->20341 20347 6c8a407d 20338->20347 20340 6c8a5348 strtoxl 67 API calls 20339->20340 20342 6c8a4032 20340->20342 20344 6c8a5348 strtoxl 67 API calls 20341->20344 20343 6c8a815c strtoxl 6 API calls 20342->20343 20350 6c8a4042 20343->20350 20345 6c8a4062 20344->20345 20346 6c8a815c strtoxl 6 API calls 20345->20346 20346->20350 20348 6c8a40c4 20347->20348 20347->20350 20352 6c8a84f5 20347->20352 20348->20350 20351 6c8a84f5 __flsbuf 101 API calls 20348->20351 20350->20335 20350->20336 20351->20350 20373 6c8afbb6 20352->20373 20355 6c8a8510 20357 6c8a5348 strtoxl 67 API calls 20355->20357 20356 6c8a8527 20358 6c8a852b 20356->20358 20366 6c8a8538 __flswbuf 20356->20366 20365 6c8a8515 20357->20365 20359 6c8a5348 strtoxl 67 API calls 20358->20359 20359->20365 20360 6c8a8628 20363 6c8af878 __locking 101 API calls 20360->20363 20361 6c8a85a8 20362 6c8a85bf 20361->20362 20368 6c8a85dc 20361->20368 20391 6c8af878 20362->20391 20363->20365 20365->20348 20366->20365 20369 6c8a858e 20366->20369 20372 6c8a8599 20366->20372 20379 6c8af99d 20366->20379 20368->20365 20416 6c8af02c 20368->20416 20369->20372 20388 6c8af954 20369->20388 20372->20360 20372->20361 20374 6c8afbc5 20373->20374 20376 6c8a8505 20373->20376 20375 6c8a5348 strtoxl 67 API calls 20374->20375 20377 6c8afbca 20375->20377 20376->20355 20376->20356 20378 6c8a815c strtoxl 6 API calls 20377->20378 20378->20376 20380 6c8af9aa 20379->20380 20381 6c8af9b9 20379->20381 20382 6c8a5348 strtoxl 67 API calls 20380->20382 20384 6c8af9dd 20381->20384 20385 6c8a5348 strtoxl 67 API calls 20381->20385 20383 6c8af9af 20382->20383 20383->20369 20384->20369 20386 6c8af9cd 20385->20386 20387 6c8a815c strtoxl 6 API calls 20386->20387 20387->20384 20389 6c8aa5c3 __malloc_crt 67 API calls 20388->20389 20390 6c8af969 20389->20390 20390->20372 20392 6c8af884 ___DllMainCRTStartup 20391->20392 20393 6c8af88c 20392->20393 20394 6c8af8a7 20392->20394 20448 6c8a535b 20393->20448 20395 6c8af8b5 20394->20395 20401 6c8af8f6 20394->20401 20398 6c8a535b __dosmaperr 67 API calls 20395->20398 20400 6c8af8ba 20398->20400 20399 6c8a5348 strtoxl 67 API calls 20411 6c8af899 ___DllMainCRTStartup 20399->20411 20402 6c8a5348 strtoxl 67 API calls 20400->20402 20451 6c8b19c1 20401->20451 20405 6c8af8c1 20402->20405 20404 6c8af8fc 20406 6c8af909 20404->20406 20407 6c8af91f 20404->20407 20408 6c8a815c strtoxl 6 API calls 20405->20408 20461 6c8af145 20406->20461 20410 6c8a5348 strtoxl 67 API calls 20407->20410 20408->20411 20413 6c8af924 20410->20413 20411->20365 20412 6c8af917 20520 6c8af94a 20412->20520 20414 6c8a535b __dosmaperr 67 API calls 20413->20414 20414->20412 20417 6c8af038 ___DllMainCRTStartup 20416->20417 20418 6c8af049 20417->20418 20419 6c8af065 20417->20419 20421 6c8a535b __dosmaperr 67 API calls 20418->20421 20420 6c8af073 20419->20420 20423 6c8af094 20419->20423 20424 6c8a535b __dosmaperr 67 API calls 20420->20424 20422 6c8af04e 20421->20422 20425 6c8a5348 strtoxl 67 API calls 20422->20425 20427 6c8af0da 20423->20427 20428 6c8af0b4 20423->20428 20426 6c8af078 20424->20426 20429 6c8af056 ___DllMainCRTStartup 20425->20429 20431 6c8a5348 strtoxl 67 API calls 20426->20431 20430 6c8b19c1 ___lock_fhandle 68 API calls 20427->20430 20432 6c8a535b __dosmaperr 67 API calls 20428->20432 20429->20365 20434 6c8af0e0 20430->20434 20435 6c8af07f 20431->20435 20433 6c8af0b9 20432->20433 20436 6c8a5348 strtoxl 67 API calls 20433->20436 20437 6c8af109 20434->20437 20438 6c8af0ed 20434->20438 20439 6c8a815c strtoxl 6 API calls 20435->20439 20440 6c8af0c0 20436->20440 20442 6c8a5348 strtoxl 67 API calls 20437->20442 20441 6c8aefa7 __lseeki64_nolock 69 API calls 20438->20441 20439->20429 20443 6c8a815c strtoxl 6 API calls 20440->20443 20444 6c8af0fe 20441->20444 20445 6c8af10e 20442->20445 20443->20429 20562 6c8af13b 20444->20562 20446 6c8a535b __dosmaperr 67 API calls 20445->20446 20446->20444 20449 6c8aa206 __getptd_noexit 67 API calls 20448->20449 20450 6c8a5360 20449->20450 20450->20399 20452 6c8b19cd ___DllMainCRTStartup 20451->20452 20453 6c8b1a28 20452->20453 20454 6c8aa914 __lock 67 API calls 20452->20454 20455 6c8b1a4a ___DllMainCRTStartup 20453->20455 20456 6c8b1a2d RtlEnterCriticalSection 20453->20456 20457 6c8b19f9 20454->20457 20455->20404 20456->20455 20458 6c8b1a10 20457->20458 20459 6c8ae1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 20457->20459 20523 6c8b1a58 20458->20523 20459->20458 20462 6c8af154 __write_nolock 20461->20462 20463 6c8af17b 20462->20463 20464 6c8af1ad 20462->20464 20465 6c8af186 20462->20465 20466 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20463->20466 20468 6c8af215 20464->20468 20469 6c8af1ef 20464->20469 20467 6c8a535b __dosmaperr 67 API calls 20465->20467 20470 6c8af876 20466->20470 20471 6c8af18b 20467->20471 20473 6c8af229 20468->20473 20527 6c8aefa7 20468->20527 20472 6c8a535b __dosmaperr 67 API calls 20469->20472 20470->20412 20474 6c8a5348 strtoxl 67 API calls 20471->20474 20477 6c8af1f4 20472->20477 20476 6c8af99d __write_nolock 67 API calls 20473->20476 20475 6c8af192 20474->20475 20479 6c8a815c strtoxl 6 API calls 20475->20479 20480 6c8af234 20476->20480 20481 6c8a5348 strtoxl 67 API calls 20477->20481 20479->20463 20482 6c8af4da 20480->20482 20487 6c8aa27f __getptd 67 API calls 20480->20487 20483 6c8af1fd 20481->20483 20485 6c8af4ea 20482->20485 20486 6c8af7a9 WriteFile 20482->20486 20484 6c8a815c strtoxl 6 API calls 20483->20484 20484->20463 20488 6c8af5c8 20485->20488 20509 6c8af4fe 20485->20509 20490 6c8af7dc GetLastError 20486->20490 20491 6c8af4bc 20486->20491 20489 6c8af24f GetConsoleMode 20487->20489 20508 6c8af6a8 20488->20508 20513 6c8af5d7 20488->20513 20489->20482 20493 6c8af27a 20489->20493 20490->20491 20491->20463 20492 6c8af827 20491->20492 20495 6c8af7fa 20491->20495 20492->20463 20496 6c8a5348 strtoxl 67 API calls 20492->20496 20493->20482 20494 6c8af28c GetConsoleCP 20493->20494 20494->20491 20517 6c8af2af 20494->20517 20499 6c8af819 20495->20499 20500 6c8af805 20495->20500 20497 6c8af84a 20496->20497 20502 6c8a535b __dosmaperr 67 API calls 20497->20502 20498 6c8af70e WideCharToMultiByte 20498->20490 20504 6c8af745 WriteFile 20498->20504 20540 6c8a536e 20499->20540 20503 6c8a5348 strtoxl 67 API calls 20500->20503 20501 6c8af56c WriteFile 20501->20490 20501->20509 20502->20463 20510 6c8af80a 20503->20510 20507 6c8af77c GetLastError 20504->20507 20504->20508 20505 6c8af64c WriteFile 20505->20490 20505->20513 20507->20508 20508->20491 20508->20492 20508->20498 20508->20504 20509->20491 20509->20492 20509->20501 20512 6c8a535b __dosmaperr 67 API calls 20510->20512 20512->20463 20513->20491 20513->20492 20513->20505 20514 6c8b0932 79 API calls __fassign 20514->20517 20515 6c8af35b WideCharToMultiByte 20515->20491 20516 6c8af38c WriteFile 20515->20516 20516->20490 20516->20517 20517->20490 20517->20491 20517->20514 20517->20515 20518 6c8b1a88 11 API calls __putwch_nolock 20517->20518 20519 6c8af3e0 WriteFile 20517->20519 20537 6c8b0984 20517->20537 20518->20517 20519->20490 20519->20517 20561 6c8b1a61 RtlLeaveCriticalSection 20520->20561 20522 6c8af952 20522->20411 20526 6c8aa83a RtlLeaveCriticalSection 20523->20526 20525 6c8b1a5f 20525->20453 20526->20525 20545 6c8b194a 20527->20545 20529 6c8aefc5 20530 6c8aefde SetFilePointer 20529->20530 20531 6c8aefcd 20529->20531 20533 6c8aeff6 GetLastError 20530->20533 20534 6c8aefd2 20530->20534 20532 6c8a5348 strtoxl 67 API calls 20531->20532 20532->20534 20533->20534 20535 6c8af000 20533->20535 20534->20473 20536 6c8a536e __dosmaperr 67 API calls 20535->20536 20536->20534 20558 6c8b094c 20537->20558 20541 6c8a535b __dosmaperr 67 API calls 20540->20541 20542 6c8a5379 __dosmaperr 20541->20542 20543 6c8a5348 strtoxl 67 API calls 20542->20543 20544 6c8a538c 20543->20544 20544->20463 20546 6c8b196f 20545->20546 20547 6c8b1957 20545->20547 20550 6c8a535b __dosmaperr 67 API calls 20546->20550 20557 6c8b19b4 20546->20557 20548 6c8a535b __dosmaperr 67 API calls 20547->20548 20549 6c8b195c 20548->20549 20551 6c8a5348 strtoxl 67 API calls 20549->20551 20552 6c8b199d 20550->20552 20553 6c8b1964 20551->20553 20554 6c8a5348 strtoxl 67 API calls 20552->20554 20553->20529 20555 6c8b19a4 20554->20555 20556 6c8a815c strtoxl 6 API calls 20555->20556 20556->20557 20557->20529 20559 6c8a8659 _LocaleUpdate::_LocaleUpdate 77 API calls 20558->20559 20560 6c8b095f 20559->20560 20560->20517 20561->20522 20565 6c8b1a61 RtlLeaveCriticalSection 20562->20565 20564 6c8af143 20564->20429 20565->20564 20568 6c897352 __EH_prolog3_catch_GS 20566->20568 20567 6c897381 ctype 20572 6c8a51c4 20567->20572 20568->20567 20569 6c897202 ctype 2 API calls 20568->20569 20569->20567 20573 6c8a3f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20572->20573 20574 6c8a51ce 20573->20574 20574->20574

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 25 6c8963f0-6c8963f8 26 6c89649c-6c8964c1 25->26 27 6c8963fe-6c89640f 25->27 28 6c8964c3 26->28 29 6c896524 26->29 30 6c896413-6c89641e 27->30 31 6c8964c5-6c8964cb 28->31 34 6c896526-6c896551 29->34 32 6c896481 30->32 33 6c896420 30->33 31->31 35 6c8964cd-6c8964cf 31->35 37 6c896483-6c896487 32->37 36 6c896422-6c896427 33->36 38 6c8965f1 34->38 39 6c896557-6c896568 34->39 35->29 40 6c8964d1-6c8964d7 35->40 36->36 41 6c896429-6c89642b 36->41 43 6c89671b-6c89671e 37->43 44 6c89648d-6c896492 37->44 42 6c8965f3-6c896661 LoadLibraryA VirtualProtect call 6c8967f8 VirtualProtect 38->42 45 6c89656c-6c896577 39->45 46 6c8964dd-6c8964e6 40->46 47 6c8966f0 40->47 41->32 48 6c89642d-6c896433 41->48 64 6c896663 42->64 65 6c896682-6c8966a9 42->65 44->30 50 6c896498 44->50 51 6c896579 45->51 52 6c8965da 45->52 54 6c8964ea-6c896501 46->54 55 6c896439-6c896443 48->55 56 6c8966e6 48->56 50->26 58 6c89657b-6c896580 51->58 53 6c8965dc-6c8965e0 52->53 60 6c896704-6c896716 53->60 61 6c8965e6-6c8965eb 53->61 54->54 63 6c896503-6c896513 54->63 62 6c896447-6c89645e 55->62 70 6c8966fa 56->70 58->58 59 6c896582-6c896584 58->59 59->52 66 6c896586-6c89658c 59->66 60->42 61->38 61->45 62->62 67 6c896460-6c896471 62->67 63->34 68 6c896515-6c896522 63->68 69 6c896667-6c896680 64->69 66->70 72 6c896592-6c89659c 66->72 67->37 73 6c896473-6c89647f 67->73 68->34 69->65 69->69 70->60 74 6c8965a0-6c8965b7 72->74 73->37 74->74 75 6c8965b9-6c8965ca 74->75 75->53 76 6c8965cc-6c8965d8 75->76 76->53
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6C896602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C89663B
                              • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6C896654
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ProtectVirtual$LibraryLoad
                              • String ID:
                              • API String ID: 895956442-0
                              • Opcode ID: a0cde96bdf72b1d4c6aa1672c41435c2358ac601b9305d6aad22fe227a9f07e6
                              • Instruction ID: 166bf09baa7d1c4396d6c24af58b975e64e0240dda8c45bcc1f95df7568ec9b7
                              • Opcode Fuzzy Hash: a0cde96bdf72b1d4c6aa1672c41435c2358ac601b9305d6aad22fe227a9f07e6
                              • Instruction Fuzzy Hash: 40A1BC306083568FC365CF6CC9D062AFBE2BF89308F19896DE89997206D731E955CBC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 105 6c895ca0-6c895d95 call 6c89af9c * 2 call 6c89afc3 * 2 call 6c8964e0 GetPEB 116 6c895de4 105->116 117 6c895d97 105->117 118 6c895de6-6c895e1d 116->118 119 6c895d99-6c895da3 117->119 120 6c895eba-6c895f0c GlobalAlloc 118->120 121 6c895e23-6c895e3c 118->121 122 6c895da5-6c895dab 119->122 123 6c895dd6-6c895dd8 119->123 125 6c895fad 120->125 126 6c895f12-6c895f2b 120->126 129 6c895e40-6c895e4e 121->129 124 6c895dae-6c895db5 122->124 127 6c895dde-6c895de2 123->127 128 6c8967e1-6c8967e4 123->128 130 6c895dc1-6c895dcd 124->130 131 6c895db7-6c895dbd 124->131 135 6c895faf-6c895fce 125->135 132 6c895f2f-6c895f3d 126->132 127->116 127->119 128->118 133 6c895e50 129->133 134 6c895ea3 129->134 130->124 140 6c895dcf-6c895dd3 130->140 131->130 137 6c895dbf 131->137 138 6c895f3f 132->138 139 6c895f92 132->139 141 6c895e52-6c895e58 133->141 136 6c895ea5-6c895ea9 134->136 149 6c895fd0 135->149 150 6c895fe7-6c895fea 135->150 142 6c895eaf-6c895eb4 136->142 143 6c8967c3-6c8967d8 136->143 137->130 145 6c895f41-6c895f47 138->145 147 6c895f94-6c895f98 139->147 140->123 141->141 146 6c895e5a-6c895e5c 141->146 142->129 148 6c895eb6 142->148 145->145 151 6c895f49-6c895f4b 145->151 146->134 155 6c895e5e-6c895e64 146->155 152 6c895f9e-6c895fa3 147->152 153 6c8967a5-6c8967be 147->153 148->120 156 6c895fd2-6c895fe5 149->156 157 6c895fec 150->157 158 6c895ffe-6c896038 150->158 151->139 159 6c895f4d-6c895f53 151->159 152->132 160 6c895fa5-6c895fa9 152->160 153->135 161 6c8966aa-6c8966af 155->161 162 6c895e6a-6c895e6e 155->162 156->150 156->156 163 6c895fee-6c895ffc 157->163 167 6c8960d9 158->167 168 6c89603e-6c896057 158->168 164 6c895f59-6c895f5d 159->164 165 6c8966b4 159->165 160->125 161->136 172 6c895e97-6c895ea1 161->172 162->120 163->158 163->163 170 6c895f5f-6c895f75 164->170 175 6c8966be 165->175 169 6c8960db-6c896139 CreateFileW 167->169 171 6c89605b-6c896069 168->171 179 6c89613f-6c89615c 169->179 180 6c8961de-6c896780 169->180 170->170 174 6c895f77-6c895f84 170->174 176 6c89606b 171->176 177 6c8960be 171->177 172->136 174->147 181 6c895f86-6c895f90 174->181 183 6c896788-6c8967a0 175->183 182 6c89606d-6c896073 176->182 178 6c8960c0-6c8960c4 177->178 178->183 184 6c8960ca-6c8960cf 178->184 179->128 181->147 182->182 186 6c896075-6c896077 182->186 183->169 184->171 187 6c8960d1-6c8960d5 184->187 186->177 189 6c896079-6c89607f 186->189 187->167 189->175 191 6c896085-6c896089 189->191 193 6c89608b-6c8960a1 191->193 193->193 194 6c8960a3-6c8960b0 193->194 194->178 195 6c8960b2-6c8960bc 194->195 195->178
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoad_memset
                              • String ID:
                              • API String ID: 2997193564-0
                              • Opcode ID: 6f96a37bbb02feb2afd4f3bc65fd6779c8ba795721b71c57f05ffdbea477235a
                              • Instruction ID: 76c8c02850436aa1b84e4b2fa52d23f5a2bbcf34172a6421ebd618f8fa9a29e9
                              • Opcode Fuzzy Hash: 6f96a37bbb02feb2afd4f3bc65fd6779c8ba795721b71c57f05ffdbea477235a
                              • Instruction Fuzzy Hash: 21E167B0A087068FC724CF1AC5D062AFBE5FF89308F558A2DE89A97711D730E955CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 355 6c895e70-6c895e86 355->355 356 6c895e88-6c895e8c 355->356 357 6c895e90-6c895e95 356->357 358 6c895ea5-6c895ea9 357->358 359 6c895e97-6c895ea1 357->359 360 6c895eaf-6c895eb4 358->360 361 6c8967c3-6c8967d8 358->361 359->358 362 6c895e40-6c895e4e 360->362 363 6c895eb6 360->363 366 6c895e50 362->366 367 6c895ea3 362->367 365 6c895eba-6c895f0c GlobalAlloc 363->365 368 6c895fad 365->368 369 6c895f12-6c895f2b 365->369 370 6c895e52-6c895e58 366->370 367->358 373 6c895faf-6c895fce 368->373 371 6c895f2f-6c895f3d 369->371 370->370 372 6c895e5a-6c895e5c 370->372 374 6c895f3f 371->374 375 6c895f92 371->375 372->367 376 6c895e5e-6c895e64 372->376 382 6c895fd0 373->382 383 6c895fe7-6c895fea 373->383 378 6c895f41-6c895f47 374->378 379 6c895f94-6c895f98 375->379 380 6c8966aa-6c8966af 376->380 381 6c895e6a-6c895e6e 376->381 378->378 384 6c895f49-6c895f4b 378->384 385 6c895f9e-6c895fa3 379->385 386 6c8967a5-6c8967be 379->386 380->357 381->365 387 6c895fd2-6c895fe5 382->387 388 6c895fec 383->388 389 6c895ffe-6c896038 383->389 384->375 390 6c895f4d-6c895f53 384->390 385->371 391 6c895fa5-6c895fa9 385->391 386->373 387->383 387->387 392 6c895fee-6c895ffc 388->392 395 6c8960d9 389->395 396 6c89603e-6c896057 389->396 393 6c895f59-6c895f5d 390->393 394 6c8966b4 390->394 391->368 392->389 392->392 398 6c895f5f-6c895f75 393->398 402 6c8966be 394->402 397 6c8960db-6c896139 CreateFileW 395->397 399 6c89605b-6c896069 396->399 406 6c89613f-6c8967e4 397->406 407 6c8961de-6c896780 397->407 398->398 401 6c895f77-6c895f84 398->401 403 6c89606b 399->403 404 6c8960be 399->404 401->379 408 6c895f86-6c895f90 401->408 410 6c896788-6c8967a0 402->410 409 6c89606d-6c896073 403->409 405 6c8960c0-6c8960c4 404->405 405->410 411 6c8960ca-6c8960cf 405->411 406->365 422 6c895e23-6c895e3c 406->422 408->379 409->409 413 6c896075-6c896077 409->413 410->397 411->399 414 6c8960d1-6c8960d5 411->414 413->404 417 6c896079-6c89607f 413->417 414->395 417->402 420 6c896085-6c896089 417->420 423 6c89608b-6c8960a1 420->423 422->362 423->423 424 6c8960a3-6c8960b0 423->424 424->405 425 6c8960b2-6c8960bc 424->425 425->405
                              APIs
                              • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6C895ECA
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 5cc1f9a5f24e9e5fa095a10371991f4885906676baa96853a7d6249bb744aabc
                              • Instruction ID: 8e1895a4e6c6e67b685b057872d925e48e9580dbcc04a267ab57d2c3bae785c9
                              • Opcode Fuzzy Hash: 5cc1f9a5f24e9e5fa095a10371991f4885906676baa96853a7d6249bb744aabc
                              • Instruction Fuzzy Hash: 58A19A706083168FCB28CF2CC5D022AB7E2BB89309F548A6DE89697756D730E955CBC1

                              Control-flow Graph

                              APIs
                              • RtlEnterCriticalSection.NTDLL(6C8C32EC), ref: 6C89BC61
                              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6C8C32D0,6C8C32D0,?,6C89C0A4,00000004,6C89AF00,6C896DDD,6C8968AD,?,6C8A4902,?), ref: 6C89BCB7
                              • GlobalHandle.KERNEL32(00E3A278), ref: 6C89BCC0
                              • GlobalUnlock.KERNEL32(00000000), ref: 6C89BCCA
                              • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6C89BCE3
                              • GlobalHandle.KERNEL32(00E3A278), ref: 6C89BCF5
                              • GlobalLock.KERNEL32(00000000), ref: 6C89BCFC
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C89BD05
                              • GlobalLock.KERNEL32(00000000), ref: 6C89BD11
                              • _memset.LIBCMT ref: 6C89BD2B
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C89BD59
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                              • String ID:
                              • API String ID: 496899490-0
                              • Opcode ID: 2f16c300ef72d60bd1e1e4d10b7cb676e075379bfbf2ece91ea1f9caeacb663c
                              • Instruction ID: 1c97f129504f85863ab4595da46a7fd6ac0badf1bb83afaa8ba3188f175b17ab
                              • Opcode Fuzzy Hash: 2f16c300ef72d60bd1e1e4d10b7cb676e075379bfbf2ece91ea1f9caeacb663c
                              • Instruction Fuzzy Hash: 5E31CF71600B05AFDB308F6CC989A5A7BF9FF40309B05497EE656D7A51DB30E844CB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 77 6c8964e0-6c8964e8 78 6c8964ea-6c896501 77->78 78->78 79 6c896503-6c896513 78->79 80 6c896515-6c896522 79->80 81 6c896526-6c896551 79->81 80->81 82 6c8965f1 81->82 83 6c896557-6c896568 81->83 84 6c8965f3-6c896661 LoadLibraryA VirtualProtect call 6c8967f8 VirtualProtect 82->84 85 6c89656c-6c896577 83->85 95 6c896663 84->95 96 6c896682-6c8966a9 84->96 87 6c896579 85->87 88 6c8965da 85->88 91 6c89657b-6c896580 87->91 89 6c8965dc-6c8965e0 88->89 93 6c896704-6c896716 89->93 94 6c8965e6-6c8965eb 89->94 91->91 92 6c896582-6c896584 91->92 92->88 97 6c896586-6c89658c 92->97 93->84 94->82 94->85 98 6c896667-6c896680 95->98 100 6c8966fa 97->100 101 6c896592-6c89659c 97->101 98->96 98->98 100->93 102 6c8965a0-6c8965b7 101->102 102->102 103 6c8965b9-6c8965ca 102->103 103->89 104 6c8965cc-6c8965d8 103->104 104->89
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6C896602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C89663B
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoadProtectVirtual
                              • String ID:
                              • API String ID: 3279857687-0
                              • Opcode ID: 5d45b89d1a72b9f8e26b7c868fc646af91f59665a881dfe9bc848d42f065ce7a
                              • Instruction ID: 86bc701133533a196fa9851ec3445fe5c03b7d21e6b032fea80b85bde92ac2c2
                              • Opcode Fuzzy Hash: 5d45b89d1a72b9f8e26b7c868fc646af91f59665a881dfe9bc848d42f065ce7a
                              • Instruction Fuzzy Hash: 4751CD316083558FC725CF2CC9D062AFBE6AFC9308F198A6DE88597316D631E946CBD1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 197 6c896750-6c896762 ReadFile 199 6c89630a-6c896323 197->199 200 6c8961f0-6c896207 197->200 201 6c89634d-6c896368 199->201 202 6c896325-6c896329 199->202 206 6c8963cb 201->206 207 6c89636a 201->207 204 6c896738 202->204 205 6c89632f 202->205 204->197 209 6c896331-6c89633c 205->209 208 6c8963cd-6c8963ee 206->208 210 6c89636c-6c896372 207->210 211 6c8966dc 208->211 209->209 212 6c89633e-6c896347 209->212 210->210 213 6c896374-6c896376 210->213 211->204 212->201 214 6c896349 212->214 213->206 215 6c896378-6c89637e 213->215 214->201 215->211 216 6c896384-6c89638d 215->216 217 6c896391-6c8963a8 216->217 217->217 218 6c8963aa-6c8963ba 217->218 218->208 219 6c8963bc-6c8963c9 218->219 219->208
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C8BC168), ref: 6C896300
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: b2ea4cfb1d33319330b047a9dd26013a9a6790dff0690911bcf0990800431ff9
                              • Instruction ID: 4382b9f6758e801ef1d7a0a3499c91cddeeb7059a454846687957242080eda6e
                              • Opcode Fuzzy Hash: b2ea4cfb1d33319330b047a9dd26013a9a6790dff0690911bcf0990800431ff9
                              • Instruction Fuzzy Hash: A141AC316087098FC764CF1DC98066AB7E2FBC4318F18896CA88A87716D631F8458BC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 220 6c8962d0-6c8962d5 221 6c8962db-6c8962e0 220->221 222 6c896742-6c89674e 220->222 223 6c89626d-6c89627b 221->223 224 6c8962e2-6c8962f1 221->224 225 6c89627d 223->225 226 6c8962cf 223->226 230 6c8962f3-6c896304 ReadFile 224->230 228 6c89627f-6c896284 225->228 229 6c8962d1-6c8962d5 226->229 228->228 231 6c896286-6c896288 228->231 229->221 229->222 232 6c89630a-6c896323 230->232 233 6c8961f0-6c896207 230->233 231->226 234 6c89628a-6c896290 231->234 235 6c89634d-6c896368 232->235 236 6c896325-6c896329 232->236 238 6c8966d2 234->238 239 6c896296-6c89629a 234->239 242 6c8963cb 235->242 243 6c89636a 235->243 240 6c896738-6c896762 236->240 241 6c89632f 236->241 238->222 245 6c89629c-6c8962b2 239->245 240->230 246 6c896331-6c89633c 241->246 244 6c8963cd-6c8963ee 242->244 247 6c89636c-6c896372 243->247 248 6c8966dc 244->248 245->245 249 6c8962b4-6c8962c1 245->249 246->246 250 6c89633e-6c896347 246->250 247->247 252 6c896374-6c896376 247->252 248->240 249->229 253 6c8962c3-6c8962cd 249->253 250->235 254 6c896349 250->254 252->242 255 6c896378-6c89637e 252->255 253->229 254->235 255->248 256 6c896384-6c89638d 255->256 257 6c896391-6c8963a8 256->257 257->257 258 6c8963aa-6c8963ba 257->258 258->244 259 6c8963bc-6c8963c9 258->259 259->244
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C8BC168), ref: 6C896300
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 63f1c668835579a23432ae1ee052ad596f66cf373c321ef2d7af87b724e1e34f
                              • Instruction ID: 39d65b98125fcfa919e490791f71fcdf5bfbc0ea5cabcd3294f159d1374066de
                              • Opcode Fuzzy Hash: 63f1c668835579a23432ae1ee052ad596f66cf373c321ef2d7af87b724e1e34f
                              • Instruction Fuzzy Hash: 5231CE31A097068FC764CF19C98066AB7E2FFC4318F19896CE88697716D630F845CBC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 260 6c89c050-6c89c068 call 6c8a50c9 263 6c89c06a call 6c896dc1 260->263 264 6c89c06f-6c89c072 260->264 263->264 266 6c89c0aa-6c89c0bb call 6c89ba5b 264->266 267 6c89c074-6c89c07c 264->267 276 6c89c0bd-6c89c0cb call 6c89be0d 266->276 277 6c89c0d0-6c89c0d7 call 6c8a51a1 266->277 269 6c89c09f call 6c89bc4e 267->269 270 6c89c07e-6c89c09d call 6c89bd66 267->270 275 6c89c0a4-6c89c0a8 269->275 270->263 270->269 275->263 275->266 276->277
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6C89C057
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: H_prolog3$Exception@8Throw
                              • String ID:
                              • API String ID: 2489616738-0
                              • Opcode ID: 68f5bdaa5ac1a9a5b52beb03ce69774f7982fdbd20eae3939ebc929ba4dd50ca
                              • Instruction ID: 6d2a78f92669eabb850810e17ddd8cfe300801cc2771a61c76008534e6e3e976
                              • Opcode Fuzzy Hash: 68f5bdaa5ac1a9a5b52beb03ce69774f7982fdbd20eae3939ebc929ba4dd50ca
                              • Instruction Fuzzy Hash: CA011E30701602CBEB39AF6D8A156AD76B2AB4135AF148D3CE45287B90DF72CA46CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 282 6c8960f0-6c896139 CreateFileW 283 6c89613f-6c8967e4 282->283 284 6c8961de-6c896780 282->284 291 6c895eba-6c895f0c GlobalAlloc 283->291 292 6c895e23-6c895e3c 283->292 293 6c895fad 291->293 294 6c895f12-6c895f2b 291->294 295 6c895e40-6c895e4e 292->295 300 6c895faf-6c895fce 293->300 296 6c895f2f-6c895f3d 294->296 298 6c895e50 295->298 299 6c895ea3 295->299 302 6c895f3f 296->302 303 6c895f92 296->303 304 6c895e52-6c895e58 298->304 301 6c895ea5-6c895ea9 299->301 312 6c895fd0 300->312 313 6c895fe7-6c895fea 300->313 305 6c895eaf-6c895eb4 301->305 306 6c8967c3-6c8967d8 301->306 308 6c895f41-6c895f47 302->308 310 6c895f94-6c895f98 303->310 304->304 309 6c895e5a-6c895e5c 304->309 305->295 311 6c895eb6 305->311 308->308 314 6c895f49-6c895f4b 308->314 309->299 318 6c895e5e-6c895e64 309->318 315 6c895f9e-6c895fa3 310->315 316 6c8967a5-6c8967be 310->316 311->291 319 6c895fd2-6c895fe5 312->319 320 6c895fec 313->320 321 6c895ffe-6c896038 313->321 314->303 322 6c895f4d-6c895f53 314->322 315->296 323 6c895fa5-6c895fa9 315->323 316->300 324 6c8966aa-6c8966af 318->324 325 6c895e6a-6c895e6e 318->325 319->313 319->319 326 6c895fee-6c895ffc 320->326 330 6c8960d9 321->330 331 6c89603e-6c896057 321->331 327 6c895f59-6c895f5d 322->327 328 6c8966b4 322->328 323->293 324->301 335 6c895e97-6c895ea1 324->335 325->291 326->321 326->326 333 6c895f5f-6c895f75 327->333 337 6c8966be 328->337 332 6c8960db-6c8960ef 330->332 334 6c89605b-6c896069 331->334 332->282 333->333 336 6c895f77-6c895f84 333->336 338 6c89606b 334->338 339 6c8960be 334->339 335->301 336->310 341 6c895f86-6c895f90 336->341 343 6c896788-6c8967a0 337->343 342 6c89606d-6c896073 338->342 340 6c8960c0-6c8960c4 339->340 340->343 344 6c8960ca-6c8960cf 340->344 341->310 342->342 345 6c896075-6c896077 342->345 343->332 344->334 346 6c8960d1-6c8960d5 344->346 345->339 347 6c896079-6c89607f 345->347 346->330 347->337 348 6c896085-6c896089 347->348 349 6c89608b-6c8960a1 348->349 349->349 350 6c8960a3-6c8960b0 349->350 350->340 351 6c8960b2-6c8960bc 350->351 351->340
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6C8960F6
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 5f8a1d136847d924b2cd9affe480fedc8b668f0dfdcc6c18b2791122165c237d
                              • Instruction ID: 92d012dfc76ad0b88f90baf039efd4199c89800c68a5b790a93b087e36e87654
                              • Opcode Fuzzy Hash: 5f8a1d136847d924b2cd9affe480fedc8b668f0dfdcc6c18b2791122165c237d
                              • Instruction Fuzzy Hash: 7D01E8B4A083019FC718CF0AC8D090ABBF6FFC8308F56856DA84897316C630E955CF85

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 352 6c8aa6f4-6c8aa716 HeapCreate 353 6c8aa71a-6c8aa723 352->353 354 6c8aa718-6c8aa719 352->354
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6C8A4776,00000001,?,?,?,6C8A48EF,?,?,?,6C8BE848,0000000C,6C8A49AA), ref: 6C8AA709
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: c8760113ce79f42ba6f0ed53abc50112ecca750b0113590efcad80c7c1650d89
                              • Instruction ID: c27e7af3a813e818140018c152ed01d752f482980a7255f7647d1fcfae5d9b0d
                              • Opcode Fuzzy Hash: c8760113ce79f42ba6f0ed53abc50112ecca750b0113590efcad80c7c1650d89
                              • Instruction Fuzzy Hash: 39D05E72694345AADF209FB15C087673BFC938579AF144836F80CC6580E6B4C681DA84
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6C897498
                              • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6C8976D5,?,00000000,?,00000000,00000104,00000000,?,6C8BBEF4,00000000), ref: 6C8974D6
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6C897546
                              • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C89756D
                              • CharUpperW.USER32(00000000), ref: 6C8975A0
                              • FindFirstFileW.KERNEL32(?,?), ref: 6C8975BC
                              • FindClose.KERNEL32(00000000), ref: 6C8975C8
                              • lstrlenW.KERNEL32(?), ref: 6C8975E6
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                              • String ID:
                              • API String ID: 624941980-0
                              • Opcode ID: 4bb13fb3d6df164719214ba0ff5ae8d58784d854e589048dd9eb9eea16b852eb
                              • Instruction ID: 0012c96d05f436cee356aa7c701208ea5c66d62ca6fc9add7d76da8e6b5a6752
                              • Opcode Fuzzy Hash: 4bb13fb3d6df164719214ba0ff5ae8d58784d854e589048dd9eb9eea16b852eb
                              • Instruction Fuzzy Hash: CE41B6719056169BDF359F6CCE4CBEE7778AF01318F100AE9E81991591DB359E88CF10
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 6C8A7C6C
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C8A7C81
                              • UnhandledExceptionFilter.KERNEL32(6C8BA4B8), ref: 6C8A7C8C
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 6C8A7CA8
                              • TerminateProcess.KERNEL32(00000000), ref: 6C8A7CAF
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: f28159fb7cc65ba2d58e6e8591dd8e9aa439947a7fc0d3f0aa340341dddd6ad4
                              • Instruction ID: 166c4680f1e70cd60ec804f02d8f57f208a21a925f387dc66b1866bd75bcd505
                              • Opcode Fuzzy Hash: f28159fb7cc65ba2d58e6e8591dd8e9aa439947a7fc0d3f0aa340341dddd6ad4
                              • Instruction Fuzzy Hash: D721BCB46023059FDF60DF69D1896897BF4BB0A30CB50453EE40997350E7709686EFC5
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6C8989FC
                              • __snwprintf_s.LIBCMT ref: 6C898A2E
                              • LoadLibraryW.KERNEL32(?), ref: 6C898A69
                                • Part of subcall function 6C8A5348: __getptd_noexit.LIBCMT ref: 6C8A5348
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                              • String ID: LOC
                              • API String ID: 3175857669-519433814
                              • Opcode ID: ad86f94d6f5f2f34220cb0e04ccc2db14302f03f3fd3f17ced1b03441222c5b4
                              • Instruction ID: ff0226ab971f02e7947ad2988e49866ae63b7ec60f1eff03ffa879c2ac069bcf
                              • Opcode Fuzzy Hash: ad86f94d6f5f2f34220cb0e04ccc2db14302f03f3fd3f17ced1b03441222c5b4
                              • Instruction Fuzzy Hash: AF11BB71A40309BFDB309BACCE44BEDB7FCAB42359F100C76A114A7580DBB49A49D7A1
                              APIs
                              • GetKeyState.USER32(00000010), ref: 6C8A0514
                              • GetKeyState.USER32(00000011), ref: 6C8A051D
                              • GetKeyState.USER32(00000012), ref: 6C8A0526
                              • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C8A053C
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: State$MessageSend
                              • String ID:
                              • API String ID: 1440529007-0
                              • Opcode ID: ec65fef9e30764b63e9389596474af647c9b50461104faf7157ec8d2aeb71c2f
                              • Instruction ID: 8ed65193c3e7af6950a1545e85616dfa8bb6a7461057757eddac4c200f8b1b1d
                              • Opcode Fuzzy Hash: ec65fef9e30764b63e9389596474af647c9b50461104faf7157ec8d2aeb71c2f
                              • Instruction Fuzzy Hash: C0F0B4357812DFA5EA3026F94E81FE925266F85B98F0008316646BE9C0CBA1C4074560
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6C898BE9
                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C898EB7,?,?), ref: 6C898C19
                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C898C2D
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6C898C69
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6C898C77
                              • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C898C94
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6C898CBF
                              • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C898CC8
                              • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6C898CE1
                              • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6C898CFE
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6C898D31
                              • ConvertDefaultLocale.KERNEL32(00000000), ref: 6C898D3A
                              • GetModuleFileNameW.KERNEL32(6C890000,?,00000105), ref: 6C898D7F
                              • _memset.LIBCMT ref: 6C898D9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                              • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                              • API String ID: 3537336938-2299501126
                              • Opcode ID: 74161e40489840127d4e2a53b5d396c18fba66cf4f3d4535f62ffb05e2ab2fc6
                              • Instruction ID: 82bddb1cf73e51bd2cfb88398c347af2062b5002f1ec2e7db949ae012c429634
                              • Opcode Fuzzy Hash: 74161e40489840127d4e2a53b5d396c18fba66cf4f3d4535f62ffb05e2ab2fc6
                              • Instruction Fuzzy Hash: C3514B70D0122A9ACB70DFA99D887ADB7B4EF58304F1005EBA448E7690D7789E85CF54
                              APIs
                              • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75C04A40,6C89DE36,?,?,?,?,?,?,?,6C89FCC6,00000000,00000002,00000028), ref: 6C89DCF9
                              • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6C89DD15
                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6C89DD2A
                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6C89DD3B
                              • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6C89DD4C
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6C89DD5D
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6C89DD6E
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6C89DD8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                              • API String ID: 667068680-2451437823
                              • Opcode ID: ac0d6dd1f5419299125c157920c0e6c96a1682607d5485fd4106151154324762
                              • Instruction ID: 546d4338fb57915801cd0d5a14129a70c5256abc7269576edd9133b1841b93f0
                              • Opcode Fuzzy Hash: ac0d6dd1f5419299125c157920c0e6c96a1682607d5485fd4106151154324762
                              • Instruction Fuzzy Hash: 49215E71A25165AF9B32AF788AC443ABAF4B6DB21E7218D3FD005F2B04C3B001C5DB94
                              APIs
                              • GetParent.USER32(?), ref: 6C89FC05
                              • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C89FC28
                              • GetWindowRect.USER32(?,?), ref: 6C89FC42
                              • CopyRect.USER32(?,?), ref: 6C89FCA5
                              • CopyRect.USER32(?,?), ref: 6C89FCAF
                              • GetWindowRect.USER32(00000000,?), ref: 6C89FCB8
                                • Part of subcall function 6C89DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C89DED6
                              • CopyRect.USER32(?,?), ref: 6C89FCD4
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Rect$Copy$Window$ByteCharMessageMultiParentSendWide
                              • String ID: (
                              • API String ID: 2332539329-3887548279
                              • Opcode ID: 374f969627d21a8f854cfa7916f1bab275a8089fab770ea59505791c796ea206
                              • Instruction ID: 8b221c266b8dbbab76ca4ed1ffa8f62ee44d156007f643d99c23ceda4d48b5ce
                              • Opcode Fuzzy Hash: 374f969627d21a8f854cfa7916f1bab275a8089fab770ea59505791c796ea206
                              • Instruction Fuzzy Hash: AE517F72A00619AFDB24CFACCE84AEEBBB9AF48358F154525F915F3640D730E905CB94
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6C8A19B8
                                • Part of subcall function 6C89C050: __EH_prolog3.LIBCMT ref: 6C89C057
                              • CallNextHookEx.USER32(?,?,?,?), ref: 6C8A19F8
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              • _memset.LIBCMT ref: 6C8A1A51
                              • GetClassLongW.USER32(?,000000E0), ref: 6C8A1A85
                              • GetClassNameW.USER32(?,?,00000100), ref: 6C8A1B20
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C8A1B5D
                              • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6C8A1B6F
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C8A1B77
                              • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6C8A1B86
                              • CallNextHookEx.USER32(?,00000003,?,?), ref: 6C8A1BA6
                              • UnhookWindowsHookEx.USER32(?), ref: 6C8A1BBA
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: HookProp$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_LongNameThrowUnhookWindows_memset
                              • String ID: #32768$AfxOldWndProc423
                              • API String ID: 3902210324-2141921550
                              • Opcode ID: 574962e5a96f7672f54cf0612ad3140ab4d82e040be8cac580149d1184f6aaca
                              • Instruction ID: 4a0769ce1510b034e58c08c616dd8a7bd7faacb6d7b40534e607620719e3e5c8
                              • Opcode Fuzzy Hash: 574962e5a96f7672f54cf0612ad3140ab4d82e040be8cac580149d1184f6aaca
                              • Instruction Fuzzy Hash: 0A510831500626FBCF319FA5CE48BDA7B78BF05359F0409A5F01997690EB30CA82CBA4
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C8BE928,0000000C,6C8AA25A,00000000,00000000,?,6C8AA5D4,00000000,00000001,00000000,?,6C8AA89E,00000018,6C8BE978,0000000C), ref: 6C8AA131
                              • __crt_waiting_on_module_handle.LIBCMT ref: 6C8AA13C
                                • Part of subcall function 6C8A5BCF: Sleep.KERNEL32(000003E8,00000000,?,6C8AA082,KERNEL32.DLL,?,?,6C8AA416,00000000,?,6C8A488C,00000000,?,?,?,6C8A48EF), ref: 6C8A5BDB
                                • Part of subcall function 6C8A5BCF: GetModuleHandleW.KERNEL32(00000000,?,6C8AA082,KERNEL32.DLL,?,?,6C8AA416,00000000,?,6C8A488C,00000000,?,?,?,6C8A48EF,?), ref: 6C8A5BE4
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6C8AA165
                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6C8AA175
                              • __lock.LIBCMT ref: 6C8AA197
                              • InterlockedIncrement.KERNEL32(?), ref: 6C8AA1A4
                              • __lock.LIBCMT ref: 6C8AA1B8
                              • ___addlocaleref.LIBCMT ref: 6C8AA1D6
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 1028249917-2843748187
                              • Opcode ID: 35864490cbfdfea334ac33fa36d0621ff834a2dca6145cefca6c4b33c0db2a2e
                              • Instruction ID: 3a15d910cf23427563f2f85b40ad01407f99b873da9c6b0b3878e7d8179201ab
                              • Opcode Fuzzy Hash: 35864490cbfdfea334ac33fa36d0621ff834a2dca6145cefca6c4b33c0db2a2e
                              • Instruction Fuzzy Hash: E2118171501705AED7308FA9CA04BDEBBE0AF44318F104D2AD4AAA3F90CB74A645DF54
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6C898503
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C898520
                              • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6C89852D
                              • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6C89853A
                              • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6C898547
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 667068680-2424895508
                              • Opcode ID: 30bf3e10e28add7b2b2e7d69b91a66f1fb0d4ea13e00eafa87175ff972e03cb5
                              • Instruction ID: 7306246522b399daf16636278e37f3bb91f28114ba540a30be6a5965dd19dae3
                              • Opcode Fuzzy Hash: 30bf3e10e28add7b2b2e7d69b91a66f1fb0d4ea13e00eafa87175ff972e03cb5
                              • Instruction Fuzzy Hash: 631154B2A05353EFCF30AF6E8A89486BFB4A74631DB144D3FE10993700D6309945CB91
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32,6C89A6B6), ref: 6C89A5AA
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C89A5CB
                              • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C89A5DD
                              • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C89A5EF
                              • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C89A601
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 417325364-2424895508
                              • Opcode ID: bd759de004b4c6f649771be1c3387bbb4f5b182baff5e5b9fbdcd7bdee0959f7
                              • Instruction ID: 9fc1ad72895135d5f0f1c0be567d7ac7a8bf3402873b18ac7600c401ad8a6f20
                              • Opcode Fuzzy Hash: bd759de004b4c6f649771be1c3387bbb4f5b182baff5e5b9fbdcd7bdee0959f7
                              • Instruction Fuzzy Hash: 14F0D474E06226BACF716FB68A089857EB8A70625E7008D3FA801A3700D774990ADFC5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                              • String ID: .CHM$.HLP$.INI
                              • API String ID: 2477486372-4017452060
                              • Opcode ID: 5d48884bc673886f116f938fd1cf17a0814f966e3b3b9408426392ae388ab4c9
                              • Instruction ID: 40c98c92ef20aec09fbdfc32fb98286cbcc088861a6842329a60ab24adc30621
                              • Opcode Fuzzy Hash: 5d48884bc673886f116f938fd1cf17a0814f966e3b3b9408426392ae388ab4c9
                              • Instruction Fuzzy Hash: DB4171B19017199BDB30EB7DCA44ADAB3F8AF44308F100DB9955AD7A42EB31E984CB54
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6C891BE9,?,?,?,?), ref: 6C891C39
                              • GetLastError.KERNEL32(?,?,?,?,?,6C891BE9,?,?,?,?), ref: 6C891C48
                              • __aullrem.LIBCMT ref: 6C891C60
                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6C891CE8
                              • _memset.LIBCMT ref: 6C891CF5
                              • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6C891BE9,?,?,?,?), ref: 6C891D07
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                              • String ID:
                              • API String ID: 123228641-0
                              • Opcode ID: fa3cf2da15cd8dfa3d0c684b430b113c43de5a62bbfc9639d8d1396dd6453016
                              • Instruction ID: e1e928633e74ec35b619b78c72c26edf1f46144074e12f1fc6c61160655cbf58
                              • Opcode Fuzzy Hash: fa3cf2da15cd8dfa3d0c684b430b113c43de5a62bbfc9639d8d1396dd6453016
                              • Instruction Fuzzy Hash: 76514A71709701AFD760DE2DC940B9BB7ECEF88758F044A29F958E7241E770E9058BA2
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6C89BE14
                              • RtlEnterCriticalSection.NTDLL(00000000), ref: 6C89BE25
                              • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6C89AF00,6C896DDD,6C8968AD,?,6C8A4902,?,?,?,?), ref: 6C89BE43
                              • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6C89AF00,6C896DDD,6C8968AD,?,6C8A4902,?), ref: 6C89BE77
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6C89BEE3
                              • _memset.LIBCMT ref: 6C89BF02
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6C89BF13
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C89BF34
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                              • String ID:
                              • API String ID: 1891723912-0
                              • Opcode ID: e4757f1174ff15ead69cc167bf6f289d700cf7335ced186766427fb837d1ca62
                              • Instruction ID: 30efd221db2e600046af05858d011073391eb3969c7a7af6964587fc99271263
                              • Opcode Fuzzy Hash: e4757f1174ff15ead69cc167bf6f289d700cf7335ced186766427fb837d1ca62
                              • Instruction Fuzzy Hash: 9E317E70501606EFDB309F58CA85CAABBB5EF01318B20C93EE65A97E50CB31A955CF90
                              APIs
                                • Part of subcall function 6C89815A: GetParent.USER32(?), ref: 6C8981AE
                                • Part of subcall function 6C89815A: GetLastActivePopup.USER32(?), ref: 6C8981BF
                                • Part of subcall function 6C89815A: IsWindowEnabled.USER32(?), ref: 6C8981D3
                                • Part of subcall function 6C89815A: EnableWindow.USER32(?,00000000), ref: 6C8981E6
                              • EnableWindow.USER32(?,00000001), ref: 6C898247
                              • GetWindowThreadProcessId.USER32(?,?), ref: 6C89825B
                              • GetCurrentProcessId.KERNEL32(?,?), ref: 6C898265
                              • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6C89827D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6C8982F9
                              • EnableWindow.USER32(00000000,00000001), ref: 6C898340
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                              • String ID: 0
                              • API String ID: 1877664794-4108050209
                              • Opcode ID: 3d0adedaf8003f221227e9555af95e273e37ee5c3399bd1d2876cf1ae05e0662
                              • Instruction ID: 3d9dc0f1ab24e048dfc3f1a55c98445305295bfafad58365f4b56818c1c763bb
                              • Opcode Fuzzy Hash: 3d0adedaf8003f221227e9555af95e273e37ee5c3399bd1d2876cf1ae05e0662
                              • Instruction Fuzzy Hash: 5E418471A4161A9FDB308FA8CD88BDA77B4FF05314F20096AE519E7641D770DA80CF91
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C89DED6
                              • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6C89DF00
                              • GetSystemMetrics.USER32(00000000), ref: 6C89DF17
                              • GetSystemMetrics.USER32(00000001), ref: 6C89DF1E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6C89DF49
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                              • String ID: B$DISPLAY
                              • API String ID: 381819527-3316187204
                              • Opcode ID: 77bf5982aa1adec7e486172d36c2d51ab0ca9df6c2e07690053c3d83c349bf3b
                              • Instruction ID: 74b796d16ecc582568fd9f939855650db7c223b82c643149c423ebac9a4eb959
                              • Opcode Fuzzy Hash: 77bf5982aa1adec7e486172d36c2d51ab0ca9df6c2e07690053c3d83c349bf3b
                              • Instruction Fuzzy Hash: 84212571605224ABDF308F188D85B6B7BA8EF4A764F104927FD19AB681D6B0D840CBE4
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6C89A20A
                              • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6C89A2F0
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C89A30D
                              • RegCloseKey.ADVAPI32(?), ref: 6C89A32D
                              • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6C89A348
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseEnumH_prolog3_OpenQueryValue
                              • String ID: Software\
                              • API String ID: 1666054129-964853688
                              • Opcode ID: 356ccc653cba8786cde841d35c6cba6850b32f6733ad61185e87c2f931942709
                              • Instruction ID: ff945208d15cf658a9a947ec7163a95ceef1a98f749ed42b015b85cc878fae76
                              • Opcode Fuzzy Hash: 356ccc653cba8786cde841d35c6cba6850b32f6733ad61185e87c2f931942709
                              • Instruction Fuzzy Hash: 9C418431D01519ABCB31DBACDD88ADEB7B9AF49318F140AE9E019A2650DB349B84CF50
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6C8A1868
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C8A1877
                              • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6C8A1900
                              • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6C8A1907
                              • GlobalDeleteAtom.KERNEL32(?), ref: 6C8A1911
                                • Part of subcall function 6C8A0C2C: GetWindowRect.USER32(?,10000000), ref: 6C8A0C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AtomGlobalProp$DeleteFindH_prolog3_catchRectRemoveWindow
                              • String ID: AfxOldWndProc423
                              • API String ID: 1599575004-1060338832
                              • Opcode ID: 6b784ee84c9c9e029a4ccd2827e42077dc031d2ee0f6b7ecb22173fa2fc44d81
                              • Instruction ID: 5b4b864f8a884b465cd5a17243ac2e66d7f0d2d53ea7e391340597d92c26ce5b
                              • Opcode Fuzzy Hash: 6b784ee84c9c9e029a4ccd2827e42077dc031d2ee0f6b7ecb22173fa2fc44d81
                              • Instruction Fuzzy Hash: 85319F3240111AEBCF219FE9CE48DFF7B78AF0A319F040829F601A2550C735D916DBA5
                              APIs
                              • __EH_prolog3_catch_GS.LIBCMT ref: 6C89A08C
                              • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6C89A11A
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C89A13D
                                • Part of subcall function 6C89A02D: __EH_prolog3.LIBCMT ref: 6C89A034
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: EnumH_prolog3H_prolog3_catch_Open
                              • String ID: Software\Classes\
                              • API String ID: 3518408925-1121929649
                              • Opcode ID: 4fb02e124bdb030b21a14ce44bf7028215e9ab3bac6097bf1f16b0bfc456f3f8
                              • Instruction ID: 65cf816a3b7fef86c0ae901a2ecc565dceac08cdf4c362397540f44c11887303
                              • Opcode Fuzzy Hash: 4fb02e124bdb030b21a14ce44bf7028215e9ab3bac6097bf1f16b0bfc456f3f8
                              • Instruction Fuzzy Hash: 50312F31C05129AACB31ABA8DE48BDDB7B8AB09354F1406E6E95963650D7308F84DF91
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6C89D0AE
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C89D0D1
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C89D0ED
                              • RegCloseKey.ADVAPI32(?), ref: 6C89D0FD
                              • RegCloseKey.ADVAPI32(?), ref: 6C89D107
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseCreate$Open
                              • String ID: software
                              • API String ID: 1740278721-2010147023
                              • Opcode ID: 50b6f3a8419fc6db6de9decca9eda9ec886449a295106a35bc75d015db248173
                              • Instruction ID: cab8f6aa57266071ee39cd3c52125a199a7bac276ca85936a7f868f83b74eef6
                              • Opcode Fuzzy Hash: 50b6f3a8419fc6db6de9decca9eda9ec886449a295106a35bc75d015db248173
                              • Instruction Fuzzy Hash: 6411F872D00119FB8B21DE9ACD88DDFBFBDEFC9754B1040AAF504A2111D7319A01EBA4
                              APIs
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6C89BEB5
                              • __CxxThrowException@8.LIBCMT ref: 6C89BEBF
                                • Part of subcall function 6C8A527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6C8A52BD
                              • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6C89AF00,6C896DDD,6C8968AD,?,6C8A4902,?), ref: 6C89BED6
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6C89BEE3
                                • Part of subcall function 6C896D89: __CxxThrowException@8.LIBCMT ref: 6C896D9F
                              • _memset.LIBCMT ref: 6C89BF02
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6C89BF13
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C89BF34
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                              • String ID:
                              • API String ID: 356813703-0
                              • Opcode ID: 4833a9a9b44347436a899626ba3080c9270f9930ee0418482fb1142b6e124ae4
                              • Instruction ID: f2a5430bb1761a3a70bffee11987d29a4278ab18477ddd4bd8d07711d45be252
                              • Opcode Fuzzy Hash: 4833a9a9b44347436a899626ba3080c9270f9930ee0418482fb1142b6e124ae4
                              • Instruction Fuzzy Hash: A8115274200605AFDB30AFA8C985C6ABBB5FF05318710C93AF65A96A21CB31AC55CF94
                              APIs
                              • SetErrorMode.KERNEL32(00000000), ref: 6C89CA85
                              • SetErrorMode.KERNEL32(00000000), ref: 6C89CA8D
                                • Part of subcall function 6C89A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C89A6D0
                                • Part of subcall function 6C89A698: SetLastError.KERNEL32(0000006F), ref: 6C89A6E7
                              • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C89CADC
                              • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6C89CAEC
                                • Part of subcall function 6C89C8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C89C91F
                                • Part of subcall function 6C89C8E2: PathFindExtensionW.SHLWAPI(?), ref: 6C89C939
                                • Part of subcall function 6C89C8E2: __wcsdup.LIBCMT ref: 6C89C983
                                • Part of subcall function 6C89C8E2: __wcsdup.LIBCMT ref: 6C89C9C2
                                • Part of subcall function 6C89C8E2: __wcsdup.LIBCMT ref: 6C89CA14
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                              • String ID: NotifyWinEvent$user32.dll
                              • API String ID: 3531328582-597752486
                              • Opcode ID: b4f2456ef4c15b3fc0bd039e0677b669c8c83d092a6d7c7e736f51767770667a
                              • Instruction ID: c4686815256e5b1e39a19bc28eed13d9b8229ae6e7c1e2a2610b11ee5740cc3d
                              • Opcode Fuzzy Hash: b4f2456ef4c15b3fc0bd039e0677b669c8c83d092a6d7c7e736f51767770667a
                              • Instruction Fuzzy Hash: 8701D470A002444FCB31EF6C8A04A9E3BE8EF44318B05487AF908E7B41DB31C844CFA5
                              APIs
                              • GetSysColor.USER32(0000000F), ref: 6C89CD2E
                              • GetSysColor.USER32(00000010), ref: 6C89CD35
                              • GetSysColor.USER32(00000014), ref: 6C89CD3C
                              • GetSysColor.USER32(00000012), ref: 6C89CD43
                              • GetSysColor.USER32(00000006), ref: 6C89CD4A
                              • GetSysColorBrush.USER32(0000000F), ref: 6C89CD57
                              • GetSysColorBrush.USER32(00000006), ref: 6C89CD5E
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Color$Brush
                              • String ID:
                              • API String ID: 2798902688-0
                              • Opcode ID: b8ed8c20989adf55738dd7fe9ccb42db8e94635d4adb97082c93c5166aa8af7c
                              • Instruction ID: 4c4e84a0f0e0b84bb74d9695a1eaf851410b69b7fdc0da76015ed20f7b9e3864
                              • Opcode Fuzzy Hash: b8ed8c20989adf55738dd7fe9ccb42db8e94635d4adb97082c93c5166aa8af7c
                              • Instruction Fuzzy Hash: 7CF0FE71A407445BDB30BB724909B47BAE1FFC4710F16092EE2458B990D6B6E441DF44
                              APIs
                              • __CreateFrameInfo.LIBCMT ref: 6C8AC43E
                                • Part of subcall function 6C8A4FC4: __getptd.LIBCMT ref: 6C8A4FD2
                                • Part of subcall function 6C8A4FC4: __getptd.LIBCMT ref: 6C8A4FE0
                              • __getptd.LIBCMT ref: 6C8AC448
                                • Part of subcall function 6C8AA27F: __getptd_noexit.LIBCMT ref: 6C8AA282
                                • Part of subcall function 6C8AA27F: __amsg_exit.LIBCMT ref: 6C8AA28F
                              • __getptd.LIBCMT ref: 6C8AC456
                              • __getptd.LIBCMT ref: 6C8AC464
                              • __getptd.LIBCMT ref: 6C8AC46F
                              • _CallCatchBlock2.LIBCMT ref: 6C8AC495
                                • Part of subcall function 6C8A5069: __CallSettingFrame@12.LIBCMT ref: 6C8A50B5
                                • Part of subcall function 6C8AC53C: __getptd.LIBCMT ref: 6C8AC54B
                                • Part of subcall function 6C8AC53C: __getptd.LIBCMT ref: 6C8AC559
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                              • String ID:
                              • API String ID: 1602911419-0
                              • Opcode ID: 3320c4cb207a8cab9faae571e809c18e51644a5a2865cfd10c21ef346a0fd114
                              • Instruction ID: 3e7b34de28b1872ba5fc3d9f2189dbc76693d0a7b1e1b26c807c91b9fb7afd63
                              • Opcode Fuzzy Hash: 3320c4cb207a8cab9faae571e809c18e51644a5a2865cfd10c21ef346a0fd114
                              • Instruction Fuzzy Hash: 2211E4B1800309DFDF10EFE8C644ADD7BB1BB18314F108869E814A7B51DB399A569F50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: _memset
                              • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                              • API String ID: 2102423945-1093365818
                              • Opcode ID: 12c5325718a66c807f9a5f3eb68d3e60dd68d8672849b3de8cb62ab0ce6bc742
                              • Instruction ID: 5970f75cd1fbee4af73597a961088234ee072e70bb358bd87124259ed2997c46
                              • Opcode Fuzzy Hash: 12c5325718a66c807f9a5f3eb68d3e60dd68d8672849b3de8cb62ab0ce6bc742
                              • Instruction Fuzzy Hash: 72916471C0120DAFDB60CFD9C684BDEBBF8AF48348F208575E919E6640E7749646C7A0
                              APIs
                              • __getptd.LIBCMT ref: 6C8AC17F
                                • Part of subcall function 6C8AA27F: __getptd_noexit.LIBCMT ref: 6C8AA282
                                • Part of subcall function 6C8AA27F: __amsg_exit.LIBCMT ref: 6C8AA28F
                              • __getptd.LIBCMT ref: 6C8AC190
                              • __getptd.LIBCMT ref: 6C8AC19E
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: MOC$csm
                              • API String ID: 803148776-1389381023
                              • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                              • Instruction ID: da8e22b7af5e13c6ad425c76b7f3924f696224209ea7d459b7bce4433f644ea0
                              • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                              • Instruction Fuzzy Hash: EFE04F316142088FD720ABF8C245B9837A5EB69318F2509A5D40CCBB22D736D556CD42
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,?,?,6C8949D6,?,00000003), ref: 6C895685
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6C8956B4
                              • GetLastError.KERNEL32 ref: 6C8956C5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6C8956E5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6C895709
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                              • String ID:
                              • API String ID: 3322701435-0
                              • Opcode ID: 272eeacb45f0183405ff39789d136348df15f2310e7184ae665bd97d500b1d44
                              • Instruction ID: 02207a9c57163a42f44b4a898dc2e012ae91ab6991450e19e7d9b9cfbef29d1f
                              • Opcode Fuzzy Hash: 272eeacb45f0183405ff39789d136348df15f2310e7184ae665bd97d500b1d44
                              • Instruction Fuzzy Hash: 5D117F75384306BBE630DE68DDC1F6B77ACEB86749F200E2DF64197281D670BC098664
                              APIs
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ParentWindow$ActiveEnableEnabledLastPopup
                              • String ID:
                              • API String ID: 2630416829-0
                              • Opcode ID: dd25b8f1f5b3e43eb9920725a38c5fb0b5f9c29bc38b089f2d2ff49534ebec22
                              • Instruction ID: eba8ba2899f5c523c1fe8c7feaec37747ec10ad64daeeb1470b0aaa0d6165c10
                              • Opcode Fuzzy Hash: dd25b8f1f5b3e43eb9920725a38c5fb0b5f9c29bc38b089f2d2ff49534ebec22
                              • Instruction Fuzzy Hash: D511C632606A23ABD7320A6E8F40B5E76BCAF45B6CF150A27ED14E7A04D770C80186D9
                              APIs
                              • lstrlenW.KERNEL32(?,?,?), ref: 6C89DA3D
                              • _memset.LIBCMT ref: 6C89DA5B
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 6C89DA75
                              • lstrcmpW.KERNEL32(?,?,?,?), ref: 6C89DA87
                              • SetWindowTextW.USER32(00000000,?), ref: 6C89DA93
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                              • String ID:
                              • API String ID: 4273134663-0
                              • Opcode ID: 75e8223dc2e40e34b7654ce4a4a5cd8116b14a0de30c55331da24f4068ef8a54
                              • Instruction ID: 6a56c0d39e8f1cd2bfb0295bed5edf85fde6fa290a04b2d26fa4e51bc6274e35
                              • Opcode Fuzzy Hash: 75e8223dc2e40e34b7654ce4a4a5cd8116b14a0de30c55331da24f4068ef8a54
                              • Instruction Fuzzy Hash: 9C0188B660131967CB20DEA98D889DBB3BDEF49748F004876E915D3201DA34D90887A4
                              APIs
                              • __getptd.LIBCMT ref: 6C8AFE1A
                                • Part of subcall function 6C8AA27F: __getptd_noexit.LIBCMT ref: 6C8AA282
                                • Part of subcall function 6C8AA27F: __amsg_exit.LIBCMT ref: 6C8AA28F
                              • __amsg_exit.LIBCMT ref: 6C8AFE3A
                              • __lock.LIBCMT ref: 6C8AFE4A
                              • InterlockedDecrement.KERNEL32(?), ref: 6C8AFE67
                              • InterlockedIncrement.KERNEL32(02BA2820), ref: 6C8AFE92
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: 50f7990ce0874ec3c325c3cbafb6014283ce74ee2fa19090e803b811270066a0
                              • Instruction ID: 0a8af4170da585a4dd6f93d3ab7fe54116f234d6e3d7f2478ff593a6ebbc0a7b
                              • Opcode Fuzzy Hash: 50f7990ce0874ec3c325c3cbafb6014283ce74ee2fa19090e803b811270066a0
                              • Instruction Fuzzy Hash: E801FE31A027219BDB319BE9860478E73B0EF1572DF510929D4106BF91C738AA97CBD5
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 6C89DB6D
                              • GetDlgCtrlID.USER32(00000000), ref: 6C89DB81
                              • GetWindowRect.USER32(00000000,?), ref: 6C89DBA3
                              • PtInRect.USER32(?,?,?), ref: 6C89DBB3
                              • GetWindow.USER32(?,00000005), ref: 6C89DBC0
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: RectWindow$ClientCtrlScreen
                              • String ID:
                              • API String ID: 4072766398-0
                              • Opcode ID: f5f7b1a41e27b6ed88b03eae7660055a5e41e5224977edb9d18883a079be59b4
                              • Instruction ID: 3b8f7b05aa92dec59b20a6606df7308aab7347bc2ece1a8723d70a2ce4a01519
                              • Opcode Fuzzy Hash: f5f7b1a41e27b6ed88b03eae7660055a5e41e5224977edb9d18883a079be59b4
                              • Instruction Fuzzy Hash: 2E014B3220111ABBDB215B698D08EAE3B78EF4B358F044926F91196090D734D516CAD8
                              APIs
                              • __lock.LIBCMT ref: 6C8A4636
                                • Part of subcall function 6C8AA914: __mtinitlocknum.LIBCMT ref: 6C8AA92A
                                • Part of subcall function 6C8AA914: __amsg_exit.LIBCMT ref: 6C8AA936
                                • Part of subcall function 6C8AA914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6C8AA93E
                              • ___sbh_find_block.LIBCMT ref: 6C8A4641
                              • ___sbh_free_block.LIBCMT ref: 6C8A4650
                              • HeapFree.KERNEL32(00000000,00000000,6C8BE828,0000000C,6C8AA270,00000000,?,6C8AA5D4,00000000,00000001,00000000,?,6C8AA89E,00000018,6C8BE978,0000000C), ref: 6C8A4680
                              • GetLastError.KERNEL32(?,6C8AA5D4,00000000,00000001,00000000,?,6C8AA89E,00000018,6C8BE978,0000000C,6C8AA92F,00000000,00000000,?,6C8AA32A,0000000D), ref: 6C8A4691
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: 89d6e3f8ca75b6318d904e7b45f20c49755cd4b1c341e2e5a85f0134fccaef13
                              • Instruction ID: b7f8b161d7a851d2c64d6fbf5df3b33b4c678eec7069d1e76834b49549db7d80
                              • Opcode Fuzzy Hash: 89d6e3f8ca75b6318d904e7b45f20c49755cd4b1c341e2e5a85f0134fccaef13
                              • Instruction Fuzzy Hash: 99018471901B15ABEF305FF59A047CE3B749F8172DF241939E01066E90CF789986CA98
                              APIs
                              • TlsFree.KERNEL32(?,?,?,6C89C179), ref: 6C89C13B
                              • GlobalHandle.KERNEL32(?), ref: 6C89C149
                              • GlobalUnlock.KERNEL32(00000000), ref: 6C89C152
                              • GlobalFree.KERNEL32(00000000), ref: 6C89C159
                              • RtlDeleteCriticalSection.NTDLL ref: 6C89C163
                                • Part of subcall function 6C89BF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6C89BFBC
                                • Part of subcall function 6C89BF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6C89BFCC
                                • Part of subcall function 6C89BF5D: LocalFree.KERNEL32(?), ref: 6C89BFD5
                                • Part of subcall function 6C89BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6C89BFE7
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                              • String ID:
                              • API String ID: 1549993015-0
                              • Opcode ID: 8444c34e28ab3fb436d44ca9ef44b13fb63a6fcfba031f00090ce13da23a2096
                              • Instruction ID: 20b1a53db537b9b06834e11580073eb195703a35985e737c8b92d8caabc94958
                              • Opcode Fuzzy Hash: 8444c34e28ab3fb436d44ca9ef44b13fb63a6fcfba031f00090ce13da23a2096
                              • Instruction Fuzzy Hash: 87F089763016029BDB306B3C9D4CE2B37B99F866687650A29F529D3642DB31D803C7B8
                              APIs
                              • GetMenuCheckMarkDimensions.USER32 ref: 6C8996F2
                              • _memset.LIBCMT ref: 6C89976A
                              • LoadBitmapW.USER32(00000000,00007FE3), ref: 6C8997E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: BitmapCheckDimensionsLoadMarkMenu_memset
                              • String ID:
                              • API String ID: 3130454499-3916222277
                              • Opcode ID: afd4ee26efb13d2ec25f789ffc2865ce9b1bf747d62243dbb6d334233cd45519
                              • Instruction ID: 3b9626bd0c279e0fc4a4676c8668c6125c4c0214a0ce67f42e634cae3289930b
                              • Opcode Fuzzy Hash: afd4ee26efb13d2ec25f789ffc2865ce9b1bf747d62243dbb6d334233cd45519
                              • Instruction Fuzzy Hash: 0F31F471B00215AFEB308F689DC5BA97BB5FB45308F4544B6E549EB281DF309A89CB90
                              APIs
                                • Part of subcall function 6C89C220: RtlEnterCriticalSection.NTDLL(6C8C34A8), ref: 6C89C25A
                                • Part of subcall function 6C89C220: RtlInitializeCriticalSection.NTDLL(?), ref: 6C89C26C
                                • Part of subcall function 6C89C220: RtlLeaveCriticalSection.NTDLL(6C8C34A8), ref: 6C89C279
                                • Part of subcall function 6C89C220: RtlEnterCriticalSection.NTDLL(?), ref: 6C89C289
                                • Part of subcall function 6C89BB0C: __EH_prolog3_catch.LIBCMT ref: 6C89BB13
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C8A1458
                              • FreeLibrary.KERNEL32(?), ref: 6C8A1468
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                              • String ID: HtmlHelpW$hhctrl.ocx
                              • API String ID: 2853499158-3773518134
                              • Opcode ID: ca91909ea5e4c7d643e7f20f14f208f57b3848a3b5f6b52003c939fa7576c70d
                              • Instruction ID: d50ec7795dba54b73fa967677e9e02a47fd61d30401a984a5d9402b8c7b11bc6
                              • Opcode Fuzzy Hash: ca91909ea5e4c7d643e7f20f14f208f57b3848a3b5f6b52003c939fa7576c70d
                              • Instruction Fuzzy Hash: 19018B31101706EBDB316BEDCF04B8B3BA6AB04369F048D29E45AA5E50DB31D4119A56
                              APIs
                              • ___BuildCatchObject.LIBCMT ref: 6C8AC7D6
                                • Part of subcall function 6C8AC731: ___BuildCatchObjectHelper.LIBCMT ref: 6C8AC767
                              • _UnwindNestedFrames.LIBCMT ref: 6C8AC7ED
                              • ___FrameUnwindToState.LIBCMT ref: 6C8AC7FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                              • String ID: csm
                              • API String ID: 2163707966-1018135373
                              • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction ID: f9fdb863686034518be1aec6f9500cdf0fec8c03a4e6b81fde6a6b1e26995b9e
                              • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction Fuzzy Hash: 6D01FB32001109BBDF226F99CE44EEA7F6AFF49358F104420FD2855A21DB32D5B2DBA1
                              APIs
                              • GetModuleHandleA.KERNEL32(KERNEL32,6C8A77D7), ref: 6C8AED7C
                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6C8AED8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: IsProcessorFeaturePresent$KERNEL32
                              • API String ID: 1646373207-3105848591
                              • Opcode ID: dc4abc325c3717097f40320b850e9f1251437de81adb751ca73f87e3ace4d178
                              • Instruction ID: b4b68fe3d124ba520e854a03c25752a628b25571d42676df8cf78ca9a54388f6
                              • Opcode Fuzzy Hash: dc4abc325c3717097f40320b850e9f1251437de81adb751ca73f87e3ace4d178
                              • Instruction Fuzzy Hash: 01F0122060190AE2DF201BE59E196AE7B79BB8174AF420D90D1A5B0584DF318071D389
                              APIs
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: File$SizeTime_memset
                              • String ID:
                              • API String ID: 151880914-0
                              • Opcode ID: d90da86df14aae76d478e3d5396535ce1c964ca204f4c9fc08f04405c8c44b0c
                              • Instruction ID: 888ad743e803605a3fe438532c8619ae3b301a762c93f4f70b99e688d0d444a4
                              • Opcode Fuzzy Hash: d90da86df14aae76d478e3d5396535ce1c964ca204f4c9fc08f04405c8c44b0c
                              • Instruction Fuzzy Hash: 7E510D715046059FDB24CF69CA40D9AB7F8FF09714B148E2EE5A6D3A90E730E944CB64
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6C8B084F
                              • __isleadbyte_l.LIBCMT ref: 6C8B0883
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6C8A40D8,6C8BBF84,00000000,00000000,?,?,?,?,6C8A40D8,00000000,?), ref: 6C8B08B4
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6C8A40D8,00000001,00000000,00000000,?,?,?,?,6C8A40D8,00000000,?), ref: 6C8B0922
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 53c3dd0069c579c0c661bea63ec7675733ee38d97e3c939a82799bfb1d89304b
                              • Instruction ID: f2f416c35cbc59ac7ffb2d795303e6522cdefc54975ccf08262dbba846278b52
                              • Opcode Fuzzy Hash: 53c3dd0069c579c0c661bea63ec7675733ee38d97e3c939a82799bfb1d89304b
                              • Instruction Fuzzy Hash: EF31C8719012DAEFDB20CF64CF809AE3BB5BF01314F144969E464AB7A1DB30DA41DB90
                              APIs
                              • GlobalLock.KERNEL32(?), ref: 6C8988E7
                              • lstrcmpW.KERNEL32(00000000,?), ref: 6C8988F4
                              • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C89892E
                              • GlobalLock.KERNEL32(00000000), ref: 6C898938
                                • Part of subcall function 6C89DAD1: GlobalFlags.KERNEL32(?), ref: 6C89DAE0
                                • Part of subcall function 6C89DAD1: GlobalUnlock.KERNEL32(?), ref: 6C89DAF2
                                • Part of subcall function 6C89DAD1: GlobalFree.KERNEL32(?), ref: 6C89DAFD
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                              • String ID:
                              • API String ID: 2391069079-0
                              • Opcode ID: f4e10ead209d3bac231324994e87c14b6297a2a728e9290844f887109690f5f4
                              • Instruction ID: a8278c6b85c86dd1270c9942e9883d070234eee984453941cdd9a8587b091f14
                              • Opcode Fuzzy Hash: f4e10ead209d3bac231324994e87c14b6297a2a728e9290844f887109690f5f4
                              • Instruction Fuzzy Hash: 54118F71500A05BFCB325BA9CD88CAF7BFDFB85B08B10082AFA05E2620D731D910D760
                              APIs
                              • RtlEnterCriticalSection.NTDLL(?), ref: 6C89BFBC
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6C89BFCC
                              • LocalFree.KERNEL32(?), ref: 6C89BFD5
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6C89BFE7
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterFreeLeaveLocalValue
                              • String ID:
                              • API String ID: 2949335588-0
                              • Opcode ID: 9c321ec606bb40ef09bc382f9aa253e706fc34b27944ccb3a6afab3a74548755
                              • Instruction ID: c0b16daa6f5acb4f67f300bba7af6c7c942c5820004601d3837db0bbd966d3fb
                              • Opcode Fuzzy Hash: 9c321ec606bb40ef09bc382f9aa253e706fc34b27944ccb3a6afab3a74548755
                              • Instruction Fuzzy Hash: 94115671601605EFD734CF58C984F6AB7B8FF46319F20882AE1578BAA1CB71A840CF50
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6C898ED0
                                • Part of subcall function 6C899C7C: __EH_prolog3.LIBCMT ref: 6C899C83
                              • __wcsdup.LIBCMT ref: 6C898EF2
                              • GetCurrentThread.KERNEL32 ref: 6C898F1F
                              • GetCurrentThreadId.KERNEL32 ref: 6C898F28
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentH_prolog3Thread$__wcsdup
                              • String ID:
                              • API String ID: 190065205-0
                              • Opcode ID: df82f62d555ac0b9776dc06a09242f271098971ecb96c439b16123e4286659e6
                              • Instruction ID: 7776802235176a39efefd84501a7481d3a51d7c6845dcba5b5f3b774c3c3c435
                              • Opcode Fuzzy Hash: df82f62d555ac0b9776dc06a09242f271098971ecb96c439b16123e4286659e6
                              • Instruction Fuzzy Hash: 3A216CB0901B458FC7718F6E864568AFAE8BFA4704F108D2FD1AAC7B21DBB5A045CF45
                              APIs
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C8A1D33
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C8A1D5E
                              • GetCapture.USER32 ref: 6C8A1D70
                              • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C8A1D7F
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: MessageSend$Capture
                              • String ID:
                              • API String ID: 1665607226-0
                              • Opcode ID: cc8327cc3e0204de4279df88357f3708bff8021c1a7736af1523193119339526
                              • Instruction ID: 6abc0d34f400a54387f6062fccc5cafb8611ce221c2f9ab6b0b6bbc2befb8fd8
                              • Opcode Fuzzy Hash: cc8327cc3e0204de4279df88357f3708bff8021c1a7736af1523193119339526
                              • Instruction Fuzzy Hash: 790171313502947BDF301BA68DCDFDB3E7ADFCEB15F110478B6059A1E6CAA18805DA60
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6C896A8A
                                • Part of subcall function 6C8968E2: _malloc.LIBCMT ref: 6C896900
                              • __CxxThrowException@8.LIBCMT ref: 6C896AC0
                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6C8916A6,00000000,00000000,?,?,6C8BD898,00000004,6C8916A6,00000000,6C8969F9,00000000), ref: 6C896AEA
                              • LocalFree.KERNEL32(6C8916A6,6C8916A6,00000000,6C8969F9,00000000), ref: 6C896B12
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                              • String ID:
                              • API String ID: 1776251131-0
                              • Opcode ID: 2e7cdc7346e70c9959d32f9cd3759f7c60c4062a5982b2e799d2456e16586b74
                              • Instruction ID: 472a563c4d7c5a4eea4653a542e24b44a879f0cdc754842bf12e7df512f8d164
                              • Opcode Fuzzy Hash: 2e7cdc7346e70c9959d32f9cd3759f7c60c4062a5982b2e799d2456e16586b74
                              • Instruction Fuzzy Hash: CF114C7164020AAFDF149FACCE40AAA7BB5EF48314F24C939B525DA690E73189509B94
                              APIs
                              • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6C89D194
                              • RegCloseKey.ADVAPI32(00000000), ref: 6C89D19D
                              • swprintf.LIBCMT ref: 6C89D1BA
                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6C89D1CB
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ClosePrivateProfileStringValueWriteswprintf
                              • String ID:
                              • API String ID: 22681860-0
                              • Opcode ID: 91dc12f8218bac324db83003c211cf4ebb383c66c4623ed39ec988ad3c0b2678
                              • Instruction ID: bf1aea4188f773eb5daeeda58d37b179c3cea9ff5d5440d2f6063cce188256a7
                              • Opcode Fuzzy Hash: 91dc12f8218bac324db83003c211cf4ebb383c66c4623ed39ec988ad3c0b2678
                              • Instruction Fuzzy Hash: BC01657260120DABDB209F688D45FAFB7BCAF49758F10082AF911A7640DB75ED0587A4
                              APIs
                                • Part of subcall function 6C8968E2: _malloc.LIBCMT ref: 6C896900
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6C8972BB
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 6C8972C1
                              • DuplicateHandle.KERNEL32(00000000), ref: 6C8972C4
                              • GetLastError.KERNEL32(?), ref: 6C8972DF
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                              • String ID:
                              • API String ID: 3704204646-0
                              • Opcode ID: e6076de5981e7cc2aa0de2533d10a758ed901022e1f78846b0911c4117aa7390
                              • Instruction ID: ac38b4fe200f74e8366957406bdf1e7c5a25bee24ab624fd02c9b46512d6def9
                              • Opcode Fuzzy Hash: e6076de5981e7cc2aa0de2533d10a758ed901022e1f78846b0911c4117aa7390
                              • Instruction Fuzzy Hash: 51018831700605BBDB209BADCD49F5A7BA9DF85754F144829F505DB681EF71DC00C760
                              APIs
                              • GetTopWindow.USER32(?), ref: 6C8A0F9D
                              • GetTopWindow.USER32(00000000), ref: 6C8A0FDC
                              • GetWindow.USER32(00000000,00000002), ref: 6C8A0FFA
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window
                              • String ID:
                              • API String ID: 2353593579-0
                              • Opcode ID: 8c5c144595c652748428e3d9de1915c401a97f60b93c7aa10959f886fbeb1f92
                              • Instruction ID: ebeb2d90bdd639784f3c92590677045186c33583b6ea4e41d3d85fed6861691e
                              • Opcode Fuzzy Hash: 8c5c144595c652748428e3d9de1915c401a97f60b93c7aa10959f886fbeb1f92
                              • Instruction Fuzzy Hash: F1018C3200565ABBCF221FD58E08EDF3F26AF4D399F004421FA1261560C736C532EBA5
                              APIs
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction ID: a18d6a13e0d1c761d10264d2e28ef20481bfdd1f82d6d827cd4a194d4c965ed8
                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction Fuzzy Hash: 6C11727245014EBBCF225FC4CE018DD3F62BB19358F158C14FA2855530D736C6B2AB81
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 6C8A03DC
                              • GetTopWindow.USER32(00000000), ref: 6C8A03EF
                                • Part of subcall function 6C8A03CF: GetWindow.USER32(00000000,00000002), ref: 6C8A0436
                              • GetTopWindow.USER32(?), ref: 6C8A041F
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Item
                              • String ID:
                              • API String ID: 369458955-0
                              • Opcode ID: 337e0bddee2fb9fa83ba351097ef2f17e5fd54b03fed4dd729f8793a91f1d9c7
                              • Instruction ID: 26a4de6a7b7a418da6f0bb70b7822f156e06314926f60a6cd6d7635e795ef4c1
                              • Opcode Fuzzy Hash: 337e0bddee2fb9fa83ba351097ef2f17e5fd54b03fed4dd729f8793a91f1d9c7
                              • Instruction Fuzzy Hash: CC01B13610759A6FCB322EA68E04E8F3B29BF4539DF048931FD1995501D731C51386D6
                              APIs
                              • GetSystemMetrics.USER32(0000000B), ref: 6C89CD75
                              • GetSystemMetrics.USER32(0000000C), ref: 6C89CD7C
                              • GetSystemMetrics.USER32(00000002), ref: 6C89CD83
                              • GetSystemMetrics.USER32(00000003), ref: 6C89CD8D
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 9b5f5449f8b47f67c1634a75eb74484cc4ac87ff07650bb8fdb58a31828e1ed4
                              • Instruction ID: a5b8e042bc610044724eb98231dbb3cf0d2c7829a42932ddb0030a700392e16d
                              • Opcode Fuzzy Hash: 9b5f5449f8b47f67c1634a75eb74484cc4ac87ff07650bb8fdb58a31828e1ed4
                              • Instruction Fuzzy Hash: 3EF06DB1F40715BAEB205B728C49F667F78EB46765F004527E6058B280CAB59801CFD0
                              APIs
                              • RtlEnterCriticalSection.NTDLL(6C8C34A8), ref: 6C89C25A
                              • RtlInitializeCriticalSection.NTDLL(?), ref: 6C89C26C
                              • RtlLeaveCriticalSection.NTDLL(6C8C34A8), ref: 6C89C279
                              • RtlEnterCriticalSection.NTDLL(?), ref: 6C89C289
                                • Part of subcall function 6C896DC1: __CxxThrowException@8.LIBCMT ref: 6C896DD7
                                • Part of subcall function 6C896DC1: __EH_prolog3.LIBCMT ref: 6C896DE4
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                              • String ID:
                              • API String ID: 2895727460-0
                              • Opcode ID: d845d2f6c2a51eb38dedfdd91e6965dc496f07872bba0cff07357a46fe4c58ef
                              • Instruction ID: 7410a8ea3960beb7f0f4d5b6d0c0c55c6b0348d5105bf4c6724d453a30d7da4c
                              • Opcode Fuzzy Hash: d845d2f6c2a51eb38dedfdd91e6965dc496f07872bba0cff07357a46fe4c58ef
                              • Instruction Fuzzy Hash: 98F0C8322001056FCA301BDD9D857857B79EBE2319F150C26E11443902CB35D942C5E6
                              APIs
                              • RtlEnterCriticalSection.NTDLL(6C8C32EC), ref: 6C89BA69
                              • TlsGetValue.KERNEL32(6C8C32D0,?,?,?,?,6C89C0B7,?,00000004,6C89AF00,6C896DDD,6C8968AD,?,6C8A4902,?), ref: 6C89BA7D
                              • RtlLeaveCriticalSection.NTDLL(6C8C32EC), ref: 6C89BA93
                              • RtlLeaveCriticalSection.NTDLL(6C8C32EC), ref: 6C89BA9E
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterValue
                              • String ID:
                              • API String ID: 3969253408-0
                              • Opcode ID: 05669f309a311cd3a94b59eaa7642662428918c7e2c556bfa4ef155d41542c78
                              • Instruction ID: 4e38c9e843679a65ede05ec3c42dd5b3502a8cc07cdf514dfcb04a2ad873771e
                              • Opcode Fuzzy Hash: 05669f309a311cd3a94b59eaa7642662428918c7e2c556bfa4ef155d41542c78
                              • Instruction Fuzzy Hash: 33F05E763062059FD7308F5CC988C1AF7FDEB853A831A4836E65D93601D630F846DBA0
                              APIs
                              • __getptd.LIBCMT ref: 6C8B0586
                                • Part of subcall function 6C8AA27F: __getptd_noexit.LIBCMT ref: 6C8AA282
                                • Part of subcall function 6C8AA27F: __amsg_exit.LIBCMT ref: 6C8AA28F
                              • __getptd.LIBCMT ref: 6C8B059D
                              • __amsg_exit.LIBCMT ref: 6C8B05AB
                              • __lock.LIBCMT ref: 6C8B05BB
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 4009ebf5eda3db761a600fc070536e49e6079434bb9a29f078aaae0a646372bb
                              • Instruction ID: 8029a4edbef8ef23b4ba8c33288a99a37188de2e0d9a8676b13c12ad56446c4f
                              • Opcode Fuzzy Hash: 4009ebf5eda3db761a600fc070536e49e6079434bb9a29f078aaae0a646372bb
                              • Instruction Fuzzy Hash: E3F06DB2901B148FDA30AFAC8705BC932A06B00728F514D699450B7FA0CB78A64ACF51
                              APIs
                              • _memset.LIBCMT ref: 6C8A029B
                              • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6C8A02C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: MessageSend_memset
                              • String ID: ,
                              • API String ID: 1827994538-3772416878
                              • Opcode ID: df3ef745ea1d58794270897cea7cf0f748eba3a3d916f40978c3d53784afcba0
                              • Instruction ID: dddfb26afab66cf51a9193b687c5dcac5ae22a62ffcd03cae2ba7dcb3326731f
                              • Opcode Fuzzy Hash: df3ef745ea1d58794270897cea7cf0f748eba3a3d916f40978c3d53784afcba0
                              • Instruction Fuzzy Hash: 6F31CE306017509FDB219FF9CA84A9DB7F4BF49318F200A3DE55697A90DB30E805CB94
                              APIs
                                • Part of subcall function 6C89A59C: GetModuleHandleW.KERNEL32(KERNEL32,6C89A6B6), ref: 6C89A5AA
                                • Part of subcall function 6C89A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C89A5CB
                                • Part of subcall function 6C89A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C89A5DD
                                • Part of subcall function 6C89A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C89A5EF
                                • Part of subcall function 6C89A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C89A601
                              • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C89A6D0
                              • SetLastError.KERNEL32(0000006F), ref: 6C89A6E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Module$ErrorFileHandleLastName
                              • String ID:
                              • API String ID: 2524245154-3916222277
                              • Opcode ID: 9001ba3ae5798f97f67e1159ccc896fd1b0a2372c9eced45d09c29ab6b5cb8a8
                              • Instruction ID: cdcae920ed24d3714d28682f287805ce1a433bf6e64eb19f0fd82a1cb000073e
                              • Opcode Fuzzy Hash: 9001ba3ae5798f97f67e1159ccc896fd1b0a2372c9eced45d09c29ab6b5cb8a8
                              • Instruction Fuzzy Hash: F9215070D00218AEDB30DF79C9987DEB7B4BF05328F508AADD069D6280DB749A89DF50
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C898E78
                              • PathFindExtensionW.SHLWAPI(?), ref: 6C898E8E
                                • Part of subcall function 6C898BDF: __EH_prolog3_GS.LIBCMT ref: 6C898BE9
                                • Part of subcall function 6C898BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C898EB7,?,?), ref: 6C898C19
                                • Part of subcall function 6C898BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C898C2D
                                • Part of subcall function 6C898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C898C69
                                • Part of subcall function 6C898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C898C77
                                • Part of subcall function 6C898BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C898C94
                                • Part of subcall function 6C898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C898CBF
                                • Part of subcall function 6C898BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C898CC8
                                • Part of subcall function 6C898BDF: GetModuleFileNameW.KERNEL32(6C890000,?,00000105), ref: 6C898D7F
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                              • String ID: %s%s.dll
                              • API String ID: 1311856149-1649984862
                              • Opcode ID: d069dae87a525abac206443c9d1c3a9fd10900b7bd2185278c8bbe66465336a9
                              • Instruction ID: 36dc57b2ae14d8213576c4b0a8b2ecb5c4861edbf6578ab076363e3141d73e47
                              • Opcode Fuzzy Hash: d069dae87a525abac206443c9d1c3a9fd10900b7bd2185278c8bbe66465336a9
                              • Instruction Fuzzy Hash: 9F018672A11519AFCB21DBACD985DEFB7F9FF4A304F01087AA505EB240DA70DA05CB94
                              APIs
                                • Part of subcall function 6C8A5017: __getptd.LIBCMT ref: 6C8A501D
                                • Part of subcall function 6C8A5017: __getptd.LIBCMT ref: 6C8A502D
                              • __getptd.LIBCMT ref: 6C8AC54B
                                • Part of subcall function 6C8AA27F: __getptd_noexit.LIBCMT ref: 6C8AA282
                                • Part of subcall function 6C8AA27F: __amsg_exit.LIBCMT ref: 6C8AA28F
                              • __getptd.LIBCMT ref: 6C8AC559
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.1823207048.000000006C891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C890000, based on PE: true
                              • Associated: 00000002.00000002.1823187912.000000006C890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823311491.000000006C8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000002.00000002.1823353967.000000006C8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_6c890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: csm
                              • API String ID: 803148776-1018135373
                              • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                              • Instruction ID: 551bc56631350844f346044f3842dde22f65958ee53ff45ccbcb55526cc76700
                              • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                              • Instruction Fuzzy Hash: AF018B708053018BCF30AFE6C64069EBFB5BF10218F640C2EE4509AE52EB328A96DF41

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 25 6f8963f0-6f8963f8 26 6f89649c-6f8964c1 25->26 27 6f8963fe-6f89640f 25->27 28 6f8964c3 26->28 29 6f896524 26->29 30 6f896413-6f89641e 27->30 31 6f8964c5-6f8964cb 28->31 34 6f896526-6f896551 29->34 32 6f896481 30->32 33 6f896420 30->33 31->31 36 6f8964cd-6f8964cf 31->36 35 6f896483-6f896487 32->35 37 6f896422-6f896427 33->37 38 6f8965f1 34->38 39 6f896557-6f896568 34->39 40 6f89671b-6f89671e 35->40 41 6f89648d-6f896492 35->41 36->29 42 6f8964d1-6f8964d7 36->42 37->37 44 6f896429-6f89642b 37->44 43 6f8965f3-6f896661 LoadLibraryA VirtualProtect call 6f8967f8 VirtualProtect 38->43 45 6f89656c-6f896577 39->45 41->30 46 6f896498 41->46 47 6f8964dd-6f8964e6 42->47 48 6f8966f0 42->48 63 6f896663 43->63 64 6f896682-6f8966a9 43->64 44->32 50 6f89642d-6f896433 44->50 51 6f896579 45->51 52 6f8965da 45->52 46->26 54 6f8964ea-6f896501 47->54 56 6f896439-6f896443 50->56 57 6f8966e6 50->57 58 6f89657b-6f896580 51->58 53 6f8965dc-6f8965e0 52->53 60 6f896704-6f896716 53->60 61 6f8965e6-6f8965eb 53->61 54->54 62 6f896503-6f896513 54->62 65 6f896447-6f89645e 56->65 67 6f8966fa 57->67 58->58 59 6f896582-6f896584 58->59 59->52 66 6f896586-6f89658c 59->66 60->43 61->38 61->45 62->34 68 6f896515-6f896522 62->68 69 6f896667-6f896680 63->69 65->65 70 6f896460-6f896471 65->70 66->67 73 6f896592-6f89659c 66->73 67->60 68->34 69->64 69->69 70->35 72 6f896473-6f89647f 70->72 72->35 74 6f8965a0-6f8965b7 73->74 74->74 75 6f8965b9-6f8965ca 74->75 75->53 76 6f8965cc-6f8965d8 75->76 76->53
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6F896602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6F89663B
                              • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6F896654
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ProtectVirtual$LibraryLoad
                              • String ID:
                              • API String ID: 895956442-0
                              • Opcode ID: 6f0aacfc2c187fce142084fc89317a85915c6eb7af70b71572f7478fbcdfd530
                              • Instruction ID: 003e144786f6e58125a7a595472bc8fd4105e5060ead9cdf47d48a4cf7e4949f
                              • Opcode Fuzzy Hash: 6f0aacfc2c187fce142084fc89317a85915c6eb7af70b71572f7478fbcdfd530
                              • Instruction Fuzzy Hash: 98A1BD306087558FC315CF6CC89066AFBE2BFCA304F0989AEE8959B256D731E955CBC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 105 6f895ca0-6f895d95 call 6f89af9c * 2 call 6f89afc3 * 2 call 6f8964e0 GetPEB 116 6f895de4 105->116 117 6f895d97 105->117 119 6f895de6-6f895e1d 116->119 118 6f895d99-6f895da3 117->118 120 6f895da5-6f895dab 118->120 121 6f895dd6-6f895dd8 118->121 122 6f895eba-6f895f0c GlobalAlloc 119->122 123 6f895e23-6f895e3c 119->123 124 6f895dae-6f895db5 120->124 125 6f895dde-6f895de2 121->125 126 6f8967e1-6f8967e4 121->126 127 6f895fad 122->127 128 6f895f12-6f895f2b 122->128 129 6f895e40-6f895e4e 123->129 130 6f895dc1-6f895dcd 124->130 131 6f895db7-6f895dbd 124->131 125->116 125->118 126->119 132 6f895faf-6f895fce 127->132 133 6f895f2f-6f895f3d 128->133 134 6f895e50 129->134 135 6f895ea3 129->135 130->124 138 6f895dcf-6f895dd3 130->138 131->130 136 6f895dbf 131->136 143 6f895fd0 132->143 144 6f895fe7-6f895fea 132->144 140 6f895f3f 133->140 141 6f895f92 133->141 142 6f895e52-6f895e58 134->142 137 6f895ea5-6f895ea9 135->137 136->130 146 6f895eaf-6f895eb4 137->146 147 6f8967c3-6f8967d8 137->147 138->121 148 6f895f41-6f895f47 140->148 145 6f895f94-6f895f98 141->145 142->142 149 6f895e5a-6f895e5c 142->149 150 6f895fd2-6f895fe5 143->150 151 6f895fec 144->151 152 6f895ffe-6f896038 144->152 153 6f895f9e-6f895fa3 145->153 154 6f8967a5-6f8967be 145->154 146->129 156 6f895eb6 146->156 148->148 157 6f895f49-6f895f4b 148->157 149->135 158 6f895e5e-6f895e64 149->158 150->144 150->150 161 6f895fee-6f895ffc 151->161 162 6f8960d9 152->162 163 6f89603e-6f896057 152->163 153->133 164 6f895fa5-6f895fa9 153->164 154->132 156->122 157->141 165 6f895f4d-6f895f53 157->165 159 6f8966aa-6f8966af 158->159 160 6f895e6a-6f895e6e 158->160 171 6f895e90-6f895e95 159->171 168 6f895e70-6f895e86 160->168 161->152 161->161 169 6f8960db-6f8960ef 162->169 170 6f89605b-6f896069 163->170 164->127 166 6f895f59-6f895f5d 165->166 167 6f8966b4 165->167 172 6f895f5f-6f895f75 166->172 177 6f8966be 167->177 168->168 173 6f895e88-6f895e8c 168->173 175 6f89606b 170->175 176 6f8960be 170->176 171->137 174 6f895e97-6f895ea1 171->174 172->172 178 6f895f77-6f895f84 172->178 173->171 174->137 179 6f89606d-6f896073 175->179 180 6f8960c0-6f8960c4 176->180 181 6f896788-6f8967a0 177->181 178->145 183 6f895f86-6f895f90 178->183 179->179 184 6f896075-6f896077 179->184 180->181 182 6f8960ca-6f8960cf 180->182 181->169 182->170 185 6f8960d1-6f8960d5 182->185 183->145 184->176 186 6f896079-6f89607f 184->186 185->162 186->177 187 6f896085-6f896089 186->187 188 6f89608b-6f8960a1 187->188 188->188 189 6f8960a3-6f8960b0 188->189 189->180 190 6f8960b2-6f8960bc 189->190 190->180
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoad_memset
                              • String ID:
                              • API String ID: 2997193564-0
                              • Opcode ID: ef81d5b86e1abce2a70dfb6e3ee866cd389735145dc0944f1b217b9e8cc4b2da
                              • Instruction ID: 971c97aba5517516d62903588c51ebaf75fe51d2e92291242992ebc006a3c803
                              • Opcode Fuzzy Hash: ef81d5b86e1abce2a70dfb6e3ee866cd389735145dc0944f1b217b9e8cc4b2da
                              • Instruction Fuzzy Hash: 02E16BB0A08B069FC718CF1DC49062AFBE1FF89314F5589AEE8999B351D730B955CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 351 6f895e70-6f895e86 351->351 352 6f895e88-6f895e8c 351->352 353 6f895e90-6f895e95 352->353 354 6f895ea5-6f895ea9 353->354 355 6f895e97-6f895ea1 353->355 356 6f895eaf-6f895eb4 354->356 357 6f8967c3-6f8967d8 354->357 355->354 359 6f895e40-6f895e4e 356->359 360 6f895eb6-6f895f0c GlobalAlloc 356->360 362 6f895e50 359->362 363 6f895ea3 359->363 364 6f895fad 360->364 365 6f895f12-6f895f2b 360->365 366 6f895e52-6f895e58 362->366 363->354 367 6f895faf-6f895fce 364->367 368 6f895f2f-6f895f3d 365->368 366->366 369 6f895e5a-6f895e5c 366->369 374 6f895fd0 367->374 375 6f895fe7-6f895fea 367->375 371 6f895f3f 368->371 372 6f895f92 368->372 369->363 373 6f895e5e-6f895e64 369->373 379 6f895f41-6f895f47 371->379 378 6f895f94-6f895f98 372->378 376 6f8966aa-6f8966af 373->376 377 6f895e6a-6f895e6e 373->377 380 6f895fd2-6f895fe5 374->380 381 6f895fec 375->381 382 6f895ffe-6f896038 375->382 376->353 377->351 383 6f895f9e-6f895fa3 378->383 384 6f8967a5-6f8967be 378->384 379->379 385 6f895f49-6f895f4b 379->385 380->375 380->380 386 6f895fee-6f895ffc 381->386 387 6f8960d9 382->387 388 6f89603e-6f896057 382->388 383->368 389 6f895fa5-6f895fa9 383->389 384->367 385->372 390 6f895f4d-6f895f53 385->390 386->382 386->386 393 6f8960db-6f8960ef 387->393 394 6f89605b-6f896069 388->394 389->364 391 6f895f59-6f895f5d 390->391 392 6f8966b4 390->392 395 6f895f5f-6f895f75 391->395 398 6f8966be 392->398 396 6f89606b 394->396 397 6f8960be 394->397 395->395 399 6f895f77-6f895f84 395->399 400 6f89606d-6f896073 396->400 401 6f8960c0-6f8960c4 397->401 402 6f896788-6f8967a0 398->402 399->378 404 6f895f86-6f895f90 399->404 400->400 405 6f896075-6f896077 400->405 401->402 403 6f8960ca-6f8960cf 401->403 402->393 403->394 406 6f8960d1-6f8960d5 403->406 404->378 405->397 407 6f896079-6f89607f 405->407 406->387 407->398 408 6f896085-6f896089 407->408 409 6f89608b-6f8960a1 408->409 409->409 410 6f8960a3-6f8960b0 409->410 410->401 411 6f8960b2-6f8960bc 410->411 411->401
                              APIs
                              • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6F895ECA
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 1163dfc213c13d9f4ebba4199dea4c4d0f43a890a7a2f9df981bc2cb0749085a
                              • Instruction ID: 71e5f7b257e959065475d92519b46ee5544d96d97bed26fb8277d2059c34085c
                              • Opcode Fuzzy Hash: 1163dfc213c13d9f4ebba4199dea4c4d0f43a890a7a2f9df981bc2cb0749085a
                              • Instruction Fuzzy Hash: 49A170706087168FCB08CF2CC5D062AB7E2BF89315F54899EE8969B356D730B965CBC1

                              Control-flow Graph

                              APIs
                              • RtlEnterCriticalSection.NTDLL(6F8C32EC), ref: 6F89BC61
                              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6F8C32D0,6F8C32D0,?,6F89C0A4,00000004,6F89AF00,6F896DDD,6F8968AD,?,6F8A4902,?), ref: 6F89BCB7
                              • GlobalHandle.KERNEL32(00E6C770), ref: 6F89BCC0
                              • GlobalUnlock.KERNEL32(00000000), ref: 6F89BCCA
                              • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6F89BCE3
                              • GlobalHandle.KERNEL32(00E6C770), ref: 6F89BCF5
                              • GlobalLock.KERNEL32(00000000), ref: 6F89BCFC
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6F89BD05
                              • GlobalLock.KERNEL32(00000000), ref: 6F89BD11
                              • _memset.LIBCMT ref: 6F89BD2B
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6F89BD59
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                              • String ID:
                              • API String ID: 496899490-0
                              • Opcode ID: 39b13a67e216287b86500ef8ebcc15c6084ee9b0b275830ff20113c43d08b359
                              • Instruction ID: 23a0ce2770c6de47268b89d0bdc253fe992c77867465488a5eaf7aa811c7bbb7
                              • Opcode Fuzzy Hash: 39b13a67e216287b86500ef8ebcc15c6084ee9b0b275830ff20113c43d08b359
                              • Instruction Fuzzy Hash: C631E071A04B06AFDB248F6CC889A4A7BF9FF41314B044DAEE652DB640DB30F941CB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 77 6f8964e0-6f8964e8 78 6f8964ea-6f896501 77->78 78->78 79 6f896503-6f896513 78->79 80 6f896515-6f896522 79->80 81 6f896526-6f896551 79->81 80->81 82 6f8965f1 81->82 83 6f896557-6f896568 81->83 84 6f8965f3-6f896661 LoadLibraryA VirtualProtect call 6f8967f8 VirtualProtect 82->84 85 6f89656c-6f896577 83->85 95 6f896663 84->95 96 6f896682-6f8966a9 84->96 87 6f896579 85->87 88 6f8965da 85->88 91 6f89657b-6f896580 87->91 89 6f8965dc-6f8965e0 88->89 93 6f896704-6f896716 89->93 94 6f8965e6-6f8965eb 89->94 91->91 92 6f896582-6f896584 91->92 92->88 97 6f896586-6f89658c 92->97 93->84 94->82 94->85 98 6f896667-6f896680 95->98 100 6f8966fa 97->100 101 6f896592-6f89659c 97->101 98->96 98->98 100->93 102 6f8965a0-6f8965b7 101->102 102->102 103 6f8965b9-6f8965ca 102->103 103->89 104 6f8965cc-6f8965d8 103->104 104->89
                              APIs
                              • LoadLibraryA.KERNELBASE(00000000), ref: 6F896602
                              • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6F89663B
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: LibraryLoadProtectVirtual
                              • String ID:
                              • API String ID: 3279857687-0
                              • Opcode ID: 1ef0e04817065eb4736f48531155d31efaa0a47aae4a88dc0b0b5d3156e091a8
                              • Instruction ID: ff4d67c181720782c429c8022bcfc145f9fb15a9fa6b8914ab12bc1f6bae4221
                              • Opcode Fuzzy Hash: 1ef0e04817065eb4736f48531155d31efaa0a47aae4a88dc0b0b5d3156e091a8
                              • Instruction Fuzzy Hash: 0851D1306087558FC715CF1CC8D062AFBE6AFCA308F1989AEE8854B316C631E946CBD1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 191 6f896750-6f896762 ReadFile 193 6f89630a-6f896323 191->193 194 6f8961f0-6f896207 191->194 195 6f89634d-6f896368 193->195 196 6f896325-6f896329 193->196 197 6f8963cb 195->197 198 6f89636a 195->198 200 6f896738 196->200 201 6f89632f 196->201 204 6f8963cd-6f8963ee 197->204 203 6f89636c-6f896372 198->203 200->191 202 6f896331-6f89633c 201->202 202->202 205 6f89633e-6f896347 202->205 203->203 206 6f896374-6f896376 203->206 207 6f8966dc 204->207 205->195 208 6f896349 205->208 206->197 209 6f896378-6f89637e 206->209 207->200 208->195 209->207 210 6f896384-6f89638d 209->210 211 6f896391-6f8963a8 210->211 211->211 212 6f8963aa-6f8963ba 211->212 212->204 213 6f8963bc-6f8963c9 212->213 213->204
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6F8BC168), ref: 6F896300
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: c8cb43c2869fc21107a4bb9c21c97de207f76bde4b08a66ebfe633a99588b040
                              • Instruction ID: 5497f634f414a0ebd413398351aa586b08cc1665d92806baaada37cdf20fd207
                              • Opcode Fuzzy Hash: c8cb43c2869fc21107a4bb9c21c97de207f76bde4b08a66ebfe633a99588b040
                              • Instruction Fuzzy Hash: 8F4180316087058FC708CF1DC89066AB7E6FFC6314F1989ADA8899B315D631F855DBC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 214 6f8962d0-6f8962d5 215 6f8962db-6f8962e0 214->215 216 6f896742-6f89674e 214->216 217 6f89626d-6f89627b 215->217 218 6f8962e2-6f8962f1 215->218 220 6f89627d 217->220 221 6f8962cf 217->221 223 6f8962f3-6f896304 ReadFile 218->223 224 6f89627f-6f896284 220->224 222 6f8962d1-6f8962d5 221->222 222->215 222->216 226 6f89630a-6f896323 223->226 227 6f8961f0-6f896207 223->227 224->224 225 6f896286-6f896288 224->225 225->221 228 6f89628a-6f896290 225->228 229 6f89634d-6f896368 226->229 230 6f896325-6f896329 226->230 233 6f8966d2 228->233 234 6f896296-6f89629a 228->234 231 6f8963cb 229->231 232 6f89636a 229->232 236 6f896738-6f896762 230->236 237 6f89632f 230->237 241 6f8963cd-6f8963ee 231->241 239 6f89636c-6f896372 232->239 233->216 240 6f89629c-6f8962b2 234->240 236->223 238 6f896331-6f89633c 237->238 238->238 242 6f89633e-6f896347 238->242 239->239 244 6f896374-6f896376 239->244 240->240 245 6f8962b4-6f8962c1 240->245 246 6f8966dc 241->246 242->229 247 6f896349 242->247 244->231 248 6f896378-6f89637e 244->248 245->222 249 6f8962c3-6f8962cd 245->249 246->236 247->229 248->246 250 6f896384-6f89638d 248->250 249->222 251 6f896391-6f8963a8 250->251 251->251 252 6f8963aa-6f8963ba 251->252 252->241 253 6f8963bc-6f8963c9 252->253 253->241
                              APIs
                              • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6F8BC168), ref: 6F896300
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 89314ee9aa49c183c4e84f3cb910e2e8daf892f9812eb586e2da95fbaa988f73
                              • Instruction ID: f5ad114ff3fc6c40932611ad3bfa2f99b694ccd4510844e261ee98f849baca7d
                              • Opcode Fuzzy Hash: 89314ee9aa49c183c4e84f3cb910e2e8daf892f9812eb586e2da95fbaa988f73
                              • Instruction Fuzzy Hash: FA31AE31A08B068FC718CF19C89466AB7E2FFC6314F1989ADE8965B316D630F855CBC1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 254 6f89c050-6f89c068 call 6f8a50c9 257 6f89c06a call 6f896dc1 254->257 258 6f89c06f-6f89c072 254->258 257->258 260 6f89c0aa-6f89c0bb call 6f89ba5b 258->260 261 6f89c074-6f89c07c 258->261 269 6f89c0bd-6f89c0cb call 6f89be0d 260->269 270 6f89c0d0-6f89c0d7 call 6f8a51a1 260->270 263 6f89c09f call 6f89bc4e 261->263 264 6f89c07e-6f89c09d call 6f89bd66 261->264 268 6f89c0a4-6f89c0a8 263->268 264->257 264->263 268->257 268->260 269->270
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6F89C057
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: H_prolog3$Exception@8Throw
                              • String ID:
                              • API String ID: 2489616738-0
                              • Opcode ID: 4e7cfe7c913baafed5de1200db9e14fc7112ae82bab233604d5f97d5417aff1b
                              • Instruction ID: 81f52702e97eb723a133f6f5e6acfbfe7c53c1c0ccb0bf5fd628c69e65f0d871
                              • Opcode Fuzzy Hash: 4e7cfe7c913baafed5de1200db9e14fc7112ae82bab233604d5f97d5417aff1b
                              • Instruction Fuzzy Hash: 19011A30601703ABEF19AF6C881566D76A2AF42365F108DEDE4528F2D0DF72DA52CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 276 6f8960f0-6f896139 CreateFileW 277 6f89613f-6f8967e4 276->277 278 6f8961de-6f896780 276->278 285 6f895eba-6f895f0c GlobalAlloc 277->285 286 6f895e23-6f895e3c 277->286 287 6f895fad 285->287 288 6f895f12-6f895f2b 285->288 289 6f895e40-6f895e4e 286->289 290 6f895faf-6f895fce 287->290 292 6f895f2f-6f895f3d 288->292 293 6f895e50 289->293 294 6f895ea3 289->294 300 6f895fd0 290->300 301 6f895fe7-6f895fea 290->301 297 6f895f3f 292->297 298 6f895f92 292->298 299 6f895e52-6f895e58 293->299 295 6f895ea5-6f895ea9 294->295 303 6f895eaf-6f895eb4 295->303 304 6f8967c3-6f8967d8 295->304 305 6f895f41-6f895f47 297->305 302 6f895f94-6f895f98 298->302 299->299 306 6f895e5a-6f895e5c 299->306 307 6f895fd2-6f895fe5 300->307 308 6f895fec 301->308 309 6f895ffe-6f896038 301->309 310 6f895f9e-6f895fa3 302->310 311 6f8967a5-6f8967be 302->311 303->289 313 6f895eb6 303->313 305->305 314 6f895f49-6f895f4b 305->314 306->294 315 6f895e5e-6f895e64 306->315 307->301 307->307 318 6f895fee-6f895ffc 308->318 319 6f8960d9 309->319 320 6f89603e-6f896057 309->320 310->292 321 6f895fa5-6f895fa9 310->321 311->290 313->285 314->298 322 6f895f4d-6f895f53 314->322 316 6f8966aa-6f8966af 315->316 317 6f895e6a-6f895e6e 315->317 328 6f895e90-6f895e95 316->328 325 6f895e70-6f895e86 317->325 318->309 318->318 326 6f8960db-6f8960ef 319->326 327 6f89605b-6f896069 320->327 321->287 323 6f895f59-6f895f5d 322->323 324 6f8966b4 322->324 329 6f895f5f-6f895f75 323->329 334 6f8966be 324->334 325->325 330 6f895e88-6f895e8c 325->330 332 6f89606b 327->332 333 6f8960be 327->333 328->295 331 6f895e97-6f895ea1 328->331 329->329 335 6f895f77-6f895f84 329->335 330->328 331->295 336 6f89606d-6f896073 332->336 337 6f8960c0-6f8960c4 333->337 338 6f896788-6f8967a0 334->338 335->302 340 6f895f86-6f895f90 335->340 336->336 341 6f896075-6f896077 336->341 337->338 339 6f8960ca-6f8960cf 337->339 338->326 339->327 342 6f8960d1-6f8960d5 339->342 340->302 341->333 343 6f896079-6f89607f 341->343 342->319 343->334 344 6f896085-6f896089 343->344 345 6f89608b-6f8960a1 344->345 345->345 346 6f8960a3-6f8960b0 345->346 346->337 347 6f8960b2-6f8960bc 346->347 347->337
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6F8960F6
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 9a408965029ea9c11fac01d9986274c265f6889a0c4e1455ebd34abeafcfd108
                              • Instruction ID: 741a983c684667644d1cf8051baf246afc7511f2db2118fa1f7440a7df2b54ff
                              • Opcode Fuzzy Hash: 9a408965029ea9c11fac01d9986274c265f6889a0c4e1455ebd34abeafcfd108
                              • Instruction Fuzzy Hash: 4001E8B4A087019FC718CF0AC8D090ABBE6FFC9314F5685ADA84897316C630E855CF85

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 348 6f8aa6f4-6f8aa716 HeapCreate 349 6f8aa71a-6f8aa723 348->349 350 6f8aa718-6f8aa719 348->350
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6F8A4776,00000001,?,?,?,6F8A48EF,?,?,?,6F8BE848,0000000C,6F8A49AA), ref: 6F8AA709
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 04a03a4151554c5d784c3ad879ff3add9ca0e1fd2511a439b0da0055f9d4bacc
                              • Instruction ID: 1d458078bd5aee3c8715d19f8f383e5d19a3b0b886592d7a3f199df466a6618e
                              • Opcode Fuzzy Hash: 04a03a4151554c5d784c3ad879ff3add9ca0e1fd2511a439b0da0055f9d4bacc
                              • Instruction Fuzzy Hash: 82D05E72598745AADF009F755C087263BECD7857A6F1448B5F80CCA180E6B0D5A1CA84
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6F897498
                              • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6F8976D5,?,00000000,?,00000000,00000104,00000000,?,6F8BBEF4,00000000), ref: 6F8974D6
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6F897546
                              • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6F89756D
                              • CharUpperW.USER32(00000000), ref: 6F8975A0
                              • FindFirstFileW.KERNEL32(?,?), ref: 6F8975BC
                              • FindClose.KERNEL32(00000000), ref: 6F8975C8
                              • lstrlenW.KERNEL32(?), ref: 6F8975E6
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                              • String ID:
                              • API String ID: 624941980-0
                              • Opcode ID: ec3415edc1c345697906c283c5cda2602787a03ba3750c53e555410139ed4e65
                              • Instruction ID: c3792f46bfcd13e07062c7cda9884284b5db5b874294c6de34ebada946bb3493
                              • Opcode Fuzzy Hash: ec3415edc1c345697906c283c5cda2602787a03ba3750c53e555410139ed4e65
                              • Instruction Fuzzy Hash: 9D41C67190871AABDF199F7CCC8CBAE7B78AF01314F000AD9E82999191DB359E95CF50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: _memset
                              • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                              • API String ID: 2102423945-1093365818
                              • Opcode ID: 0847d195dd83011e56615ce1582dc8d5baf280c5806e5e8098fba8caf8f1da94
                              • Instruction ID: 6c7f12c82362954ca1ffa25ceb834f4e39775f40de755e409e9b77d728469d4c
                              • Opcode Fuzzy Hash: 0847d195dd83011e56615ce1582dc8d5baf280c5806e5e8098fba8caf8f1da94
                              • Instruction Fuzzy Hash: 1E910E71D0030DBEDB50CFA9C585BDEBBE8EF48348F1095A6E918EA180E7799645C7A0
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 6F8A7C6C
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6F8A7C81
                              • UnhandledExceptionFilter.KERNEL32(6F8BA4B8), ref: 6F8A7C8C
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 6F8A7CA8
                              • TerminateProcess.KERNEL32(00000000), ref: 6F8A7CAF
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: bd132acd10a4b2d6728c6dadbdb1aedebc9bc18c2d73a69c15a4e72cfe3b815a
                              • Instruction ID: c8b5483f7e2cef3f59aad3f684d2c66844eba9e0d594967637981ca47e0d9665
                              • Opcode Fuzzy Hash: bd132acd10a4b2d6728c6dadbdb1aedebc9bc18c2d73a69c15a4e72cfe3b815a
                              • Instruction Fuzzy Hash: 1D21CBB4806B05AFDF40DF29D8896497BF4FB0A324F9045DAE5098F390E7B159A6CF81
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6F8989FC
                              • __snwprintf_s.LIBCMT ref: 6F898A2E
                              • LoadLibraryW.KERNEL32(?), ref: 6F898A69
                                • Part of subcall function 6F8A5348: __getptd_noexit.LIBCMT ref: 6F8A5348
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                              • String ID: LOC
                              • API String ID: 3175857669-519433814
                              • Opcode ID: 6ac0b1ba8a5b9e682991826e59d82d06035f7f78b42f68808a09521dd87e7336
                              • Instruction ID: 67b403b082af209ff36cbbf026fa13efa013406dd2b4b70dc5d186a4eece099a
                              • Opcode Fuzzy Hash: 6ac0b1ba8a5b9e682991826e59d82d06035f7f78b42f68808a09521dd87e7336
                              • Instruction Fuzzy Hash: 6511D571A55309BEDB109B7CCC45BAD77ECEB42319F400CE5A110AF0C0DBB59A44C7A1
                              APIs
                                • Part of subcall function 6F8A2C57: GetWindowLongW.USER32(?,000000F0), ref: 6F8A2C62
                              • GetKeyState.USER32(00000010), ref: 6F8A0514
                              • GetKeyState.USER32(00000011), ref: 6F8A051D
                              • GetKeyState.USER32(00000012), ref: 6F8A0526
                              • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6F8A053C
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: State$LongMessageSendWindow
                              • String ID:
                              • API String ID: 1063413437-0
                              • Opcode ID: 6a9346b889d1bc3e60a32e7dff313c5f38ead5a77878c15b05463b17a875aef4
                              • Instruction ID: 8fe995fb9db06cacf8e5353266a1f44189f06e5008b16cbf18e199c371d382b0
                              • Opcode Fuzzy Hash: 6a9346b889d1bc3e60a32e7dff313c5f38ead5a77878c15b05463b17a875aef4
                              • Instruction Fuzzy Hash: 49F0893578079FB5EA14267D4D81FF92526EF85BD4F002CB26655BE0D4CFA3D4128670
                              APIs
                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 6F89E61F
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 6F89E634
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$CallNtdllProcProc_
                              • String ID:
                              • API String ID: 1646280189-0
                              • Opcode ID: 69bda81817956052ab26b4cbeda10e9c1730d2dd0a7c648fa532bcb6abc921ca
                              • Instruction ID: f309a8989eefb43cce9dd2e4a0de0b090a0e629014a38f29c2edc21b41bd4306
                              • Opcode Fuzzy Hash: 69bda81817956052ab26b4cbeda10e9c1730d2dd0a7c648fa532bcb6abc921ca
                              • Instruction Fuzzy Hash: E3F09E36104605EBCF125F99D804D967FB5FF0D761B048459F9598A520D732E421EB54
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 68e0d7b8c7fc5efe0318f77f02e9c077c3c5977bfaebe6bc412c489222ff5a1a
                              • Instruction ID: 72465f642d04ba44233de79b981ed894b6652fbc52afb1d3f925b5ea22a1d79e
                              • Opcode Fuzzy Hash: 68e0d7b8c7fc5efe0318f77f02e9c077c3c5977bfaebe6bc412c489222ff5a1a
                              • Instruction Fuzzy Hash: 33F01C3344562DBBCF025EA58D04DDB3B6AEF09365B009991FA64AD050C732E531DBA2
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6F898BE9
                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6F898EB7,?,?), ref: 6F898C19
                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6F898C2D
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6F898C69
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6F898C77
                              • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6F898C94
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6F898CBF
                              • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6F898CC8
                              • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6F898CE1
                              • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6F898CFE
                              • ConvertDefaultLocale.KERNEL32(?), ref: 6F898D31
                              • ConvertDefaultLocale.KERNEL32(00000000), ref: 6F898D3A
                              • GetModuleFileNameW.KERNEL32(6F890000,?,00000105), ref: 6F898D7F
                              • _memset.LIBCMT ref: 6F898D9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                              • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                              • API String ID: 3537336938-2299501126
                              • Opcode ID: 9aa598e1714b6cf0712a60c4d2d2698704635bce45fe4ae218a0d703e9bc1b28
                              • Instruction ID: df8fc4a51039860b002ef516709aa43dc1c654da54273d306c28a416021de8c9
                              • Opcode Fuzzy Hash: 9aa598e1714b6cf0712a60c4d2d2698704635bce45fe4ae218a0d703e9bc1b28
                              • Instruction Fuzzy Hash: 8D515F70D0522AAECB64DFA9DC887ADB7B4EF58314F5005DAE448EB280D7749E81CF54
                              APIs
                              • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75C04A40,6F89DE36,?,?,?,?,?,?,?,6F89FCC6,00000000,00000002,00000028), ref: 6F89DCF9
                              • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6F89DD15
                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6F89DD2A
                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6F89DD3B
                              • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6F89DD4C
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6F89DD5D
                              • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6F89DD6E
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6F89DD8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                              • API String ID: 667068680-2451437823
                              • Opcode ID: 7be1f431a37f85c81ebbfcdd37d18c9869dbfc9989e6ebad46587a469d43883e
                              • Instruction ID: 868f4e7aad2e5b950189f39458ffb18fa45ce4a4b025e1ecfac323794a3c0841
                              • Opcode Fuzzy Hash: 7be1f431a37f85c81ebbfcdd37d18c9869dbfc9989e6ebad46587a469d43883e
                              • Instruction Fuzzy Hash: 83215B72828A65AF9B00AF788CC446A7AE5B6DB2257119DFFD045EA308C3B010E5CB94
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6F8A19B8
                                • Part of subcall function 6F89C050: __EH_prolog3.LIBCMT ref: 6F89C057
                              • CallNextHookEx.USER32(?,?,?,?), ref: 6F8A19F8
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              • _memset.LIBCMT ref: 6F8A1A51
                              • GetClassLongW.USER32(?,000000E0), ref: 6F8A1A85
                              • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6F8A1ADA
                              • GetClassNameW.USER32(?,?,00000100), ref: 6F8A1B20
                              • GetWindowLongW.USER32(?,000000FC), ref: 6F8A1B46
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6F8A1B5D
                              • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6F8A1B6F
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6F8A1B77
                              • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6F8A1B86
                              • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6F8A1B94
                              • CallNextHookEx.USER32(?,00000003,?,?), ref: 6F8A1BA6
                              • UnhookWindowsHookEx.USER32(?), ref: 6F8A1BBA
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                              • String ID: #32768$AfxOldWndProc423
                              • API String ID: 4265692241-2141921550
                              • Opcode ID: 325d901004c5f4b192bbc2cf537c1f639de5d93b374d5a14f0b65e4c1b2d9809
                              • Instruction ID: 7862779581b72051a47369749d8b2c13699711971eb3e962b499126b72bbf1ba
                              • Opcode Fuzzy Hash: 325d901004c5f4b192bbc2cf537c1f639de5d93b374d5a14f0b65e4c1b2d9809
                              • Instruction Fuzzy Hash: CC51B171544B2AABCF159F28CC48B9A7BB8FF05365F0409D5F4199E1D0EB319A92CFA0
                              APIs
                                • Part of subcall function 6F8A2C57: GetWindowLongW.USER32(?,000000F0), ref: 6F8A2C62
                              • GetParent.USER32(?), ref: 6F89FC05
                              • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6F89FC28
                              • GetWindowRect.USER32(?,?), ref: 6F89FC42
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6F89FC58
                              • CopyRect.USER32(?,?), ref: 6F89FCA5
                              • CopyRect.USER32(?,?), ref: 6F89FCAF
                              • GetWindowRect.USER32(00000000,?), ref: 6F89FCB8
                                • Part of subcall function 6F89DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6F89DED6
                              • CopyRect.USER32(?,?), ref: 6F89FCD4
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                              • String ID: (
                              • API String ID: 1385303425-3887548279
                              • Opcode ID: 567aae9b3881052debed3c7e6a6c86bda250cea728662e8da0f6da8e25786184
                              • Instruction ID: 5ae1262c67613512c4e4b79fd1cbe8a8154809272411babba3528c6e5fd42e8e
                              • Opcode Fuzzy Hash: 567aae9b3881052debed3c7e6a6c86bda250cea728662e8da0f6da8e25786184
                              • Instruction Fuzzy Hash: 79513E72904619AFDB04CFACCD84AEEBBB9AF48314F154595F915FB280DB30E941CB94
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6F8BE928,0000000C,6F8AA25A,00000000,00000000,?,6F8AA5D4,00000000,00000001,00000000,?,6F8AA89E,00000018,6F8BE978,0000000C), ref: 6F8AA131
                              • __crt_waiting_on_module_handle.LIBCMT ref: 6F8AA13C
                                • Part of subcall function 6F8A5BCF: Sleep.KERNEL32(000003E8,00000000,?,6F8AA082,KERNEL32.DLL,?,?,6F8AA416,00000000,?,6F8A488C,00000000,?,?,?,6F8A48EF), ref: 6F8A5BDB
                                • Part of subcall function 6F8A5BCF: GetModuleHandleW.KERNEL32(00000000,?,6F8AA082,KERNEL32.DLL,?,?,6F8AA416,00000000,?,6F8A488C,00000000,?,?,?,6F8A48EF,?), ref: 6F8A5BE4
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6F8AA165
                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6F8AA175
                              • __lock.LIBCMT ref: 6F8AA197
                              • InterlockedIncrement.KERNEL32(?), ref: 6F8AA1A4
                              • __lock.LIBCMT ref: 6F8AA1B8
                              • ___addlocaleref.LIBCMT ref: 6F8AA1D6
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 1028249917-2843748187
                              • Opcode ID: 05e6332d668e7bb1e77c3e706a825a38754fa804b8bf57ea5db168a2e15d1728
                              • Instruction ID: 825c5c728b86c7ebefe555724611112b21fa10041bf24f57ef26296e5830e4b8
                              • Opcode Fuzzy Hash: 05e6332d668e7bb1e77c3e706a825a38754fa804b8bf57ea5db168a2e15d1728
                              • Instruction Fuzzy Hash: 57118E70805B01EED7218F69C804B5EBBE0EF45328F108DDED4AA9B790CB75AA81CF54
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6F898503
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6F898520
                              • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6F89852D
                              • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6F89853A
                              • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6F898547
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 667068680-2424895508
                              • Opcode ID: 5e93d76cd3a91556a48fc68cfe3deda86b3fa90122c6afcd02408b5c7bddceb4
                              • Instruction ID: 8b6481a213e8d3150b91ad0f95fcdb22cffbf3c757eb8f61716ad1c9361e2075
                              • Opcode Fuzzy Hash: 5e93d76cd3a91556a48fc68cfe3deda86b3fa90122c6afcd02408b5c7bddceb4
                              • Instruction Fuzzy Hash: 541154B290D753EFCF14AF6D8C8A446BFA4AB4632634448FFE1099F200D7309856CB91
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32,6F89A6B6), ref: 6F89A5AA
                              • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6F89A5CB
                              • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6F89A5DD
                              • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6F89A5EF
                              • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6F89A601
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                              • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                              • API String ID: 417325364-2424895508
                              • Opcode ID: 7fc57f962cf68787af89ca6f12460c6e9618ccb2db1809bc5864cfaa4a84588a
                              • Instruction ID: 00c6a8a88021e43764d13eb27d688d4eec3b147938623012b20e66885e531af7
                              • Opcode Fuzzy Hash: 7fc57f962cf68787af89ca6f12460c6e9618ccb2db1809bc5864cfaa4a84588a
                              • Instruction Fuzzy Hash: 8CF07A74C0AA27BADF516FB59C495457E68A70637E70048DAA80197300D7749867CFC1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                              • String ID: .CHM$.HLP$.INI
                              • API String ID: 2477486372-4017452060
                              • Opcode ID: 776531b01fbcbb3c6651cd17148edeae8b94fbfd3b64b55187d41184104fb97f
                              • Instruction ID: 5aae93535c6e2d3405085f45521b9786ef11ecfdd28bb615f3fc9d07220d6070
                              • Opcode Fuzzy Hash: 776531b01fbcbb3c6651cd17148edeae8b94fbfd3b64b55187d41184104fb97f
                              • Instruction Fuzzy Hash: E34163B190071AABDB14DB7DCC48A9AB3FDAF45314F000CE99555DF282EB32E984CB54
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6F8A1868
                              • GetPropW.USER32(?,AfxOldWndProc423), ref: 6F8A1877
                              • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6F8A18D1
                                • Part of subcall function 6F8A0C2C: GetWindowRect.USER32(?,10000000), ref: 6F8A0C56
                              • SetWindowLongW.USER32(?,000000FC,?), ref: 6F8A18F8
                              • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6F8A1900
                              • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6F8A1907
                              • GlobalDeleteAtom.KERNEL32(?), ref: 6F8A1911
                              • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6F8A1965
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                              • String ID: AfxOldWndProc423
                              • API String ID: 2109165785-1060338832
                              • Opcode ID: 7b9f4a2b5ee2c1dd08b0f0e92df86c1998c4a0c9295aa11c73177cab788ff512
                              • Instruction ID: 02f81b7703c281aa4a537307abdb944d447e8351cb70278c4a74911df092dee3
                              • Opcode Fuzzy Hash: 7b9f4a2b5ee2c1dd08b0f0e92df86c1998c4a0c9295aa11c73177cab788ff512
                              • Instruction Fuzzy Hash: 79314C3240561ABBCF019FA8CD48DFF7B78EF0A315F040999F601AA190D7769925DBA1
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6F891BE9,?,?,?,?), ref: 6F891C39
                              • GetLastError.KERNEL32(?,?,?,?,?,6F891BE9,?,?,?,?), ref: 6F891C48
                              • __aullrem.LIBCMT ref: 6F891C60
                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6F891CE8
                              • _memset.LIBCMT ref: 6F891CF5
                              • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6F891BE9,?,?,?,?), ref: 6F891D07
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                              • String ID:
                              • API String ID: 123228641-0
                              • Opcode ID: 403d4c303705f6a8f0be57f372bcc112482b2affe1ce1a558746ab26f4323638
                              • Instruction ID: aca0a6a9b219cf058ede198cd138a684bd3083daca0d223eee657c02e7d9f128
                              • Opcode Fuzzy Hash: 403d4c303705f6a8f0be57f372bcc112482b2affe1ce1a558746ab26f4323638
                              • Instruction Fuzzy Hash: B7514D75708B01AFD744DE2DC840B9BB7E8EF88764F004969F958DB240E770E905CBA2
                              APIs
                              • __EH_prolog3_catch.LIBCMT ref: 6F89BE14
                              • RtlEnterCriticalSection.NTDLL(00000000), ref: 6F89BE25
                              • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6F89AF00,6F896DDD,6F8968AD,?,6F8A4902,?,?,?,?), ref: 6F89BE43
                              • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6F89AF00,6F896DDD,6F8968AD,?,6F8A4902,?), ref: 6F89BE77
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6F89BEE3
                              • _memset.LIBCMT ref: 6F89BF02
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6F89BF13
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6F89BF34
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                              • String ID:
                              • API String ID: 1891723912-0
                              • Opcode ID: b73a608a8362e9a64f992f05280dcff6984cc63234974ccb25bcd7cfd8b52f99
                              • Instruction ID: 3f25ac0d1f876c86d6b53df4e05baf4851e754a960730de5d034e6e94017407d
                              • Opcode Fuzzy Hash: b73a608a8362e9a64f992f05280dcff6984cc63234974ccb25bcd7cfd8b52f99
                              • Instruction Fuzzy Hash: 85319E70504606EFDB14DF6CC885C5ABBB5FF01324B10C9AEE6669FA90CB31AA55CF90
                              APIs
                                • Part of subcall function 6F89815A: GetParent.USER32(?), ref: 6F8981AE
                                • Part of subcall function 6F89815A: GetLastActivePopup.USER32(?), ref: 6F8981BF
                                • Part of subcall function 6F89815A: IsWindowEnabled.USER32(?), ref: 6F8981D3
                                • Part of subcall function 6F89815A: EnableWindow.USER32(?,00000000), ref: 6F8981E6
                              • EnableWindow.USER32(?,00000001), ref: 6F898247
                              • GetWindowThreadProcessId.USER32(?,?), ref: 6F89825B
                              • GetCurrentProcessId.KERNEL32(?,?), ref: 6F898265
                              • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6F89827D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6F8982F9
                              • EnableWindow.USER32(00000000,00000001), ref: 6F898340
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                              • String ID: 0
                              • API String ID: 1877664794-4108050209
                              • Opcode ID: b64f9255806d44f062f48e495da75bf48404ffb26bf0d9c5c5d0ca7669d14ab7
                              • Instruction ID: 1596ca59cf7416e6eadb09e389c0f1df9581dc74ba622d627300e116ca1f2747
                              • Opcode Fuzzy Hash: b64f9255806d44f062f48e495da75bf48404ffb26bf0d9c5c5d0ca7669d14ab7
                              • Instruction Fuzzy Hash: 50418371A44B1AAFDB248FA8CC88BDA77B4FF05310F5409D9E915EA180D770EA90CF90
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6F89DED6
                              • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6F89DF00
                              • GetSystemMetrics.USER32(00000000), ref: 6F89DF17
                              • GetSystemMetrics.USER32(00000001), ref: 6F89DF1E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6F89DF49
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                              • String ID: B$DISPLAY
                              • API String ID: 381819527-3316187204
                              • Opcode ID: 9472fecba584656bd58c1560caa70cbbf9e6ffabb143cace7f122ff9b45f2f58
                              • Instruction ID: d2ba92526246af0f54f0797a82a1bd223fe6bfaeab3752d639aac74d8de77e1f
                              • Opcode Fuzzy Hash: 9472fecba584656bd58c1560caa70cbbf9e6ffabb143cace7f122ff9b45f2f58
                              • Instruction Fuzzy Hash: 6321F873504725ABDF108F688C85B9B7BAAEF46760F004596FD589F180D7B0E841CBE4
                              APIs
                              • GetSystemMetrics.USER32(0000000B), ref: 6F89CD75
                              • GetSystemMetrics.USER32(0000000C), ref: 6F89CD7C
                              • GetSystemMetrics.USER32(00000002), ref: 6F89CD83
                              • GetSystemMetrics.USER32(00000003), ref: 6F89CD8D
                              • GetDC.USER32(00000000), ref: 6F89CD97
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 6F89CDA8
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6F89CDB0
                              • ReleaseDC.USER32(00000000,00000000), ref: 6F89CDB8
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: MetricsSystem$CapsDevice$Release
                              • String ID:
                              • API String ID: 1151147025-0
                              • Opcode ID: b324a89bc299da2d5faf614fb8e08866c9493156f5be6b3a225d6b97ef81bba0
                              • Instruction ID: 5e350b3641f7cac5356ee8ec0037a8124d4b7dec005659c3931090e72b260f93
                              • Opcode Fuzzy Hash: b324a89bc299da2d5faf614fb8e08866c9493156f5be6b3a225d6b97ef81bba0
                              • Instruction Fuzzy Hash: 8DF06DB1E40B15BAEB105B728C49F167F68EB46771F004556E6058B2C0CBB59822CFD0
                              APIs
                              • _memset.LIBCMT ref: 6F8A029B
                              • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6F8A02C4
                              • GetWindowLongW.USER32(?,000000FC), ref: 6F8A02D6
                              • GetWindowLongW.USER32(?,000000FC), ref: 6F8A02E7
                              • SetWindowLongW.USER32(?,000000FC,?), ref: 6F8A0303
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend_memset
                              • String ID: ,
                              • API String ID: 2997958587-3772416878
                              • Opcode ID: e3c2f8814cf79f5e5bb33fe063655f7033f6aa0b212d1963bbc01b220b7e26fd
                              • Instruction ID: d8056199044d2a6aa6bc407ac44fbc1dc2b906c00bfa042e7e5d274ba2fc210d
                              • Opcode Fuzzy Hash: e3c2f8814cf79f5e5bb33fe063655f7033f6aa0b212d1963bbc01b220b7e26fd
                              • Instruction Fuzzy Hash: 6231BD31600710AFDB15AFA8C884A5DBBA4FF48314B101AA9E5569F690DB32F800CB94
                              APIs
                              • __EH_prolog3_GS.LIBCMT ref: 6F89A20A
                              • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6F89A2F0
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6F89A30D
                              • RegCloseKey.ADVAPI32(?), ref: 6F89A32D
                              • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6F89A348
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseEnumH_prolog3_OpenQueryValue
                              • String ID: Software\
                              • API String ID: 1666054129-964853688
                              • Opcode ID: ec183265d86417fa1efec824a327a93c56cc9397f07dce0276129516be5578a8
                              • Instruction ID: 623634450c41cbda45c0182976d6aee3b1f95f8c3a13be8a2956e6f18e1ceb94
                              • Opcode Fuzzy Hash: ec183265d86417fa1efec824a327a93c56cc9397f07dce0276129516be5578a8
                              • Instruction Fuzzy Hash: 3C418031D05619BBCF21DBACDC88ADEB7BDAF49314F100AD9E019AA190DB359B81CF50
                              APIs
                              • __EH_prolog3_catch_GS.LIBCMT ref: 6F89A08C
                              • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6F89A11A
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6F89A13D
                                • Part of subcall function 6F89A02D: __EH_prolog3.LIBCMT ref: 6F89A034
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: EnumH_prolog3H_prolog3_catch_Open
                              • String ID: Software\Classes\
                              • API String ID: 3518408925-1121929649
                              • Opcode ID: cbb1132752505838ed64392a3e06a3cf7a5bac797d2efd32b9ab05235c83b9b6
                              • Instruction ID: f81be9a7c15ae66d0f17c6709810de2ca19728e3f7b5b52a988b92f1aab7a462
                              • Opcode Fuzzy Hash: cbb1132752505838ed64392a3e06a3cf7a5bac797d2efd32b9ab05235c83b9b6
                              • Instruction Fuzzy Hash: 9C314D31C04229BACF21ABACDC48BDDB7B8AF09364F1406D5E85A6B290D7305F94DF91
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6F89D0AE
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6F89D0D1
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6F89D0ED
                              • RegCloseKey.ADVAPI32(?), ref: 6F89D0FD
                              • RegCloseKey.ADVAPI32(?), ref: 6F89D107
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CloseCreate$Open
                              • String ID: software
                              • API String ID: 1740278721-2010147023
                              • Opcode ID: 6bc2dbb0c5a18a8c0c12fd93e39b331f595d6c0c87d87555ac4f2c4a178b504d
                              • Instruction ID: e34dc88f76a472ae5d55c1a2b27f2e25a69067951b36cdb2be50cd54bf7a5969
                              • Opcode Fuzzy Hash: 6bc2dbb0c5a18a8c0c12fd93e39b331f595d6c0c87d87555ac4f2c4a178b504d
                              • Instruction Fuzzy Hash: E411E672D00519BB8F21DA9ACD88DDFBFBDEF89750B1040AAF504A6111D7319A11EBA0
                              APIs
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6F89BEB5
                              • __CxxThrowException@8.LIBCMT ref: 6F89BEBF
                                • Part of subcall function 6F8A527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6F8A52BD
                              • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6F89AF00,6F896DDD,6F8968AD,?,6F8A4902,?), ref: 6F89BED6
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6F89BEE3
                                • Part of subcall function 6F896D89: __CxxThrowException@8.LIBCMT ref: 6F896D9F
                              • _memset.LIBCMT ref: 6F89BF02
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6F89BF13
                              • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6F89BF34
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                              • String ID:
                              • API String ID: 356813703-0
                              • Opcode ID: 2d65d7e0c0ee43dbb25e8ddf3edd1e2e55ebee3b15c050ad8b5f2ec42cd3945a
                              • Instruction ID: 95347c83edede9deab21e3699904c42a4c012c45203c6720a8a79d50a621bd19
                              • Opcode Fuzzy Hash: 2d65d7e0c0ee43dbb25e8ddf3edd1e2e55ebee3b15c050ad8b5f2ec42cd3945a
                              • Instruction Fuzzy Hash: 1811A174100606BFDB10AF6CCC89C2ABBB6FF01324710C9A9F6559A964CB31ED61CF90
                              APIs
                              • SetErrorMode.KERNEL32(00000000), ref: 6F89CA85
                              • SetErrorMode.KERNEL32(00000000), ref: 6F89CA8D
                                • Part of subcall function 6F89A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6F89A6D0
                                • Part of subcall function 6F89A698: SetLastError.KERNEL32(0000006F), ref: 6F89A6E7
                              • GetModuleHandleW.KERNEL32(user32.dll), ref: 6F89CADC
                              • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6F89CAEC
                                • Part of subcall function 6F89C8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6F89C91F
                                • Part of subcall function 6F89C8E2: PathFindExtensionW.SHLWAPI(?), ref: 6F89C939
                                • Part of subcall function 6F89C8E2: __wcsdup.LIBCMT ref: 6F89C983
                                • Part of subcall function 6F89C8E2: __wcsdup.LIBCMT ref: 6F89C9C2
                                • Part of subcall function 6F89C8E2: __wcsdup.LIBCMT ref: 6F89CA14
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                              • String ID: NotifyWinEvent$user32.dll
                              • API String ID: 3531328582-597752486
                              • Opcode ID: 17dd1710af644af928f0b3dc5b36ce8fc52d716c274112eb0ab438e941a406db
                              • Instruction ID: 7ab9c9dbc5c2578f8d11514838520a6f1011507974e8813775a39cc98c1f2297
                              • Opcode Fuzzy Hash: 17dd1710af644af928f0b3dc5b36ce8fc52d716c274112eb0ab438e941a406db
                              • Instruction Fuzzy Hash: 1A017C71A142456FCB15EF6C9844A5E3BD8AF45320B0588DAE945DF392DB31D840CFA1
                              APIs
                              • GetSysColor.USER32(0000000F), ref: 6F89CD2E
                              • GetSysColor.USER32(00000010), ref: 6F89CD35
                              • GetSysColor.USER32(00000014), ref: 6F89CD3C
                              • GetSysColor.USER32(00000012), ref: 6F89CD43
                              • GetSysColor.USER32(00000006), ref: 6F89CD4A
                              • GetSysColorBrush.USER32(0000000F), ref: 6F89CD57
                              • GetSysColorBrush.USER32(00000006), ref: 6F89CD5E
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Color$Brush
                              • String ID:
                              • API String ID: 2798902688-0
                              • Opcode ID: 0bd7847a7616e29d4da7c9ca3e6705ec414ef5f741b210df3720ae23d13742fe
                              • Instruction ID: 5c7b4f023447311fe76b362c3a438c5b8839b648e812633c1fc2e96c7990733c
                              • Opcode Fuzzy Hash: 0bd7847a7616e29d4da7c9ca3e6705ec414ef5f741b210df3720ae23d13742fe
                              • Instruction Fuzzy Hash: E8F0FE719407445BDB30BB724909B47BAD1FFC4720F16092EE2458B990D6B6E441DF40
                              APIs
                              • GetWindowLongW.USER32(?,000000F0), ref: 6F89818D
                              • GetParent.USER32(?), ref: 6F89819B
                              • GetParent.USER32(?), ref: 6F8981AE
                              • GetLastActivePopup.USER32(?), ref: 6F8981BF
                              • IsWindowEnabled.USER32(?), ref: 6F8981D3
                              • EnableWindow.USER32(?,00000000), ref: 6F8981E6
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                              • String ID:
                              • API String ID: 670545878-0
                              • Opcode ID: ba2880a56f8d9cd1b35cf30c4dc165973a6e157730a580396b5099a4c64d1b1c
                              • Instruction ID: 0e3bbe8ab0a2c9387f3c9d2dce7ca84a2fe4613d0fbc4a66292ddab95bab7544
                              • Opcode Fuzzy Hash: ba2880a56f8d9cd1b35cf30c4dc165973a6e157730a580396b5099a4c64d1b1c
                              • Instruction Fuzzy Hash: DF11C63260DA23ABD7160A6D8D40B9E76ACAF45B60F850AD6ED14EF244D770E801C7D5
                              APIs
                              • __CreateFrameInfo.LIBCMT ref: 6F8AC43E
                                • Part of subcall function 6F8A4FC4: __getptd.LIBCMT ref: 6F8A4FD2
                                • Part of subcall function 6F8A4FC4: __getptd.LIBCMT ref: 6F8A4FE0
                              • __getptd.LIBCMT ref: 6F8AC448
                                • Part of subcall function 6F8AA27F: __getptd_noexit.LIBCMT ref: 6F8AA282
                                • Part of subcall function 6F8AA27F: __amsg_exit.LIBCMT ref: 6F8AA28F
                              • __getptd.LIBCMT ref: 6F8AC456
                              • __getptd.LIBCMT ref: 6F8AC464
                              • __getptd.LIBCMT ref: 6F8AC46F
                              • _CallCatchBlock2.LIBCMT ref: 6F8AC495
                                • Part of subcall function 6F8A5069: __CallSettingFrame@12.LIBCMT ref: 6F8A50B5
                                • Part of subcall function 6F8AC53C: __getptd.LIBCMT ref: 6F8AC54B
                                • Part of subcall function 6F8AC53C: __getptd.LIBCMT ref: 6F8AC559
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                              • String ID:
                              • API String ID: 1602911419-0
                              • Opcode ID: f0a09f45591f436e77ce8432411be49516a638224cf659e05fbd849f5722b734
                              • Instruction ID: 2047298166114a0375d0533a99062a8cdfd66274b76786cb373edf688a952f2f
                              • Opcode Fuzzy Hash: f0a09f45591f436e77ce8432411be49516a638224cf659e05fbd849f5722b734
                              • Instruction Fuzzy Hash: 6611B4B1804309EFDF00DFA8C844A9D7BB1FB14314F1089A9E814AB291DB7A9A519B50
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 6F89DB6D
                              • GetDlgCtrlID.USER32(00000000), ref: 6F89DB81
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6F89DB91
                              • GetWindowRect.USER32(00000000,?), ref: 6F89DBA3
                              • PtInRect.USER32(?,?,?), ref: 6F89DBB3
                              • GetWindow.USER32(?,00000005), ref: 6F89DBC0
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Rect$ClientCtrlLongScreen
                              • String ID:
                              • API String ID: 1315500227-0
                              • Opcode ID: 31890ed5355ceeb1015815a2a4c106e19eb01b69667710b4485b76f13d4138a3
                              • Instruction ID: 296ee2ac043edc07472afa871d88010b41219355765e7e5feed5ee0a6dd653fe
                              • Opcode Fuzzy Hash: 31890ed5355ceeb1015815a2a4c106e19eb01b69667710b4485b76f13d4138a3
                              • Instruction Fuzzy Hash: 2E016D3210491ABBDF115B688C08EEE3B6EFF4A360F0849A5F951DA090D734E527CBD8
                              APIs
                              • GetMenuCheckMarkDimensions.USER32 ref: 6F8996F2
                              • _memset.LIBCMT ref: 6F89976A
                              • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6F8997CD
                              • LoadBitmapW.USER32(00000000,00007FE3), ref: 6F8997E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                              • String ID:
                              • API String ID: 4271682439-3916222277
                              • Opcode ID: 7abb2fb8f5cd97eaff92890ea48fae5466d310af4ba967c945d14bdb644f48aa
                              • Instruction ID: bc162214abdc4af210a44d7e595ffae6f57adfafc67607396b5cec0541695d68
                              • Opcode Fuzzy Hash: 7abb2fb8f5cd97eaff92890ea48fae5466d310af4ba967c945d14bdb644f48aa
                              • Instruction Fuzzy Hash: 12312471A00615AFEF248F288CC5B997BB4FB45350F4544EAE548DB2C1DF319985CB90
                              APIs
                              • __getptd.LIBCMT ref: 6F8AC17F
                                • Part of subcall function 6F8AA27F: __getptd_noexit.LIBCMT ref: 6F8AA282
                                • Part of subcall function 6F8AA27F: __amsg_exit.LIBCMT ref: 6F8AA28F
                              • __getptd.LIBCMT ref: 6F8AC190
                              • __getptd.LIBCMT ref: 6F8AC19E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: MOC$csm
                              • API String ID: 803148776-1389381023
                              • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                              • Instruction ID: 8c40f01c739720da982a935ab6ffb4d0d4a588b96144883f93bc86154f4936c3
                              • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                              • Instruction Fuzzy Hash: 9AE04F31614308DFD7049BB8C045B5837A5EB6A318F1509E1D41CCF266D737E550D942
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,?,?,6F8949D6,?,00000003), ref: 6F895685
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6F8956B4
                              • GetLastError.KERNEL32 ref: 6F8956C5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6F8956E5
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6F895709
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                              • String ID:
                              • API String ID: 3322701435-0
                              • Opcode ID: dad288d65909326fb081dd230379c7efae9bbb7d0b9ec7700fadc7ec5d3e6335
                              • Instruction ID: a4ffaff4e974ac82965aa707c7bdc04a6e90a3d6738bb93fa38b1c28293aa091
                              • Opcode Fuzzy Hash: dad288d65909326fb081dd230379c7efae9bbb7d0b9ec7700fadc7ec5d3e6335
                              • Instruction Fuzzy Hash: AF117F75384306BBE6249E68DCC1F6B77ECEB85755F100D68F6419F2C0D660BC098660
                              APIs
                              • lstrlenW.KERNEL32(?,?,?), ref: 6F89DA3D
                              • _memset.LIBCMT ref: 6F89DA5B
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 6F89DA75
                              • lstrcmpW.KERNEL32(?,?,?,?), ref: 6F89DA87
                              • SetWindowTextW.USER32(00000000,?), ref: 6F89DA93
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                              • String ID:
                              • API String ID: 4273134663-0
                              • Opcode ID: 08249c38c379a9ae3aa9c4d8ae57089e830102c7087ab1f3f45685f289373988
                              • Instruction ID: b1f045d4e14658ae7f88ca794ecee649325450ae20f127abead445676e8f1917
                              • Opcode Fuzzy Hash: 08249c38c379a9ae3aa9c4d8ae57089e830102c7087ab1f3f45685f289373988
                              • Instruction Fuzzy Hash: 3B0161B750571A67CB00DB688C899DBB3ADEF49350F0048A5E955DB141EB34E91487A0
                              APIs
                              • __getptd.LIBCMT ref: 6F8AFE1A
                                • Part of subcall function 6F8AA27F: __getptd_noexit.LIBCMT ref: 6F8AA282
                                • Part of subcall function 6F8AA27F: __amsg_exit.LIBCMT ref: 6F8AA28F
                              • __amsg_exit.LIBCMT ref: 6F8AFE3A
                              • __lock.LIBCMT ref: 6F8AFE4A
                              • InterlockedDecrement.KERNEL32(?), ref: 6F8AFE67
                              • InterlockedIncrement.KERNEL32(029A15E0), ref: 6F8AFE92
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: 42bd0a470dfb4b00f3690d50049e90e1973b793ce2f44a3cef6c701c27b256c5
                              • Instruction ID: 43df7307c525f5ba8077e5cd5939228d4c12127194d7c997d798e1d4ef44e503
                              • Opcode Fuzzy Hash: 42bd0a470dfb4b00f3690d50049e90e1973b793ce2f44a3cef6c701c27b256c5
                              • Instruction Fuzzy Hash: 3001B932A01B11EBDB159B6C880474D77A0EF95735F4119C9D4106F3D1CB3AB9A1CBD5
                              APIs
                              • __lock.LIBCMT ref: 6F8A4636
                                • Part of subcall function 6F8AA914: __mtinitlocknum.LIBCMT ref: 6F8AA92A
                                • Part of subcall function 6F8AA914: __amsg_exit.LIBCMT ref: 6F8AA936
                                • Part of subcall function 6F8AA914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6F8AA93E
                              • ___sbh_find_block.LIBCMT ref: 6F8A4641
                              • ___sbh_free_block.LIBCMT ref: 6F8A4650
                              • HeapFree.KERNEL32(00000000,00000000,6F8BE828,0000000C,6F8AA270,00000000,?,6F8AA5D4,00000000,00000001,00000000,?,6F8AA89E,00000018,6F8BE978,0000000C), ref: 6F8A4680
                              • GetLastError.KERNEL32(?,6F8AA5D4,00000000,00000001,00000000,?,6F8AA89E,00000018,6F8BE978,0000000C,6F8AA92F,00000000,00000000,?,6F8AA32A,0000000D), ref: 6F8A4691
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: 725714182b7c2827301206bbfe64241c47f1b866bd578de4d857aeac42bfa213
                              • Instruction ID: eb02672da2f3a842485666051e351dc04734e83a5f572b2ad28f2f0d0306ba67
                              • Opcode Fuzzy Hash: 725714182b7c2827301206bbfe64241c47f1b866bd578de4d857aeac42bfa213
                              • Instruction Fuzzy Hash: F401A271805B15BBEF245F78980874E3B74EF81726F2019D9E020AE1D0CF7BA580CA94
                              APIs
                              • TlsFree.KERNEL32(?,?,?,6F89C179), ref: 6F89C13B
                              • GlobalHandle.KERNEL32(?), ref: 6F89C149
                              • GlobalUnlock.KERNEL32(00000000), ref: 6F89C152
                              • GlobalFree.KERNEL32(00000000), ref: 6F89C159
                              • RtlDeleteCriticalSection.NTDLL ref: 6F89C163
                                • Part of subcall function 6F89BF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6F89BFBC
                                • Part of subcall function 6F89BF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6F89BFCC
                                • Part of subcall function 6F89BF5D: LocalFree.KERNEL32(?), ref: 6F89BFD5
                                • Part of subcall function 6F89BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6F89BFE7
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                              • String ID:
                              • API String ID: 1549993015-0
                              • Opcode ID: ff4cfa955f3b78319d70e1d02e5d1e938fec1a20e0c39de5a9a322d7dba230c9
                              • Instruction ID: e99504f66f4edca3cb08ba34031b551c15c40f8afecfbe01f71790d599279297
                              • Opcode Fuzzy Hash: ff4cfa955f3b78319d70e1d02e5d1e938fec1a20e0c39de5a9a322d7dba230c9
                              • Instruction Fuzzy Hash: 5BF0E236204A03ABCB105B3C9C0CE6B37B8AF876707150A88F525DB282CB31E803C7B4
                              APIs
                                • Part of subcall function 6F89C220: RtlEnterCriticalSection.NTDLL(6F8C34A8), ref: 6F89C25A
                                • Part of subcall function 6F89C220: RtlInitializeCriticalSection.NTDLL(?), ref: 6F89C26C
                                • Part of subcall function 6F89C220: RtlLeaveCriticalSection.NTDLL(6F8C34A8), ref: 6F89C279
                                • Part of subcall function 6F89C220: RtlEnterCriticalSection.NTDLL(?), ref: 6F89C289
                                • Part of subcall function 6F89BB0C: __EH_prolog3_catch.LIBCMT ref: 6F89BB13
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6F8A1458
                              • FreeLibrary.KERNEL32(?), ref: 6F8A1468
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                              • String ID: HtmlHelpW$hhctrl.ocx
                              • API String ID: 2853499158-3773518134
                              • Opcode ID: 59f43c68fff06c9965c886d44bcec80a78d7ae648c969339be3eded4e5b152cc
                              • Instruction ID: 3766bee8ab4413c257b5678e9a9cc83fcd0c271f55d6d38d47959d2c079a367b
                              • Opcode Fuzzy Hash: 59f43c68fff06c9965c886d44bcec80a78d7ae648c969339be3eded4e5b152cc
                              • Instruction Fuzzy Hash: 6401D131005B07BBDB255BACCD04B4A3BA6EF05368F00CCA9F45AAD690DB72E410CF51
                              APIs
                              • ___BuildCatchObject.LIBCMT ref: 6F8AC7D6
                                • Part of subcall function 6F8AC731: ___BuildCatchObjectHelper.LIBCMT ref: 6F8AC767
                              • _UnwindNestedFrames.LIBCMT ref: 6F8AC7ED
                              • ___FrameUnwindToState.LIBCMT ref: 6F8AC7FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                              • String ID: csm
                              • API String ID: 2163707966-1018135373
                              • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction ID: 904d598de5539a77d8bc4a5054b2db8769c4cc6d93b4a18cf6b0635d4158b40f
                              • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                              • Instruction Fuzzy Hash: DC01E831001209BBDF125F59CD44EEA7F6AFF49354F104451FD2859161DB32E5B1DBA1
                              APIs
                              • GetModuleHandleA.KERNEL32(KERNEL32,6F8A77D7), ref: 6F8AED7C
                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6F8AED8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: IsProcessorFeaturePresent$KERNEL32
                              • API String ID: 1646373207-3105848591
                              • Opcode ID: 85fbc9d3ab014d06855b4ab363f555084d7548ede5c90b606e9bf39bdb964369
                              • Instruction ID: 8b5b65248cb1a9ae7c15c84afd66e9645d09039316d78e10f1b1c7abcb35b0f1
                              • Opcode Fuzzy Hash: 85fbc9d3ab014d06855b4ab363f555084d7548ede5c90b606e9bf39bdb964369
                              • Instruction Fuzzy Hash: 51F01D20900E0AE2EF001BA6AD196AE7B79FB82756F820DD4E5B5A5184DF3190B1D385
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: File$SizeTime_memset
                              • String ID:
                              • API String ID: 151880914-0
                              • Opcode ID: 798c09a1fd518fc93c67b991b4d5c734b5f550cd11eb6985114aadf6a7921e40
                              • Instruction ID: 1771d5e132b85697b6022f3d0c4d3d0c9f89e8721287da7533d8f4f7000f8d26
                              • Opcode Fuzzy Hash: 798c09a1fd518fc93c67b991b4d5c734b5f550cd11eb6985114aadf6a7921e40
                              • Instruction Fuzzy Hash: 5D51E771504705AFDB24CF68C9409AEB7F8AF09720B108E6EE5A6DB690E734F945CB60
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6F8B084F
                              • __isleadbyte_l.LIBCMT ref: 6F8B0883
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6F8A40D8,6F8BBF84,00000000,00000000,?,?,?,?,6F8A40D8,00000000,?), ref: 6F8B08B4
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,6F8A40D8,00000001,00000000,00000000,?,?,?,?,6F8A40D8,00000000,?), ref: 6F8B0922
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: d64e7e21af69afa3ebfa4ffa0a7f3eeffd40faa0d6595421fdac4ed92c9a62aa
                              • Instruction ID: 64833789aeacf28dae4700f998d7e620287eeb76f4fb40df7fd3dbbd5100fa14
                              • Opcode Fuzzy Hash: d64e7e21af69afa3ebfa4ffa0a7f3eeffd40faa0d6595421fdac4ed92c9a62aa
                              • Instruction Fuzzy Hash: 89319031A0424AEFDB15CF68CE849AE3BB5BF01310F1159EEE4649F2A1D731EA41DB90
                              APIs
                              • GlobalLock.KERNEL32(?), ref: 6F8988E7
                              • lstrcmpW.KERNEL32(00000000,?), ref: 6F8988F4
                              • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6F89892E
                              • GlobalLock.KERNEL32(00000000), ref: 6F898938
                                • Part of subcall function 6F89DAD1: GlobalFlags.KERNEL32(?), ref: 6F89DAE0
                                • Part of subcall function 6F89DAD1: GlobalUnlock.KERNEL32(?), ref: 6F89DAF2
                                • Part of subcall function 6F89DAD1: GlobalFree.KERNEL32(?), ref: 6F89DAFD
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                              • String ID:
                              • API String ID: 2391069079-0
                              • Opcode ID: 89c32423a5c2019540112b38c7dddc49c146ab95645e9141a3374f722b97f7bd
                              • Instruction ID: 5cec3d216fc8fb1b818eec0f0c9bc450a03f306da4706ed1349d936c645e3012
                              • Opcode Fuzzy Hash: 89c32423a5c2019540112b38c7dddc49c146ab95645e9141a3374f722b97f7bd
                              • Instruction Fuzzy Hash: 50118C72504A05BFCB129BA9CC88CAF7BFEFB85705B400899FA05DA160DB31E911D760
                              APIs
                              • RtlEnterCriticalSection.NTDLL(?), ref: 6F89BFBC
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 6F89BFCC
                              • LocalFree.KERNEL32(?), ref: 6F89BFD5
                              • TlsSetValue.KERNEL32(?,00000000), ref: 6F89BFE7
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterFreeLeaveLocalValue
                              • String ID:
                              • API String ID: 2949335588-0
                              • Opcode ID: 137549e81e253f4633735d75113d5277d303caddd41526ab182a9f3d6e34ead9
                              • Instruction ID: 4bff52f30ed1a04ded98150456720ae5b49c8a93a6cfb6ec8c952d4b3f2bbf95
                              • Opcode Fuzzy Hash: 137549e81e253f4633735d75113d5277d303caddd41526ab182a9f3d6e34ead9
                              • Instruction Fuzzy Hash: 83116771600A05EFD718CF58C884F9AB7A8FF46325F1088AAF1568B5A1CB71BA51CF50
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6F898ED0
                                • Part of subcall function 6F899C7C: __EH_prolog3.LIBCMT ref: 6F899C83
                              • __wcsdup.LIBCMT ref: 6F898EF2
                              • GetCurrentThread.KERNEL32 ref: 6F898F1F
                              • GetCurrentThreadId.KERNEL32 ref: 6F898F28
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentH_prolog3Thread$__wcsdup
                              • String ID:
                              • API String ID: 190065205-0
                              • Opcode ID: 59388e7d2953f2702cf3682a886e6ed67decc498e5ccff8f923533348be7ec25
                              • Instruction ID: 956f78e713bed79e583eb69df570658b6e3d16c600ffe9c9379bc417e30c39de
                              • Opcode Fuzzy Hash: 59388e7d2953f2702cf3682a886e6ed67decc498e5ccff8f923533348be7ec25
                              • Instruction Fuzzy Hash: 672188B0905B419FC7218F7E854424AFAE8BFA4704B508D9FD1AACBA61CBB1A041CF40
                              APIs
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6F8A1D33
                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6F8A1D5E
                              • GetCapture.USER32 ref: 6F8A1D70
                              • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6F8A1D7F
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: MessageSend$Capture
                              • String ID:
                              • API String ID: 1665607226-0
                              • Opcode ID: 47ddb95a122456fbb0251bd9baab5cf7146286d8a0557426e1600a5251b77284
                              • Instruction ID: 683a50afebbdad4fcb0ed096e74ece57c647831e37cb2ee3180e324d529a80a7
                              • Opcode Fuzzy Hash: 47ddb95a122456fbb0251bd9baab5cf7146286d8a0557426e1600a5251b77284
                              • Instruction Fuzzy Hash: A20171313506947BDF301B668CCCFDB3E7ADFCAB10F1104B8B6149E0E6CAA28800DA60
                              APIs
                              • __EH_prolog3.LIBCMT ref: 6F896A8A
                                • Part of subcall function 6F8968E2: _malloc.LIBCMT ref: 6F896900
                              • __CxxThrowException@8.LIBCMT ref: 6F896AC0
                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6F8916A6,00000000,00000000,?,?,6F8BD898,00000004,6F8916A6,00000000,6F8969F9,00000000), ref: 6F896AEA
                              • LocalFree.KERNEL32(6F8916A6,6F8916A6,00000000,6F8969F9,00000000), ref: 6F896B12
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                              • String ID:
                              • API String ID: 1776251131-0
                              • Opcode ID: fc86879e74f20dae9645edf5a54310594cf0a2f29aeaf9a22da9b3b6327fde94
                              • Instruction ID: 619e709f86bc31bb40b89b92178f567823d8d4b4e27d916efc2fece02c474867
                              • Opcode Fuzzy Hash: fc86879e74f20dae9645edf5a54310594cf0a2f29aeaf9a22da9b3b6327fde94
                              • Instruction Fuzzy Hash: F3115E7160430ABFDF08DF6CCC41EAA3BA6EF49310F24C9A9F5258E2D0E73199509B90
                              APIs
                              • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6F89D194
                              • RegCloseKey.ADVAPI32(00000000), ref: 6F89D19D
                              • swprintf.LIBCMT ref: 6F89D1BA
                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6F89D1CB
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ClosePrivateProfileStringValueWriteswprintf
                              • String ID:
                              • API String ID: 22681860-0
                              • Opcode ID: ec46c222d7b7f887943f86ba8f573d6d59393d485e3ee6b9efd4b4f4a7bb6c74
                              • Instruction ID: 420204d04e9d9d12b4057ddb71c081083be715b8dcbe0cdedb86b23276961c36
                              • Opcode Fuzzy Hash: ec46c222d7b7f887943f86ba8f573d6d59393d485e3ee6b9efd4b4f4a7bb6c74
                              • Instruction Fuzzy Hash: 11018E72600709BBDB009E688C85FABB7ADAB49714F000899BA10AB180DB75E91587A4
                              APIs
                                • Part of subcall function 6F8968E2: _malloc.LIBCMT ref: 6F896900
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6F8972BB
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 6F8972C1
                              • DuplicateHandle.KERNEL32(00000000), ref: 6F8972C4
                              • GetLastError.KERNEL32(?), ref: 6F8972DF
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                              • String ID:
                              • API String ID: 3704204646-0
                              • Opcode ID: 8bc614d74cc27603312232ff8a73619bcd1bb5123bc497d46ecd0b6fdb511998
                              • Instruction ID: a22d997ca9d2386be6e202e843c72a717e7786d0e94b37f4eff9bf683416b07d
                              • Opcode Fuzzy Hash: 8bc614d74cc27603312232ff8a73619bcd1bb5123bc497d46ecd0b6fdb511998
                              • Instruction Fuzzy Hash: 8C017131600605BBDB049BADCD89F5E7BA9EF85760F1448A5F509DF280EB71EC01C7A0
                              APIs
                              • GetTopWindow.USER32(?), ref: 6F8A0F9D
                              • GetTopWindow.USER32(00000000), ref: 6F8A0FDC
                              • GetWindow.USER32(00000000,00000002), ref: 6F8A0FFA
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window
                              • String ID:
                              • API String ID: 2353593579-0
                              • Opcode ID: 7402547d2d5c4070bcd0fff59e445238bb2b3a12f7e8223ad07f773bd4f8497b
                              • Instruction ID: 0f0ff204831298a576ceebb7c1035ea4e4593c0cd83e3c77975646e1a8a864d1
                              • Opcode Fuzzy Hash: 7402547d2d5c4070bcd0fff59e445238bb2b3a12f7e8223ad07f773bd4f8497b
                              • Instruction Fuzzy Hash: 87015E3204961ABBCF025FA58C08EDF3F26EF497A1F044491FA14691A0C737C572EBA1
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction ID: 3cb4a3bdd6982bcfbf7c1b8110030e0d37e0b439db30097c4b06bed582c1e9c8
                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                              • Instruction Fuzzy Hash: A3116D7245028EBBCF125F89CD018DE3F62FB18358F048C95FA2859160D737D6B1AB81
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 6F8A03DC
                              • GetTopWindow.USER32(00000000), ref: 6F8A03EF
                                • Part of subcall function 6F8A03CF: GetWindow.USER32(00000000,00000002), ref: 6F8A0436
                              • GetTopWindow.USER32(?), ref: 6F8A041F
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: Window$Item
                              • String ID:
                              • API String ID: 369458955-0
                              • Opcode ID: 305b14b4787881255af00aae97bcb9d4f652f193d063bbad80bf49fe3d327851
                              • Instruction ID: 444ebcbfc6d1368f090e6195f64a89c9015abce5211a0f2c66a2ee48d309bb12
                              • Opcode Fuzzy Hash: 305b14b4787881255af00aae97bcb9d4f652f193d063bbad80bf49fe3d327851
                              • Instruction Fuzzy Hash: 2401F736007A1A77CF122E248D04E8F3B29FF453A9F00A8A1FD189D000D733D52286D2
                              APIs
                              • RtlEnterCriticalSection.NTDLL(6F8C34A8), ref: 6F89C25A
                              • RtlInitializeCriticalSection.NTDLL(?), ref: 6F89C26C
                              • RtlLeaveCriticalSection.NTDLL(6F8C34A8), ref: 6F89C279
                              • RtlEnterCriticalSection.NTDLL(?), ref: 6F89C289
                                • Part of subcall function 6F896DC1: __CxxThrowException@8.LIBCMT ref: 6F896DD7
                                • Part of subcall function 6F896DC1: __EH_prolog3.LIBCMT ref: 6F896DE4
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                              • String ID:
                              • API String ID: 2895727460-0
                              • Opcode ID: 6e61b8f0aa8ee49690721837f99ee280198089f6b28fea5fac363d8f893a92f0
                              • Instruction ID: 4feaa184de2a58e55c798e0260ef766874c36c7af7e16dc5b4261b537a9a6899
                              • Opcode Fuzzy Hash: 6e61b8f0aa8ee49690721837f99ee280198089f6b28fea5fac363d8f893a92f0
                              • Instruction Fuzzy Hash: 76F0FC32104106AFCB040BDCDC467457B69EBE3335F100896E1048E242CB35E853C5F6
                              APIs
                              • RtlEnterCriticalSection.NTDLL(6F8C32EC), ref: 6F89BA69
                              • TlsGetValue.KERNEL32(6F8C32D0,?,?,?,?,6F89C0B7,?,00000004,6F89AF00,6F896DDD,6F8968AD,?,6F8A4902,?), ref: 6F89BA7D
                              • RtlLeaveCriticalSection.NTDLL(6F8C32EC), ref: 6F89BA93
                              • RtlLeaveCriticalSection.NTDLL(6F8C32EC), ref: 6F89BA9E
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterValue
                              • String ID:
                              • API String ID: 3969253408-0
                              • Opcode ID: 86b655c8f0f4624b9e43cccfce7306dd5040c10664df2d98081c9458601929c1
                              • Instruction ID: b99bccf000aa786db632f258228aa64b8777d8f002a66090838752007142099f
                              • Opcode Fuzzy Hash: 86b655c8f0f4624b9e43cccfce7306dd5040c10664df2d98081c9458601929c1
                              • Instruction Fuzzy Hash: 80F05E7620A605AFD7208F6CC889C4A77EDEE853B031648A6E6599B101D730F953DBA0
                              APIs
                              • __getptd.LIBCMT ref: 6F8B0586
                                • Part of subcall function 6F8AA27F: __getptd_noexit.LIBCMT ref: 6F8AA282
                                • Part of subcall function 6F8AA27F: __amsg_exit.LIBCMT ref: 6F8AA28F
                              • __getptd.LIBCMT ref: 6F8B059D
                              • __amsg_exit.LIBCMT ref: 6F8B05AB
                              • __lock.LIBCMT ref: 6F8B05BB
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 1c56a2087e1fdedb20e88de78f0ef42e17d8fecc1bf4855966774c866f9ac3be
                              • Instruction ID: 068f3ff129473ee0535208611b325a92b815eab8117bfcf348690cbeb17dd879
                              • Opcode Fuzzy Hash: 1c56a2087e1fdedb20e88de78f0ef42e17d8fecc1bf4855966774c866f9ac3be
                              • Instruction Fuzzy Hash: 05F06D32918B14EBDB20AF6C8905B4832A0AB00728F416DCE9450BFBE0CB79A541CB51
                              APIs
                                • Part of subcall function 6F89A59C: GetModuleHandleW.KERNEL32(KERNEL32,6F89A6B6), ref: 6F89A5AA
                                • Part of subcall function 6F89A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6F89A5CB
                                • Part of subcall function 6F89A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6F89A5DD
                                • Part of subcall function 6F89A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6F89A5EF
                                • Part of subcall function 6F89A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6F89A601
                              • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6F89A6D0
                              • SetLastError.KERNEL32(0000006F), ref: 6F89A6E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: AddressProc$Module$ErrorFileHandleLastName
                              • String ID:
                              • API String ID: 2524245154-3916222277
                              • Opcode ID: 335eb344b9c4abeeb60c44fc9287172b13d7d8dae525adfb69c01f55bde3350d
                              • Instruction ID: e0a5d6673b9bc6dd7f312307f41b81a789ce9123b9265548f6a9c0e3ce1851e7
                              • Opcode Fuzzy Hash: 335eb344b9c4abeeb60c44fc9287172b13d7d8dae525adfb69c01f55bde3350d
                              • Instruction Fuzzy Hash: C6215E70C00618AEDB20DF79C8987DEB7B4BF04324F508AD9D069DA1C0DB74AA85DF50
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6F898E78
                              • PathFindExtensionW.SHLWAPI(?), ref: 6F898E8E
                                • Part of subcall function 6F898BDF: __EH_prolog3_GS.LIBCMT ref: 6F898BE9
                                • Part of subcall function 6F898BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6F898EB7,?,?), ref: 6F898C19
                                • Part of subcall function 6F898BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6F898C2D
                                • Part of subcall function 6F898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6F898C69
                                • Part of subcall function 6F898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6F898C77
                                • Part of subcall function 6F898BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6F898C94
                                • Part of subcall function 6F898BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6F898CBF
                                • Part of subcall function 6F898BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6F898CC8
                                • Part of subcall function 6F898BDF: GetModuleFileNameW.KERNEL32(6F890000,?,00000105), ref: 6F898D7F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                              • String ID: %s%s.dll
                              • API String ID: 1311856149-1649984862
                              • Opcode ID: 7070c4be9feab31c39975f2ae80899b311d249fe1d1ef2816795a0a227f5d6c4
                              • Instruction ID: c35de6250802dc90418a75006ee82d723f8c2937437a2df95cae25de4a90562c
                              • Opcode Fuzzy Hash: 7070c4be9feab31c39975f2ae80899b311d249fe1d1ef2816795a0a227f5d6c4
                              • Instruction Fuzzy Hash: BF01A272A19519ABCB05CB6CD885DEFB3B9EF49310F4108E9A505EB140DB70DA05CB90
                              APIs
                                • Part of subcall function 6F8A5017: __getptd.LIBCMT ref: 6F8A501D
                                • Part of subcall function 6F8A5017: __getptd.LIBCMT ref: 6F8A502D
                              • __getptd.LIBCMT ref: 6F8AC54B
                                • Part of subcall function 6F8AA27F: __getptd_noexit.LIBCMT ref: 6F8AA282
                                • Part of subcall function 6F8AA27F: __amsg_exit.LIBCMT ref: 6F8AA28F
                              • __getptd.LIBCMT ref: 6F8AC559
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.2032578642.000000006F891000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F890000, based on PE: true
                              • Associated: 00000009.00000002.2032559424.000000006F890000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032678434.000000006F8B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C1000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000009.00000002.2032708604.000000006F8C5000.00000004.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_6f890000_DZIPR.jbxd
                              Similarity
                              • API ID: __getptd$__amsg_exit__getptd_noexit
                              • String ID: csm
                              • API String ID: 803148776-1018135373
                              • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                              • Instruction ID: ae8307d6689507e5f21b22e03b979e3806f03b50c6e52e99ded46e3b5f1c6c8c
                              • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                              • Instruction Fuzzy Hash: 44014B74804305EBCF288F65C84069EBBB5FF11211F504CAFE4509E6A2EB32EA90DF41