Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
game.exe

Overview

General Information

Sample name:game.exe
Analysis ID:1524979
MD5:7ff30d3ab976b5771ba56163f0919386
SHA1:0acf7c157c7a0f0eae8d8b0ee11890a935a53724
SHA256:511e21b8c183fee710862aa39fe11cd87d632377b123b0ecba4e979100237f42
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Detected potential crypto function
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • game.exe (PID: 7576 cmdline: "C:\Users\user\Desktop\game.exe" MD5: 7FF30D3AB976B5771BA56163F0919386)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: game.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: game.exeStatic PE information: certificate valid
Source: game.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: game.exe
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5E4C0 FindFirstFileW,GetLastError,FindClose,0_2_00B5E4C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B90080 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B90080
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A52380 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,PathIsUNCW,0_2_00A52380
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B90480 FindFirstFileW,FindClose,0_2_00B90480
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B6C6E0 FindFirstFileW,FindClose,FindClose,0_2_00B6C6E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B84B10 FindFirstFileW,CloseHandle,CreateEventW,CreateThread,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00B84B10
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B411C0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B411C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BA37E0 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00BA37E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5DB60 _wcsrchr,FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00B5DB60
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5FD90 FindFirstFileW,FindClose,0_2_00B5FD90
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B8EEF0 _wcsrchr,_wcsrchr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00B8EEF0
Source: game.exe, 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmp, game.exe, 00000000.00000000.1667197531.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: FlashWindowExFlashWindowGetPackagePathhttp://www.example.comTESThttp://www.google.comhttp://www.yahoo.comtin9999.tmpattachment=.partGETcharsetDLD "filenameutf-8utf-16123POSTAdvancedInstallerLocal Network ServerISO-8859-1US-ASCIIHTTP/1.0Range: bytes=%u- equals www.yahoo.com (Yahoo)
Source: game.exeString found in binary or memory: Logger::SetLogFile( %s ) while OLD path is:%sLOGGER->failed to create LOG at:LOGGER->Reusing LOG file at:%04d-%02d-%02d %02d-%02d-%02dworkstationOS Version: %u.%u.%u SP%u (%s) [%s]LOGGER->Creating LOG file at:serverCPU: UnkownCPUp?VFlashWindowExFlashWindowGetPackagePathhttp://www.example.comTESThttp://www.google.comhttp://www.yahoo.comtin9999.tmpattachment=.partGETcharsetDLD "filenameutf-8utf-16123POSTAdvancedInstallerLocal Network ServerISO-8859-1US-ASCIIHTTP/1.0Range: bytes=%u- equals www.yahoo.com (Yahoo)
Source: game.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: game.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0
Source: game.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: game.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0
Source: game.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: game.exeString found in binary or memory: http://ocsps.ssl.com0
Source: game.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: game.exeString found in binary or memory: http://ocsps.ssl.com0Q
Source: game.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: game.exeString found in binary or memory: https://www.ssl.com/repository0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B19F70 GetSystemDirectoryW,LoadLibraryExW,NtdllDefWindowProc_W,0_2_00B19F70
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A50140 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00A50140
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AAA220 ShowWindow,ShowWindow,GetWindowLongW,SetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,SetWindowLongW,GetWindowLongW,SetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,SetWindowLongW,GetWindowLongW,SetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,SetWindowLongW,GetWindowRect,SendMessageW,0_2_00AAA220
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A466D0 SysFreeString,SysAllocString,GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,SysFreeString,NtdllDefWindowProc_W,SysFreeString,0_2_00A466D0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A48C90 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DestroyWindow,0_2_00A48C90
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A46D30 NtdllDefWindowProc_W,0_2_00A46D30
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A68F80 NtdllDefWindowProc_W,0_2_00A68F80
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A493B0 NtdllDefWindowProc_W,0_2_00A493B0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A5B400 NtdllDefWindowProc_W,0_2_00A5B400
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BA5510 NtdllDefWindowProc_W,0_2_00BA5510
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AA96E0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00AA96E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A49990 NtdllDefWindowProc_W,0_2_00A49990
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AF9A20 NtdllDefWindowProc_W,0_2_00AF9A20
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A55E10 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DeleteCriticalSection,0_2_00A55E10
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A45FB0 GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,NtdllDefWindowProc_W,0_2_00A45FB0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A4FFD0 NtdllDefWindowProc_W,0_2_00A4FFD0
Source: C:\Users\user\Desktop\game.exeCode function: 0_3_006AD4020_3_006AD402
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B664D00_2_00B664D0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B785B00_2_00B785B0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B9DA700_2_00B9DA70
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BBA1200_2_00BBA120
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB22C00_2_00BB22C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AAA2200_2_00AAA220
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A523800_2_00A52380
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B643500_2_00B64350
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB83400_2_00BB8340
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00ADA4D00_2_00ADA4D0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AEA4000_2_00AEA400
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A505900_2_00A50590
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A6A5E00_2_00A6A5E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A6C6F00_2_00A6C6F0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A5C7F00_2_00A5C7F0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00ACA7300_2_00ACA730
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A4E8E00_2_00A4E8E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B708000_2_00B70800
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00ABC8600_2_00ABC860
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C4080B0_2_00C4080B
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB69900_2_00BB6990
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A849E00_2_00A849E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A62BF00_2_00A62BF0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A6EB300_2_00A6EB30
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C2EB000_2_00C2EB00
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AACB700_2_00AACB70
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB6B400_2_00BB6B40
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C36CBA0_2_00C36CBA
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00ACEC300_2_00ACEC30
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C08D300_2_00C08D30
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB6E800_2_00BB6E80
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A330000_2_00A33000
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A7F1300_2_00A7F130
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C2712E0_2_00C2712E
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB91400_2_00BB9140
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB72800_2_00BB7280
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A613800_2_00A61380
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB93800_2_00BB9380
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C274BC0_2_00C274BC
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A6B6C00_2_00A6B6C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BC57C00_2_00BC57C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB18000_2_00BB1800
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A798700_2_00A79870
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A5BAA00_2_00A5BAA0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB3A800_2_00BB3A80
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A57CB00_2_00A57CB0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB1C100_2_00BB1C10
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BB9C000_2_00BB9C00
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AC1E800_2_00AC1E80
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00AE9FB00_2_00AE9FB0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A59FC00_2_00A59FC0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A5BFC00_2_00A5BFC0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B3BF600_2_00B3BF60
Source: C:\Users\user\Desktop\game.exeCode function: String function: 00A3FC70 appears 113 times
Source: C:\Users\user\Desktop\game.exeCode function: String function: 00A3A880 appears 58 times
Source: C:\Users\user\Desktop\game.exeCode function: String function: 00A52380 appears 31 times
Source: C:\Users\user\Desktop\game.exeCode function: String function: 00A38DB0 appears 110 times
Source: C:\Users\user\Desktop\game.exeCode function: String function: 00A3A2F0 appears 51 times
Source: game.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: clean5.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B616C0 FormatMessageW,GetLastError,0_2_00B616C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A7C860 GetDiskFreeSpaceExW,0_2_00A7C860
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BA64B0 GetLastError,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00BA64B0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A3A1B0 LoadResource,LockResource,SizeofResource,0_2_00A3A1B0
Source: game.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\game.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\game.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\game.exeFile read: C:\Users\user\Desktop\game.exeJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: lpk.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\Desktop\game.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: game.exeStatic PE information: certificate valid
Source: game.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: game.exeStatic file information: File size 3943344 > 1048576
Source: game.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x279c00
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: game.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: game.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: game.exe
Source: game.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: game.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: game.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: game.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: game.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B73710 SHGetFolderPathW,GetSystemDirectoryW,GetWindowsDirectoryW,GetWindowsDirectoryW,GetModuleFileNameW,SHGetSpecialFolderLocation,LoadLibraryW,GetProcAddress,SHGetPathFromIDListW,SHGetMalloc,0_2_00B73710
Source: C:\Users\user\Desktop\game.exeCode function: 0_3_006A5F52 pushad ; retf 0_3_006A603D
Source: C:\Users\user\Desktop\game.exeCode function: 0_3_006AC352 push eax; ret 0_3_006AC355
Source: C:\Users\user\Desktop\game.exeCode function: 0_3_0069C050 pushad ; retf 0069h0_3_0069C9A9
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A4D390 push ecx; mov dword ptr [esp], ecx0_2_00A4D391
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1F5E7 push ecx; ret 0_2_00C1F5FA
Source: C:\Users\user\Desktop\game.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-77579
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5E4C0 FindFirstFileW,GetLastError,FindClose,0_2_00B5E4C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B90080 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B90080
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A52380 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,PathIsUNCW,0_2_00A52380
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B90480 FindFirstFileW,FindClose,0_2_00B90480
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B6C6E0 FindFirstFileW,FindClose,FindClose,0_2_00B6C6E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B84B10 FindFirstFileW,CloseHandle,CreateEventW,CreateThread,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00B84B10
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B411C0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B411C0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00BA37E0 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00BA37E0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5DB60 _wcsrchr,FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00B5DB60
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B5FD90 FindFirstFileW,FindClose,0_2_00B5FD90
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B8EEF0 _wcsrchr,_wcsrchr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00B8EEF0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1BCEB VirtualQuery,GetSystemInfo,0_2_00C1BCEB
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C23B83 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C23B83
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B92EA0 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,FlushFileBuffers,WriteFile,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,OutputDebugStringW,WriteFile,WriteFile,FlushFileBuffers,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,0_2_00B92EA0
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B73710 SHGetFolderPathW,GetSystemDirectoryW,GetWindowsDirectoryW,GetWindowsDirectoryW,GetModuleFileNameW,SHGetSpecialFolderLocation,LoadLibraryW,GetProcAddress,SHGetPathFromIDListW,SHGetMalloc,0_2_00B73710
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C2A0EA mov ecx, dword ptr fs:[00000030h]0_2_00C2A0EA
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1E569 mov esi, dword ptr fs:[00000030h]0_2_00C1E569
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C389FB mov eax, dword ptr fs:[00000030h]0_2_00C389FB
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C38A3F mov eax, dword ptr fs:[00000030h]0_2_00C38A3F
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1E5D5 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_00C1E5D5
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00A6E550 __set_se_translator,SetUnhandledExceptionFilter,0_2_00A6E550
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1EFC8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00C1EFC8
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C23B83 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C23B83
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B599A0 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,CloseHandle,0_2_00B599A0
Source: C:\Users\user\Desktop\game.exeCode function: GetLocaleInfoW,0_2_00C386F6
Source: C:\Users\user\Desktop\game.exeCode function: GetLocaleInfoW,GetLocaleInfoW,0_2_00B88C30
Source: C:\Users\user\Desktop\game.exeCode function: EnumSystemLocalesW,0_2_00C3F8B8
Source: C:\Users\user\Desktop\game.exeCode function: EnumSystemLocalesW,0_2_00C3F99E
Source: C:\Users\user\Desktop\game.exeCode function: EnumSystemLocalesW,0_2_00C3F903
Source: C:\Users\user\Desktop\game.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00C3FDA5
Source: C:\Users\user\Desktop\game.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00C3FF7A
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B9F160 CreateNamedPipeW,CreateFileW,0_2_00B9F160
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00C1E230 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_00C1E230
Source: C:\Users\user\Desktop\game.exeCode function: 0_2_00B9DA70 GetUserNameW,GetUserNameW,GetLastError,GetUserNameW,GetEnvironmentVariableW,GetEnvironmentVariableW,RegDeleteValueW,RegCloseKey,RegQueryInfoKeyW,RegCloseKey,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegCloseKey,RegDeleteValueW,RegCloseKey,0_2_00B9DA70
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
Scheduled Task/Job
1
Deobfuscate/Decode Files or Information
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials15
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Qgame.exefalse
    unknown
    http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0game.exefalse
      unknown
      http://ocsps.ssl.com0game.exefalse
        unknown
        http://crls.ssl.com/ssl.com-rsa-RootCA.crl0game.exefalse
          unknown
          http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0game.exefalse
            unknown
            http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0game.exefalse
              unknown
              http://ocsps.ssl.com0Qgame.exefalse
                unknown
                https://www.ssl.com/repository0game.exefalse
                  unknown
                  http://ocsps.ssl.com0?game.exefalse
                    unknown
                    http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0game.exefalse
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1524979
                      Start date and time:2024-10-03 14:49:03 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 13s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:1
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:game.exe
                      Detection:CLEAN
                      Classification:clean5.winEXE@1/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 65%
                      • Number of executed functions: 53
                      • Number of non-executed functions: 173
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • VT rate limit hit for: game.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.447087447835371
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:game.exe
                      File size:3'943'344 bytes
                      MD5:7ff30d3ab976b5771ba56163f0919386
                      SHA1:0acf7c157c7a0f0eae8d8b0ee11890a935a53724
                      SHA256:511e21b8c183fee710862aa39fe11cd87d632377b123b0ecba4e979100237f42
                      SHA512:cd769f2eed61499c77b18365306c5f4c6ad7d6593f7710141c87f726fca4d379f71eb9cd5007c9579dbfebb69c4513dc5fe8a9ea3fa049b08dda2721a1306cdb
                      SSDEEP:49152:yWbbWb9tjju4k9y6lHao8JhBJyRjYQcUBiUARPU8Gbr2Y5l50PDPAELcpB2MpF8Q:yr99u4kc8Hao8eRjYBU4UAir2Y5EPDm
                      TLSH:56066B31764AC52FD9A201B0192C9A9F512CAF760BB254C7B3DC2E7E0BB55C21736E27
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........2#..\p..\p..\pq._q..\pq.Yq..\pq.Zq..\p..Xq..\p.._q..\p..Yq..\pq.Xq..\pq.]q..\pq.[q..\p..]pH.\p.[Uq..\p.[.p..\p...p..\p.[^q..\
                      Icon Hash:0e33713919a5130f
                      Entrypoint:0x5ef409
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x64F9C46E [Thu Sep 7 12:39:10 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:608505ff1e7e27ff4a42ea9c4e9f4192
                      Signature Valid:true
                      Signature Issuer:CN=SSL.com Code Signing Intermediate CA RSA R1, O=SSL Corp, L=Houston, S=Texas, C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 01/06/2024 16:02:47 01/06/2025 16:02:47
                      Subject Chain
                      • CN=Tulip Soft Limited, O=Tulip Soft Limited, L=Dagenham, S=London Borough of Barking and Dagenham, C=GB
                      Version:3
                      Thumbprint MD5:69985D67B105B53BE8B20BBA6F4E8048
                      Thumbprint SHA-1:ED892EDC5950D96116F97900995B1CEE43A12598
                      Thumbprint SHA-256:33E64EED43ECF01AA07F127277763C1EF6F68F72CB6140847D75CEC4F8FF2BF7
                      Serial:43BD8D6AA3FECB65766396C09E9EEDEA
                      Instruction
                      call 00007F0C74E20D66h
                      jmp 00007F0C74E2059Fh
                      push ebp
                      mov ebp, esp
                      and dword ptr [0072C2CCh], 00000000h
                      sub esp, 24h
                      or dword ptr [00728020h], 01h
                      push 0000000Ah
                      call dword ptr [0067B25Ch]
                      test eax, eax
                      je 00007F0C74E208D2h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-20h]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 756E6547h
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-04h], eax
                      mov eax, dword ptr [ebp-1Ch]
                      xor eax, 6C65746Eh
                      mov dword ptr [ebp-08h], eax
                      xor eax, eax
                      inc eax
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      lea ebx, dword ptr [ebp-24h]
                      mov dword ptr [ebx], eax
                      mov eax, dword ptr [ebp-04h]
                      or eax, dword ptr [ebp-08h]
                      or eax, edi
                      mov dword ptr [ebx+04h], esi
                      mov dword ptr [ebx+08h], ecx
                      mov dword ptr [ebx+0Ch], edx
                      jne 00007F0C74E20765h
                      mov eax, dword ptr [ebp-24h]
                      and eax, 0FFF3FF0h
                      cmp eax, 000106C0h
                      je 00007F0C74E20745h
                      cmp eax, 00020660h
                      je 00007F0C74E2073Eh
                      cmp eax, 00020670h
                      je 00007F0C74E20737h
                      cmp eax, 00030650h
                      je 00007F0C74E20730h
                      cmp eax, 00030660h
                      je 00007F0C74E20729h
                      cmp eax, 00030670h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x325ef40x28.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3360000x6d65c.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x3c0c280x1f88.reloc
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a40000x29218.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2c84d00x70.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x2c85400x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x299d900x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x27b0000x2fc.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x32324c0x280.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x279ac60x279c0011aedc3b7d655a259d30cc5f5fc4cb28unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x27b0000xac0760xac2001aad84f9ecc183c33dd368eec7c0e655False0.3258924518881627DIY-Thermocam raw data (Lepton 3.x), scale -2630-8835, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2048.000000, slope 974560704.0000005.061847432030138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x3280000xd2600x3c000bff262a25d32c3dde3349bee5da87c2False0.2669921875data4.791668844581246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x3360000x6d65c0x6d8005a0b1a4158dd8fad7bcf25888bcf031eFalse0.246597638413242data5.488066987169376IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x3a40000x292180x2940017574e23e92b0ab35c6f98688053b38fFalse0.4413293087121212data6.508215752056589IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_BITMAP0x3369100x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
                      RT_BITMAP0x336a500x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
                      RT_BITMAP0x3372780x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
                      RT_BITMAP0x33bb200xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
                      RT_BITMAP0x33c58c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
                      RT_BITMAP0x33c6e00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
                      RT_ICON0x33cf080x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.32899369766547326
                      RT_ICON0x37ef300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08703319502074688
                      RT_ICON0x3814d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.16463414634146342
                      RT_ICON0x3825800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.18565573770491803
                      RT_ICON0x382f080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3262411347517731
                      RT_DIALOG0x3833700xacdataEnglishUnited States0.7151162790697675
                      RT_DIALOG0x38341c0xccdataEnglishUnited States0.6911764705882353
                      RT_DIALOG0x3834e80x1b4dataEnglishUnited States0.5458715596330275
                      RT_DIALOG0x38369c0x136dataEnglishUnited States0.6064516129032258
                      RT_DIALOG0x3837d40x4cdataEnglishUnited States0.8289473684210527
                      RT_STRING0x3838200x234dataEnglishUnited States0.4645390070921986
                      RT_STRING0x383a540x182dataEnglishUnited States0.5103626943005182
                      RT_STRING0x383bd80x50dataEnglishUnited States0.7375
                      RT_STRING0x383c280x9adataEnglishUnited States0.37662337662337664
                      RT_STRING0x383cc40x2f6dataEnglishUnited States0.449868073878628
                      RT_STRING0x383fbc0x5c0dataEnglishUnited States0.3498641304347826
                      RT_STRING0x38457c0x434dataEnglishUnited States0.32899628252788105
                      RT_STRING0x3849b00x100dataEnglishUnited States0.5703125
                      RT_STRING0x384ab00x484dataEnglishUnited States0.39186851211072665
                      RT_STRING0x384f340x1eadataEnglishUnited States0.44081632653061226
                      RT_STRING0x3851200x18adataEnglishUnited States0.5228426395939086
                      RT_STRING0x3852ac0x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                      RT_STRING0x3854c40x624dataEnglishUnited States0.3575063613231552
                      RT_STRING0x385ae80x660dataEnglishUnited States0.3474264705882353
                      RT_STRING0x3861480x2e2dataEnglishUnited States0.4037940379403794
                      RT_GROUP_ICON0x38642c0x14dataEnglishUnited States1.1
                      RT_GROUP_ICON0x3864400x4cdataEnglishUnited States0.8026315789473685
                      RT_VERSION0x38648c0x398OpenPGP Public KeyEnglishUnited States0.3858695652173913
                      RT_HTML0x3868240x3835ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08298005420807561
                      RT_HTML0x38a05c0x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
                      RT_HTML0x38b3740x8c77HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.08081426068578103
                      RT_HTML0x393fec0x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
                      RT_HTML0x39aabc0x6a2HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3486454652532391
                      RT_HTML0x39b1600x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
                      RT_HTML0x39c1ac0x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
                      RT_HTML0x39d7600x205cexported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13604538870111058
                      RT_HTML0x39f7bc0x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
                      RT_MANIFEST0x3a2e4c0x80fXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.40814348036839554
                      DLLImport
                      KERNEL32.dllCreateFileW, CloseHandle, WriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, LoadLibraryExW, GetCurrentProcess, Sleep, WideCharToMultiByte, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetEnvironmentStringsW, InitializeCriticalSectionEx, LoadLibraryA, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, GetLocalTime, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, CreateNamedPipeW, ConnectNamedPipe, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, QueryPerformanceCounter, QueryPerformanceFrequency, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW, GetProcessAffinityMask, GetModuleHandleA, GlobalMemoryStatus, ReleaseSemaphore, CreateSemaphoreW
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:08:49:53
                      Start date:03/10/2024
                      Path:C:\Users\user\Desktop\game.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\game.exe"
                      Imagebase:0xa30000
                      File size:3'943'344 bytes
                      MD5 hash:7FF30D3AB976B5771BA56163F0919386
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:2.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:29.8%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:43
                        execution_graph 76186 c368d7 GetLastError 76187 c368ed 76186->76187 76190 c368f3 76186->76190 76221 c3861e 6 API calls std::_Locinfo::_Locinfo_ctor 76187->76221 76206 c368f7 SetLastError 76190->76206 76209 c3865d 76190->76209 76195 c3693d 76198 c3865d __dosmaperr 6 API calls 76195->76198 76196 c3692c 76197 c3865d __dosmaperr 6 API calls 76196->76197 76199 c3693a 76197->76199 76200 c36949 76198->76200 76222 c36b2d 76199->76222 76201 c36964 76200->76201 76202 c3694d 76200->76202 76228 c365b4 14 API calls __dosmaperr 76201->76228 76203 c3865d __dosmaperr 6 API calls 76202->76203 76203->76199 76207 c3696f 76208 c36b2d ___free_lconv_mon 12 API calls 76207->76208 76208->76206 76229 c383cd 76209->76229 76212 c3690f 76212->76206 76214 c380cf 76212->76214 76213 c38697 TlsSetValue 76219 c380dc __dosmaperr 76214->76219 76215 c3811c 76238 c23e9f 14 API calls __dosmaperr 76215->76238 76216 c38107 RtlAllocateHeap 76217 c36924 76216->76217 76216->76219 76217->76195 76217->76196 76219->76215 76219->76216 76237 c33dee EnterCriticalSection LeaveCriticalSection std::_Facet_Register 76219->76237 76221->76190 76223 c36b38 RtlFreeHeap 76222->76223 76227 c36b62 76222->76227 76224 c36b4d GetLastError 76223->76224 76223->76227 76225 c36b5a __dosmaperr 76224->76225 76239 c23e9f 14 API calls __dosmaperr 76225->76239 76227->76206 76228->76207 76230 c383fb 76229->76230 76233 c383f7 76229->76233 76230->76233 76236 c38302 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary ___vcrt_FlsSetValue 76230->76236 76232 c3840f 76232->76233 76234 c38415 GetProcAddress 76232->76234 76233->76212 76233->76213 76234->76233 76235 c38425 std::_Locinfo::_Locinfo_ctor 76234->76235 76235->76233 76236->76232 76237->76219 76238->76217 76239->76227 76240 b43f00 76241 b44167 76240->76241 76242 b43f4c 76240->76242 76359 c1ea25 76241->76359 76271 a41e10 107 API calls 2 library calls 76242->76271 76244 b43f60 76272 a3ad40 76244->76272 76247 b441e9 76249 b43f80 76253 b43f9b 76249->76253 76255 b43fa9 76249->76255 76250 b441ed 76366 a3aa00 76250->76366 76252 b441f7 76342 a3a2f0 76253->76342 76255->76255 76357 a3a880 43 API calls 4 library calls 76255->76357 76257 b43fa7 76287 a38960 76257->76287 76259 b43fd9 CreateFileW 76260 b44029 76259->76260 76261 b4400b CloseHandle 76259->76261 76291 a70960 66 API calls 76260->76291 76261->76241 76263 b44032 76292 b44200 76263->76292 76265 b44045 WriteFile 76266 b44075 76265->76266 76267 b440ad CloseHandle 76266->76267 76268 b440bb 76266->76268 76267->76268 76358 b5dac0 101 API calls _wcsrchr 76268->76358 76270 b440c6 76270->76241 76271->76244 76273 a3ad78 76272->76273 76274 a3adcc 76272->76274 76370 c1ee76 AcquireSRWLockExclusive 76273->76370 76276 c1ee76 3 API calls 76274->76276 76286 a3ae57 76274->76286 76278 a3ade6 76276->76278 76277 a3ad82 76277->76274 76279 a3ad8e GetProcessHeap 76277->76279 76278->76286 76377 c1ede5 44 API calls 76278->76377 76375 c1ede5 44 API calls 76279->76375 76282 a3adbb 76376 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 76282->76376 76284 a3ae46 76378 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 76284->76378 76286->76249 76286->76250 76288 a389ae std::_Throw_Cpp_error 76287->76288 76290 a3898d 76287->76290 76288->76259 76290->76259 76290->76287 76290->76288 76380 c23d8f 76290->76380 76291->76263 76293 a3ad40 51 API calls 76292->76293 76294 b4423a 76293->76294 76295 b44240 76294->76295 76296 b442be 76294->76296 76299 b4426e 76295->76299 76300 b4428b 76295->76300 76297 a3aa00 2 API calls 76296->76297 76298 b442c8 76297->76298 76387 b5e480 76298->76387 76450 b45ff0 76 API calls 76299->76450 76451 b45ff0 76 API calls 76300->76451 76304 b44286 76304->76265 76307 b4432e 76308 b44390 76307->76308 76409 b44830 76307->76409 76310 b443b0 GetModuleHandleW 76308->76310 76312 b443e4 76310->76312 76313 b44419 76310->76313 76311 b44349 76438 a52c50 76311->76438 76315 c1ee76 3 API calls 76312->76315 76319 b44471 76313->76319 76322 c1ee76 3 API calls 76313->76322 76317 b443ee 76315->76317 76316 b44356 MoveFileW 76321 b5e480 10 API calls 76316->76321 76317->76313 76320 b443fa GetProcAddress 76317->76320 76326 c1ee76 3 API calls 76319->76326 76335 b444c9 76319->76335 76452 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 76320->76452 76324 b44388 76321->76324 76325 b44446 76322->76325 76324->76308 76327 b44711 76324->76327 76325->76319 76328 b44452 GetProcAddress 76325->76328 76330 b4449e 76326->76330 76447 c2a1f7 76327->76447 76453 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 76328->76453 76334 b444aa GetProcAddress 76330->76334 76330->76335 76454 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 76334->76454 76337 b446a5 76335->76337 76455 b19f70 GetSystemDirectoryW 76335->76455 76480 b45c50 11 API calls 76337->76480 76339 b446b1 76340 c1ea25 _ValidateLocalCookies 5 API calls 76339->76340 76341 b44709 76340->76341 76341->76265 76748 a3a0f0 10 API calls 76342->76748 76344 a3a300 76345 a3a382 76344->76345 76346 a3a306 FindResourceW 76344->76346 76345->76257 76346->76345 76347 a3a31d 76346->76347 76749 a3a1b0 LoadResource LockResource SizeofResource 76347->76749 76349 a3a327 76349->76345 76350 a3a34e 76349->76350 76750 a3a810 43 API calls 76349->76750 76751 c28397 41 API calls 3 library calls 76350->76751 76353 a3a35e 76354 a3a36e 76353->76354 76355 a3aa00 2 API calls 76353->76355 76354->76257 76356 a3a394 76355->76356 76357->76257 76358->76270 76360 c1ea2d 76359->76360 76361 c1ea2e IsProcessorFeaturePresent 76359->76361 76360->76247 76363 c1f008 76361->76363 76752 c1efc8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 76363->76752 76365 c1f0eb 76365->76247 76367 a3aa0d 76366->76367 76368 c2068a Concurrency::cancel_current_task RaiseException 76367->76368 76369 a3aa1a RtlAllocateHeap 76368->76369 76369->76252 76373 c1ee8a 76370->76373 76371 c1ee8f ReleaseSRWLockExclusive 76371->76277 76373->76371 76379 c1eec5 SleepConditionVariableSRW 76373->76379 76375->76282 76376->76274 76377->76284 76378->76286 76379->76373 76385 c23ccb 41 API calls 2 library calls 76380->76385 76382 c23d9e 76386 c23dac 11 API calls std::locale::_Setgloballocale 76382->76386 76384 c23dab 76385->76382 76386->76384 76481 b5e4c0 76387->76481 76390 a3a530 76391 a3a53b 76390->76391 76392 a3a54a 76391->76392 76393 a3a5ea 76391->76393 76403 a3a567 std::locale::_Setgloballocale 76391->76403 76392->76307 76498 a3a7c0 43 API calls 76393->76498 76395 a3a5ef 76398 a3a530 43 API calls 76395->76398 76396 a3a58e 76494 c23e9f 14 API calls __dosmaperr 76396->76494 76400 a3a626 76398->76400 76399 a3a593 76495 c23d7f 41 API calls __cftof 76399->76495 76400->76307 76401 a3a5ad std::_Locinfo::_Locinfo_ctor 76401->76307 76403->76396 76403->76401 76405 a3a5cf 76403->76405 76404 a3a59e 76404->76307 76405->76401 76496 c23e9f 14 API calls __dosmaperr 76405->76496 76407 a3a5d8 76497 c23d7f 41 API calls __cftof 76407->76497 76410 b44870 76409->76410 76411 a3ad40 51 API calls 76410->76411 76422 b44888 76411->76422 76412 b4497d 76413 a3aa00 2 API calls 76412->76413 76414 b44987 FreeLibrary EnterCriticalSection 76413->76414 76415 b44a33 LeaveCriticalSection 76414->76415 76416 b449eb 76414->76416 76417 b44a59 76415->76417 76433 b44a7b std::_Throw_Cpp_error 76415->76433 76419 b44a01 76416->76419 76420 b449f1 DestroyWindow 76416->76420 76421 b44a65 76417->76421 76424 c28829 ___std_exception_destroy 14 API calls 76417->76424 76419->76415 76423 b44a11 std::_Throw_Cpp_error 76419->76423 76501 c28829 76419->76501 76420->76419 76428 c28829 ___std_exception_destroy 14 API calls 76421->76428 76421->76433 76422->76412 76425 b5e480 10 API calls 76422->76425 76430 b448fa 76422->76430 76431 a3ad40 51 API calls 76422->76431 76499 a39d60 73 API calls 76422->76499 76423->76415 76424->76421 76425->76422 76428->76433 76429 b44b04 76429->76311 76432 b44942 76430->76432 76435 b44918 76430->76435 76437 b4491f 76430->76437 76431->76422 76500 a3a880 43 API calls 4 library calls 76432->76500 76504 b49c90 44 API calls std::_Throw_Cpp_error 76433->76504 76436 a3a530 43 API calls 76435->76436 76436->76437 76437->76311 76439 a52cb3 76438->76439 76441 a52c66 76438->76441 76439->76316 76440 a52ca0 76505 a3a880 43 API calls 4 library calls 76440->76505 76441->76440 76442 a52c76 76441->76442 76445 a3a530 43 API calls 76442->76445 76444 a52cab 76444->76316 76446 a52c7c 76445->76446 76446->76316 76506 c29fdf 76447->76506 76450->76304 76451->76304 76452->76313 76453->76319 76454->76335 76456 b19fbf 76455->76456 76478 b1a07b 76455->76478 76458 a3ad40 51 API calls 76456->76458 76456->76478 76457 c1ea25 _ValidateLocalCookies 5 API calls 76459 b1a0cb 76457->76459 76460 b19fcf 76458->76460 76459->76335 76461 b1a0d3 76460->76461 76462 b19fd9 76460->76462 76463 a3aa00 2 API calls 76461->76463 76466 b1a003 76462->76466 76467 b19ff5 76462->76467 76464 b1a0dd 76463->76464 76657 c1ea64 76464->76657 76573 a3a880 43 API calls 4 library calls 76466->76573 76469 a3a2f0 52 API calls 76467->76469 76471 b1a001 76469->76471 76574 a52380 76471->76574 76472 b1a27a 76472->76335 76475 b1a042 76475->76475 76476 a52380 118 API calls 76475->76476 76477 b1a069 76476->76477 76477->76478 76479 b1a07f LoadLibraryExW 76477->76479 76478->76457 76479->76478 76480->76339 76482 b5e504 76481->76482 76492 b5e4fc 76481->76492 76484 b5e5f1 76482->76484 76488 b5e534 std::locale::_Setgloballocale 76482->76488 76482->76492 76483 c1ea25 _ValidateLocalCookies 5 API calls 76485 b44320 76483->76485 76486 a3aa00 2 API calls 76484->76486 76485->76390 76487 b5e5fb 76486->76487 76489 b5e552 FindFirstFileW 76488->76489 76488->76492 76490 b5e581 76489->76490 76491 b5e59e GetLastError 76489->76491 76490->76492 76493 b5e5bb FindClose 76490->76493 76491->76490 76492->76483 76493->76492 76494->76399 76495->76404 76496->76407 76497->76401 76498->76395 76499->76422 76500->76437 76502 c36b2d ___free_lconv_mon 14 API calls 76501->76502 76503 c28841 76502->76503 76503->76423 76504->76429 76505->76444 76507 c2a01e 76506->76507 76508 c2a00c 76506->76508 76518 c29e88 76507->76518 76533 c2a0a7 GetModuleHandleW 76508->76533 76512 c2a011 76512->76507 76534 c2a10c GetModuleHandleExW 76512->76534 76513 b4471b 76519 c29e94 std::_Locinfo::_Locinfo_ctor 76518->76519 76540 c32418 EnterCriticalSection 76519->76540 76521 c29e9e 76541 c29ef4 76521->76541 76523 c29eab 76545 c29ec9 76523->76545 76526 c2a076 76567 c2a0ea 76526->76567 76529 c2a094 76531 c2a10c std::locale::_Setgloballocale 3 API calls 76529->76531 76530 c2a084 GetCurrentProcess TerminateProcess 76530->76529 76532 c2a09c ExitProcess 76531->76532 76533->76512 76535 c2a14b GetProcAddress 76534->76535 76536 c2a16c 76534->76536 76535->76536 76537 c2a15f 76535->76537 76538 c2a172 FreeLibrary 76536->76538 76539 c2a01d 76536->76539 76537->76536 76538->76539 76539->76507 76540->76521 76542 c29f00 std::_Locinfo::_Locinfo_ctor 76541->76542 76544 c29f67 std::locale::_Setgloballocale 76542->76544 76548 c34876 76542->76548 76544->76523 76566 c32460 LeaveCriticalSection 76545->76566 76547 c29eb7 76547->76513 76547->76526 76549 c34882 __EH_prolog3 76548->76549 76552 c345ce 76549->76552 76551 c348a9 std::locale::_Setgloballocale 76551->76544 76553 c345da std::_Locinfo::_Locinfo_ctor 76552->76553 76560 c32418 EnterCriticalSection 76553->76560 76555 c345e8 76561 c34786 76555->76561 76559 c34606 76559->76551 76560->76555 76562 c345f5 76561->76562 76563 c347a5 76561->76563 76565 c3461d LeaveCriticalSection std::_Lockit::~_Lockit 76562->76565 76563->76562 76564 c36b2d ___free_lconv_mon 14 API calls 76563->76564 76564->76562 76565->76559 76566->76547 76572 c38a3f 6 API calls std::locale::_Setgloballocale 76567->76572 76569 c2a0ef 76570 c2a0f4 GetPEB 76569->76570 76571 c2a080 76569->76571 76570->76571 76571->76529 76571->76530 76572->76569 76573->76471 76576 a523a6 ___crtLCMapStringW 76574->76576 76581 a52411 std::_Locinfo::_Locinfo_ctor 76574->76581 76575 a3aa00 2 API calls 76577 a5245c 76575->76577 76576->76581 76584 a523f0 std::locale::_Setgloballocale 76576->76584 76665 a3a810 43 API calls 76576->76665 76579 a524be FindClose 76577->76579 76580 a524cb 76577->76580 76579->76580 76668 a3a650 RtlAllocateHeap RaiseException 76580->76668 76581->76575 76583 a5243f 76581->76583 76583->76475 76584->76581 76666 c23e9f 14 API calls __dosmaperr 76584->76666 76586 a524e7 76588 a3ad40 51 API calls 76586->76588 76587 a5242d 76667 c23d7f 41 API calls __cftof 76587->76667 76593 a524f9 76588->76593 76590 a5289d 76591 a3aa00 2 API calls 76590->76591 76592 a528a7 76591->76592 76596 a3a530 43 API calls 76592->76596 76593->76590 76594 a52521 76593->76594 76595 a5252f 76593->76595 76597 a3a2f0 52 API calls 76594->76597 76669 a3a880 43 API calls 4 library calls 76595->76669 76599 a528ef 76596->76599 76601 a5252d 76597->76601 76600 a52aec 76599->76600 76602 a52b10 76599->76602 76604 a52925 76599->76604 76600->76475 76603 a5278d 76601->76603 76606 a526c5 FindFirstFileW 76601->76606 76607 a52576 PathIsUNCW 76601->76607 76605 a3aa00 2 API calls 76602->76605 76603->76475 76609 a52942 76604->76609 76733 a52d70 43 API calls 76604->76733 76610 a52b1a 76605->76610 76606->76603 76608 a526dd GetFullPathNameW 76606->76608 76611 a52655 76607->76611 76612 a5258b 76607->76612 76614 a526f6 76608->76614 76652 a52822 ___crtLCMapStringW 76608->76652 76734 a52cc0 53 API calls 76609->76734 76726 a45bc0 53 API calls 4 library calls 76611->76726 76670 a45bc0 53 API calls 4 library calls 76612->76670 76617 a52711 GetFullPathNameW 76614->76617 76728 a3a810 43 API calls 76614->76728 76624 a52727 ___crtLCMapStringW 76617->76624 76619 a5294d 76622 a52380 110 API calls 76619->76622 76620 a3aa00 2 API calls 76620->76590 76623 a52961 76622->76623 76623->76600 76626 a52994 PathIsUNCW 76623->76626 76625 a527c7 76624->76625 76635 a52757 76624->76635 76624->76652 76639 a527d9 _wcsrchr 76625->76639 76729 a3a700 43 API calls 4 library calls 76625->76729 76629 a52a77 76626->76629 76630 a529a8 76626->76630 76627 a52593 76627->76606 76671 a45fb0 76627->76671 76736 a45bc0 53 API calls 4 library calls 76629->76736 76735 a45bc0 53 API calls 4 library calls 76630->76735 76634 a52785 SetLastError 76634->76603 76635->76634 76637 a5277c FindClose 76635->76637 76637->76634 76638 a5260e 76641 a52c50 43 API calls 76638->76641 76640 a527f9 _wcsrchr 76639->76640 76730 a3a700 43 API calls 4 library calls 76639->76730 76644 a52826 76640->76644 76645 a5280c 76640->76645 76643 a52621 76641->76643 76643->76606 76646 a52646 76643->76646 76644->76652 76732 a3a700 43 API calls 4 library calls 76644->76732 76647 a52874 76645->76647 76645->76652 76731 a3a700 43 API calls 4 library calls 76645->76731 76727 a52b20 43 API calls 3 library calls 76646->76727 76647->76603 76648 a529b0 76648->76600 76651 a45fb0 101 API calls 76648->76651 76654 a52a31 76651->76654 76652->76620 76652->76647 76655 a52c50 43 API calls 76654->76655 76656 a52a43 76655->76656 76656->76600 76737 a52b20 43 API calls 3 library calls 76656->76737 76658 c1ea69 std::_Facet_Register 76657->76658 76659 b1a232 76658->76659 76661 c1ea85 std::_Facet_Register 76658->76661 76744 c33dee EnterCriticalSection LeaveCriticalSection std::_Facet_Register 76658->76744 76664 a4f170 43 API calls 2 library calls 76659->76664 76745 c2068a 76661->76745 76663 c1f7a0 76664->76472 76665->76584 76666->76587 76667->76581 76668->76586 76669->76601 76670->76627 76672 a46007 76671->76672 76673 a46140 76671->76673 76675 a46059 76672->76675 76677 a46029 76672->76677 76674 a3aa00 2 API calls 76673->76674 76676 a4614a 76674->76676 76679 a3ad40 51 API calls 76675->76679 76688 a4606b 76675->76688 76740 a3a7c0 43 API calls 76676->76740 76680 a3a530 43 API calls 76677->76680 76679->76688 76683 a46031 76680->76683 76681 a4614f 76682 a3aa00 2 API calls 76681->76682 76684 a46159 76682->76684 76683->76638 76685 a3aa00 2 API calls 76684->76685 76686 a46163 76685->76686 76687 a461aa 76686->76687 76699 a4622d __Getcoll std::_Facet_Register 76686->76699 76689 a461b1 76687->76689 76690 a4620f GetWindowLongW 76687->76690 76688->76676 76688->76681 76688->76684 76691 a46093 76688->76691 76692 a463f7 NtdllDefWindowProc_W 76689->76692 76694 a461d2 GetWindowLongW 76689->76694 76696 a4621c 76690->76696 76691->76684 76702 a460d3 std::locale::_Setgloballocale 76691->76702 76693 a46446 76692->76693 76695 c1ea25 _ValidateLocalCookies 5 API calls 76693->76695 76694->76692 76697 a461e8 GetWindowLongW SetWindowLongW NtdllDefWindowProc_W 76694->76697 76698 a4646e 76695->76698 76696->76692 76697->76693 76698->76638 76701 a46419 76699->76701 76704 a462ab SetWindowTextW 76699->76704 76700 a460ef std::_Locinfo::_Locinfo_ctor 76700->76638 76701->76693 76708 c28829 ___std_exception_destroy 14 API calls 76701->76708 76702->76700 76738 c23e9f 14 API calls __dosmaperr 76702->76738 76706 a462c7 76704->76706 76707 a462cd 76704->76707 76705 a46111 76739 c23d7f 41 API calls __cftof 76705->76739 76706->76707 76710 a4635b 76707->76710 76711 a462e3 GlobalAlloc 76707->76711 76708->76693 76710->76701 76743 a466d0 80 API calls 8 library calls 76710->76743 76711->76710 76712 a462f3 GlobalLock 76711->76712 76716 a46308 std::locale::_Setgloballocale 76712->76716 76714 a4638e 76717 a46407 76714->76717 76721 a463a7 SetWindowLongW 76714->76721 76720 a4630d std::_Locinfo::_Locinfo_ctor 76716->76720 76741 c23e9f 14 API calls __dosmaperr 76716->76741 76717->76701 76718 a4632b 76742 c23d7f 41 API calls __cftof 76718->76742 76723 a46341 GlobalUnlock 76720->76723 76722 a463bb 76721->76722 76724 a463ea 76722->76724 76725 c28829 ___std_exception_destroy 14 API calls 76722->76725 76723->76710 76724->76696 76725->76724 76726->76643 76727->76606 76728->76617 76729->76639 76730->76640 76731->76652 76732->76652 76733->76609 76734->76619 76735->76648 76736->76656 76737->76600 76738->76705 76739->76700 76740->76681 76741->76718 76742->76720 76743->76714 76744->76658 76746 c206d1 RaiseException 76745->76746 76747 c206a4 76745->76747 76746->76663 76747->76746 76748->76344 76749->76349 76750->76350 76751->76353 76752->76365 76753 b522f0 76754 b5233b 76753->76754 76757 b52328 76753->76757 76761 b40da0 55 API calls 4 library calls 76754->76761 76756 b52345 76758 a38960 41 API calls 76756->76758 76759 c1ea25 _ValidateLocalCookies 5 API calls 76757->76759 76758->76757 76760 b5238a 76759->76760 76761->76756 76762 b5d410 76806 b5b9d0 42 API calls 76762->76806 76764 b5d44f 76807 a64820 42 API calls 76764->76807 76766 b5d467 76808 a39e20 76766->76808 76769 a38960 41 API calls 76770 b5d48f 76769->76770 76772 b5d6f8 76770->76772 76776 b5d4c9 std::_Throw_Cpp_error std::locale::_Setgloballocale 76770->76776 76771 b5d552 76773 b5d579 76771->76773 76777 b5d55f 76771->76777 76774 c23d8f std::_Throw_Cpp_error 41 API calls 76772->76774 76812 b664d0 76773->76812 76778 b5d6fd 76774->76778 76776->76771 76844 a49b40 53 API calls 76776->76844 76850 b67d40 99 API calls 3 library calls 76777->76850 76782 c23d8f std::_Throw_Cpp_error 41 API calls 76778->76782 76779 b5d58a 76851 a38300 76779->76851 76786 b5d702 76782->76786 76784 b5d523 76845 a381d0 76784->76845 76785 b5d576 76785->76773 76788 a38300 42 API calls 76786->76788 76787 b5d5c1 76861 b5b9d0 42 API calls 76787->76861 76790 b5d769 76788->76790 76863 c20565 76790->76863 76791 b5d5d5 76862 b64350 60 API calls 3 library calls 76791->76862 76795 b5d77c 76876 b67d40 99 API calls 3 library calls 76795->76876 76797 b5d68f std::_Throw_Cpp_error 76800 a38960 41 API calls 76797->76800 76798 b5d78b 76799 b5d5f5 std::_Throw_Cpp_error 76799->76778 76799->76797 76801 b5d6c5 76800->76801 76802 a38960 41 API calls 76801->76802 76803 b5d6d7 76802->76803 76804 c1ea25 _ValidateLocalCookies 5 API calls 76803->76804 76805 b5d6f2 76804->76805 76806->76764 76807->76766 76809 a39e60 76808->76809 76810 a381d0 42 API calls 76809->76810 76811 a39e7a 76810->76811 76811->76769 76877 a38850 76812->76877 76814 b66579 std::locale::_Setgloballocale 76815 b665aa LoadStringW 76814->76815 76816 b665dd 76815->76816 76821 b66690 std::locale::_Setgloballocale 76815->76821 76817 a38300 42 API calls 76816->76817 76819 b665fe 76817->76819 76818 b666e5 LoadStringW 76820 b666fc 76818->76820 76818->76821 76822 a38960 41 API calls 76819->76822 76833 b66610 std::_Throw_Cpp_error 76819->76833 76823 a38300 42 API calls 76820->76823 76821->76818 76892 b668d0 43 API calls 2 library calls 76821->76892 76822->76833 76825 b6671d 76823->76825 76828 a38960 41 API calls 76825->76828 76825->76833 76826 b667d9 std::_Throw_Cpp_error 76829 c1ea25 _ValidateLocalCookies 5 API calls 76826->76829 76827 b66818 76830 c23d8f std::_Throw_Cpp_error 41 API calls 76827->76830 76828->76833 76831 b66811 76829->76831 76832 b6681d 76830->76832 76831->76779 76834 b668be 76832->76834 76835 b668a1 SysAllocStringLen 76832->76835 76836 b66859 76832->76836 76833->76826 76833->76827 76837 a3aa00 2 API calls 76834->76837 76838 b6685e CLSIDFromString SysFreeString 76835->76838 76839 b668b4 76835->76839 76836->76838 76840 b668c8 76837->76840 76841 c1ea25 _ValidateLocalCookies 5 API calls 76838->76841 76842 a3aa00 2 API calls 76839->76842 76843 b6689d 76841->76843 76842->76834 76843->76779 76844->76784 76846 a38217 76845->76846 76849 a381e3 std::_Locinfo::_Locinfo_ctor 76845->76849 76894 a380a0 42 API calls 2 library calls 76846->76894 76848 a38228 76848->76771 76849->76771 76850->76785 76852 a38310 76851->76852 76853 a3838e 76851->76853 76854 a3831d std::_Locinfo::_Locinfo_ctor 76852->76854 76858 a38850 42 API calls 76852->76858 76895 a388b0 42 API calls std::_Throw_Cpp_error 76853->76895 76854->76787 76860 a38365 std::_Locinfo::_Locinfo_ctor 76858->76860 76860->76787 76861->76791 76862->76799 76896 c20573 76863->76896 76865 c2056a 76865->76795 76910 c37e2e EnterCriticalSection LeaveCriticalSection std::locale::_Setgloballocale 76865->76910 76867 c28420 76868 c2842b 76867->76868 76911 c37e73 41 API calls 7 library calls 76867->76911 76870 c28454 76868->76870 76871 c28435 IsProcessorFeaturePresent 76868->76871 76913 c2a1bb 23 API calls std::locale::_Setgloballocale 76870->76913 76872 c28441 76871->76872 76912 c23b83 8 API calls 2 library calls 76872->76912 76874 c2845e 76876->76798 76878 a3889b 76877->76878 76879 a3885b 76877->76879 76893 a38830 42 API calls 3 library calls 76878->76893 76881 a38886 76879->76881 76882 a38864 76879->76882 76884 a38896 76881->76884 76886 c1ea64 std::_Facet_Register 3 API calls 76881->76886 76882->76878 76883 a3886b 76882->76883 76885 c1ea64 std::_Facet_Register 3 API calls 76883->76885 76884->76814 76888 a38871 76885->76888 76889 a38890 76886->76889 76887 c23d8f std::_Throw_Cpp_error 41 API calls 76890 a388a5 76887->76890 76888->76887 76891 a3887a 76888->76891 76889->76814 76891->76814 76892->76821 76893->76888 76894->76848 76897 c2057f GetLastError 76896->76897 76898 c2057c 76896->76898 76914 c2375d 6 API calls ___vcrt_FlsSetValue 76897->76914 76898->76865 76900 c20594 76901 c205b3 76900->76901 76902 c205f9 SetLastError 76900->76902 76915 c23798 6 API calls ___vcrt_FlsSetValue 76900->76915 76901->76902 76902->76865 76904 c205ad __Getctype 76904->76901 76905 c205d5 76904->76905 76916 c23798 6 API calls ___vcrt_FlsSetValue 76904->76916 76908 c205e9 76905->76908 76917 c23798 6 API calls ___vcrt_FlsSetValue 76905->76917 76909 c28829 ___std_exception_destroy 14 API calls 76908->76909 76909->76901 76910->76867 76911->76868 76912->76870 76913->76874 76914->76900 76915->76904 76916->76905 76917->76908 76918 a6e550 76919 a6e563 std::_Throw_Cpp_error 76918->76919 76924 c2052d 76919->76924 76922 a6e58b 76923 a6e579 SetUnhandledExceptionFilter 76923->76922 76925 c20565 __set_se_translator 51 API calls 76924->76925 76926 c20536 76925->76926 76927 c20565 __set_se_translator 51 API calls 76926->76927 76928 a6e56d 76927->76928 76928->76922 76928->76923 76929 b7bc90 77019 b7d270 596 API calls 4 library calls 76929->77019 76931 b7bcc5 77020 b80b00 103 API calls 2 library calls 76931->77020 76933 b7bccd 76958 b88fb0 76933->76958 76937 b7bce6 76938 b7bcea 76937->76938 76999 b6b160 53 API calls 76937->76999 76940 b7bd14 77000 b782b0 76940->77000 76959 a52c50 43 API calls 76958->76959 76960 b88fdf 76959->76960 76961 a52c50 43 API calls 76960->76961 76962 b88feb 76961->76962 77021 b68bb0 76962->77021 76964 b88ff3 77044 a39d60 73 API calls 76964->77044 76966 b7bcdf 76967 b81040 76966->76967 76968 b81098 76967->76968 76973 b81077 76967->76973 76969 b810c6 CreateFileW 76968->76969 76970 b81241 76968->76970 76974 b810b8 76968->76974 76971 b810f0 76969->76971 76972 a3aa00 2 API calls 76970->76972 76976 b8118b 76971->76976 76977 b81110 GetLastError 76971->76977 76975 b8124b 76972->76975 76973->76968 76973->76970 77065 a52d70 43 API calls 76973->77065 76974->76969 77066 a52d70 43 API calls 76974->77066 77050 ba32f0 76976->77050 77067 b616c0 75 API calls 76977->77067 76982 b81194 76985 b8119f 76982->76985 76986 b81221 76982->76986 76983 b81127 77068 b5e600 101 API calls 76983->77068 76989 b811a8 GetLastError 76985->76989 76990 b8122f 76985->76990 77059 b835d0 76986->77059 76987 b8113a 77069 b6e5e0 73 API calls 76987->77069 77070 b616c0 75 API calls 76989->77070 76990->76937 76993 b8114f 76993->76937 76994 b811bf 77071 b5e600 101 API calls 76994->77071 76996 b811d2 77072 b6e5e0 73 API calls 76996->77072 76998 b811e7 76998->76937 76999->76940 77095 b81330 77000->77095 77019->76931 77020->76933 77022 a3a530 43 API calls 77021->77022 77023 b68bef 77022->77023 77024 b68c10 GetFileVersionInfoSizeW 77023->77024 77045 a3a700 43 API calls 4 library calls 77023->77045 77027 b68c35 77024->77027 77028 b68c28 77024->77028 77026 b68c0d 77026->77024 77027->76964 77028->77027 77029 b68c5a GetFileVersionInfoW 77028->77029 77046 a3a700 43 API calls 4 library calls 77028->77046 77029->77027 77031 b68c71 77029->77031 77033 a3ad40 51 API calls 77031->77033 77032 b68c57 77032->77029 77034 b68c76 77033->77034 77035 b68dc0 77034->77035 77038 b68c80 77034->77038 77036 a3aa00 2 API calls 77035->77036 77037 b68dca 77036->77037 77047 a39d60 73 API calls 77038->77047 77040 b68cd8 77042 b68cef 77040->77042 77048 a3a700 43 API calls 4 library calls 77040->77048 77042->77027 77049 a3a880 43 API calls 4 library calls 77042->77049 77044->76966 77045->77026 77046->77032 77047->77040 77048->77042 77049->77027 77055 ba3336 77050->77055 77051 ba338b SetFilePointer 77053 ba33b2 ReadFile 77051->77053 77054 ba33a4 GetLastError 77051->77054 77052 ba333d 77052->76982 77053->77052 77053->77055 77054->77052 77054->77053 77055->77051 77055->77052 77056 ba3466 SetFilePointer 77055->77056 77056->77052 77057 ba348e ReadFile 77056->77057 77057->77052 77058 ba34a5 77057->77058 77058->77052 77073 b84230 77059->77073 77061 b83617 77061->76990 77062 b835df 77062->77061 77063 a3aa00 2 API calls 77062->77063 77064 b83628 77063->77064 77065->76968 77066->76969 77067->76983 77068->76987 77069->76993 77070->76994 77071->76996 77072->76998 77074 b8431a 77073->77074 77075 b8427b SetFilePointer 77073->77075 77074->77062 77075->77074 77076 b8432e 77075->77076 77077 a3ad40 51 API calls 77076->77077 77078 b8434e 77077->77078 77079 b8465d 77078->77079 77082 b8438c ReadFile 77078->77082 77087 b84533 77078->77087 77080 a3aa00 2 API calls 77079->77080 77081 b84667 77080->77081 77083 a3aa00 2 API calls 77081->77083 77084 b845e7 GetLastError 77082->77084 77082->77087 77085 b84671 77083->77085 77092 b616c0 75 API calls 77084->77092 77085->77062 77087->77062 77088 b845f8 77093 b5e600 101 API calls 77088->77093 77090 b84611 77094 b6e5e0 73 API calls 77090->77094 77092->77088 77093->77090 77094->77079 77096 b813dd 77095->77096 77103 b83430 RtlAllocateHeap RaiseException 77096->77103 77098 b813e4 77099 a3ad40 51 API calls 77098->77099 77100 b814b4 77099->77100 77101 a3aa00 2 API calls 77100->77101 77102 b8150d 77101->77102 77103->77098 77541 b78740 77727 b785b0 77541->77727 77543 b78793 77935 b9da70 GetUserNameW 77543->77935 77545 b787a2 77546 a38300 42 API calls 77545->77546 77547 b787f9 77546->77547 77548 b78876 77547->77548 77550 c1ee76 3 API calls 77547->77550 77549 a37830 42 API calls 77548->77549 77562 b78885 77549->77562 77551 b7881c 77550->77551 77551->77548 77553 a38300 42 API calls 77551->77553 77555 b7885b 77553->77555 78382 c1ede5 44 API calls 77555->78382 77557 a38960 41 API calls 77561 b7896a 77557->77561 77558 b78865 78383 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 77558->78383 77560 a38960 41 API calls 77564 b789b2 77560->77564 77565 a38960 41 API calls 77561->77565 78025 b7f810 77562->78025 77563 a38960 41 API calls 77566 b789fa 77563->77566 77567 a38960 41 API calls 77564->77567 77568 b78976 77565->77568 77569 b78a2e std::_Throw_Cpp_error 77566->77569 77573 b78b01 77566->77573 77570 b789be 77567->77570 77572 a38960 41 API calls 77568->77572 77571 a38960 41 API calls 77569->77571 77574 a38960 41 API calls 77570->77574 77575 b78a57 GetCurrentProcess OpenProcessToken 77571->77575 77576 b78982 77572->77576 77577 c23d8f std::_Throw_Cpp_error 41 API calls 77573->77577 77578 b789ca 77574->77578 77579 b78a7f GetTokenInformation 77575->77579 77580 b78a7b 77575->77580 77581 a38960 41 API calls 77576->77581 77582 b78b06 77577->77582 77583 a38960 41 API calls 77578->77583 77584 b78ab2 CloseHandle 77579->77584 77585 b78aaa 77579->77585 77590 c1ea25 _ValidateLocalCookies 5 API calls 77580->77590 77586 b7898d std::_Throw_Cpp_error 77581->77586 78046 b6be70 77582->78046 77588 b789d5 std::_Throw_Cpp_error 77583->77588 77584->77580 77585->77584 77586->77560 77586->77588 77588->77563 77589 b78b4f 77592 b78e36 77589->77592 77594 a3ad40 51 API calls 77589->77594 77591 b78afa 77590->77591 77593 c1ea25 _ValidateLocalCookies 5 API calls 77592->77593 77595 b78ef1 77593->77595 77596 b78b5c 77594->77596 77597 b78ef5 77596->77597 77601 b78b94 77596->77601 77602 b78b89 77596->77602 77598 a3aa00 2 API calls 77597->77598 77599 b78eff 77598->77599 77600 a3aa00 2 API calls 77599->77600 77604 b78f09 77600->77604 78384 a3a880 43 API calls 4 library calls 77601->78384 77605 a3a2f0 52 API calls 77602->77605 78069 b9ea10 77604->78069 77611 b78b92 77605->77611 77608 b78ff9 77609 a3ad40 51 API calls 77610 b78f69 77609->77610 77612 b78f73 77610->77612 77613 b79009 77610->77613 77611->77592 77614 a3a530 43 API calls 77611->77614 77617 a52380 118 API calls 77612->77617 77615 a3aa00 2 API calls 77613->77615 77622 b78c20 77614->77622 77616 b79013 77615->77616 77619 a3a2f0 52 API calls 77616->77619 77621 b78f94 77617->77621 77620 b7906f 77619->77620 77624 a3a2f0 52 API calls 77620->77624 77629 a52380 118 API calls 77621->77629 77622->77592 78385 b7ae80 596 API calls 77622->78385 77626 b7907f 77624->77626 77628 a3a530 43 API calls 77626->77628 77630 b7908d 77628->77630 77631 b78fc9 77629->77631 77671 b7915d 77630->77671 78387 b63760 26 API calls 77630->78387 78386 b92ba0 210 API calls 77631->78386 77635 b78fd7 77635->77608 77636 a3ad40 51 API calls 77648 b79168 77636->77648 77641 b79678 77643 a3aa00 2 API calls 77641->77643 77646 b79682 77643->77646 77648->77641 77649 b7919a 77648->77649 77650 a52c50 43 API calls 77648->77650 77651 b791a7 77649->77651 77652 b792ee 77649->77652 77650->77649 78433 b94470 224 API calls _ValidateLocalCookies 77651->78433 78083 b79b70 77652->78083 77653 b790af 78388 b593b0 43 API calls 2 library calls 77653->78388 77657 b7930f 77660 a3ad40 51 API calls 77657->77660 77658 b791ae 77662 b791b6 77658->77662 77663 b79295 77658->77663 77659 b7913e 77670 b7914e 77659->77670 77659->77671 77664 b79314 77660->77664 77665 a3ad40 51 API calls 77662->77665 77663->77652 78437 b83430 RtlAllocateHeap RaiseException 77663->78437 77664->77641 77666 b7931e 77664->77666 77668 b791bb 77665->77668 77668->77641 78434 b6e5e0 73 API calls 77668->78434 78389 b79690 77670->78389 77671->77636 77672 b792a8 77672->77652 77676 b792ad 77672->77676 78438 b7c230 596 API calls _wcsrchr 77676->78438 77680 b792c3 77687 a52c50 43 API calls 77680->77687 77722 b79272 77680->77722 77684 b791e7 77689 b7924a 77684->77689 77697 a3ad40 51 API calls 77684->77697 77695 b792de 77687->77695 77688 c1ea25 _ValidateLocalCookies 5 API calls 77696 b79672 77688->77696 78436 b6e190 214 API calls 77689->78436 78439 b7ce60 77695->78439 77703 b791fb 77697->77703 77703->77641 77711 b79205 77703->77711 77709 b79239 78435 b92ba0 210 API calls 77709->78435 77711->77709 77711->77711 77716 a52380 118 API calls 77711->77716 77716->77709 77719 b79156 77719->77688 77722->77719 77728 a3ad40 51 API calls 77727->77728 77729 b785ea 77728->77729 77730 b7872e 77729->77730 78482 b91990 54 API calls 77729->78482 77731 a3aa00 2 API calls 77730->77731 77732 b78738 77731->77732 77734 b785b0 588 API calls 77732->77734 77738 b78793 77734->77738 77735 b78615 77736 b78633 GetTickCount 77735->77736 77737 b7862b 77735->77737 78483 c1dfe5 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __Xtime_get_ticks 77736->78483 77737->77736 77739 b9da70 62 API calls 77738->77739 77741 b787a2 77739->77741 77743 a38300 42 API calls 77741->77743 77742 b78640 77744 a3ad40 51 API calls 77742->77744 77745 b787f9 77743->77745 77746 b78660 77744->77746 77747 b78876 77745->77747 77749 c1ee76 3 API calls 77745->77749 77746->77730 77753 b78668 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 77746->77753 77748 a37830 42 API calls 77747->77748 77766 b78885 77748->77766 77750 b7881c 77749->77750 77750->77747 77752 a38300 42 API calls 77750->77752 77751 b7f810 42 API calls 77754 b78939 77751->77754 77755 b7885b 77752->77755 78484 a39d60 73 API calls 77753->78484 77760 a38960 41 API calls 77754->77760 77794 b7898d std::_Throw_Cpp_error 77754->77794 78487 c1ede5 44 API calls 77755->78487 77758 b7869a 78485 b91990 54 API calls 77758->78485 77765 b7896a 77760->77765 77761 b78865 78488 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 77761->78488 77763 b786ab 78486 b91ad0 129 API calls 77763->78486 77764 a38960 41 API calls 77769 b789b2 77764->77769 77770 a38960 41 API calls 77765->77770 77766->77751 77767 a38960 41 API calls 77771 b789fa 77767->77771 77773 a38960 41 API calls 77769->77773 77774 b78976 77770->77774 77775 b78a2e std::_Throw_Cpp_error 77771->77775 77780 b78b01 77771->77780 77772 b786b9 77776 a3a530 43 API calls 77772->77776 77777 b789be 77773->77777 77779 a38960 41 API calls 77774->77779 77778 a38960 41 API calls 77775->77778 77781 b786c8 77776->77781 77782 a38960 41 API calls 77777->77782 77783 b78a57 GetCurrentProcess OpenProcessToken 77778->77783 77784 b78982 77779->77784 77785 c23d8f std::_Throw_Cpp_error 41 API calls 77780->77785 77781->77543 77786 b789ca 77782->77786 77787 b78a7f GetTokenInformation 77783->77787 77788 b78a7b 77783->77788 77789 a38960 41 API calls 77784->77789 77790 b78b06 77785->77790 77791 a38960 41 API calls 77786->77791 77792 b78ab2 CloseHandle 77787->77792 77793 b78aaa 77787->77793 77798 c1ea25 _ValidateLocalCookies 5 API calls 77788->77798 77789->77794 77795 b6be70 62 API calls 77790->77795 77796 b789d5 std::_Throw_Cpp_error 77791->77796 77792->77788 77793->77792 77794->77764 77794->77796 77797 b78b4f 77795->77797 77796->77767 77801 a3ad40 51 API calls 77797->77801 77922 b78e36 77797->77922 77799 b78afa 77798->77799 77799->77543 77800 c1ea25 _ValidateLocalCookies 5 API calls 77802 b78ef1 77800->77802 77803 b78b5c 77801->77803 77802->77543 77804 b78ef5 77803->77804 77808 b78b94 77803->77808 77809 b78b89 77803->77809 77805 a3aa00 2 API calls 77804->77805 77806 b78eff 77805->77806 77807 a3aa00 2 API calls 77806->77807 77811 b78f09 77807->77811 78489 a3a880 43 API calls 4 library calls 77808->78489 77812 a3a2f0 52 API calls 77809->77812 77813 b9ea10 53 API calls 77811->77813 77818 b78b92 77812->77818 77814 b78f4e 77813->77814 77815 b78ff9 77814->77815 77816 a3ad40 51 API calls 77814->77816 77815->77543 77817 b78f69 77816->77817 77819 b78f73 77817->77819 77820 b79009 77817->77820 77821 a3a530 43 API calls 77818->77821 77818->77922 77824 a52380 118 API calls 77819->77824 77822 a3aa00 2 API calls 77820->77822 77829 b78c20 77821->77829 77823 b79013 77822->77823 77826 a3a2f0 52 API calls 77823->77826 77828 b78f94 77824->77828 77827 b7906f 77826->77827 77831 a3a2f0 52 API calls 77827->77831 77836 a52380 118 API calls 77828->77836 77829->77922 78490 b7ae80 596 API calls 77829->78490 77833 b7907f 77831->77833 77835 a3a530 43 API calls 77833->77835 77837 b7908d 77835->77837 77838 b78fc9 77836->77838 77839 b7915d 77837->77839 78492 b63760 26 API calls 77837->78492 78491 b92ba0 210 API calls 77838->78491 77845 a3ad40 51 API calls 77839->77845 77844 b78fd7 77844->77815 77856 b79168 77845->77856 77850 b79678 77852 a3aa00 2 API calls 77850->77852 77855 b79682 77852->77855 77856->77850 77857 b7919a 77856->77857 77858 a52c50 43 API calls 77856->77858 77859 b791a7 77857->77859 77860 b792ee 77857->77860 77858->77857 78494 b94470 224 API calls _ValidateLocalCookies 77859->78494 77862 b79b70 407 API calls 77860->77862 77861 b790af 78493 b593b0 43 API calls 2 library calls 77861->78493 77865 b7930f 77862->77865 77868 a3ad40 51 API calls 77865->77868 77866 b791ae 77870 b791b6 77866->77870 77871 b79295 77866->77871 77867 b7913e 77867->77839 77878 b7914e 77867->77878 77872 b79314 77868->77872 77873 a3ad40 51 API calls 77870->77873 77871->77860 78498 b83430 RtlAllocateHeap RaiseException 77871->78498 77872->77850 77874 b7931e 77872->77874 77876 b791bb 77873->77876 77884 b81510 245 API calls 77874->77884 77876->77850 78495 b6e5e0 73 API calls 77876->78495 77882 b79690 369 API calls 77878->77882 77879 b792a8 77879->77860 77883 b792ad 77879->77883 77927 b79156 77882->77927 78499 b7c230 596 API calls _wcsrchr 77883->78499 77901 b79341 77884->77901 77887 b792c3 77894 a52c50 43 API calls 77887->77894 77930 b79272 77887->77930 77890 b793f7 77899 b79434 77890->77899 77900 b794b3 77890->77900 77891 b791e7 77896 b7924a 77891->77896 77904 a3ad40 51 API calls 77891->77904 77893 b7937b CreateEventW 77897 b79396 77893->77897 77898 b793ae CreateThread 77893->77898 77902 b792de 77894->77902 77895 c1ea25 _ValidateLocalCookies 5 API calls 77903 b79672 77895->77903 78497 b6e190 214 API calls 77896->78497 77897->77898 77906 b793d1 77898->77906 77907 b793e9 WaitForSingleObject 77898->77907 78503 b79eb0 77898->78503 77911 a3a530 43 API calls 77899->77911 77908 a45fb0 101 API calls 77900->77908 77901->77890 77901->77893 77909 b7ce60 275 API calls 77902->77909 77903->77543 77910 b791fb 77904->77910 77906->77907 77907->77890 77914 b794c3 77908->77914 77909->77930 77910->77850 77918 b79205 77910->77918 77912 b7944d 77911->77912 78500 b7d150 214 API calls 77912->78500 77921 b79529 77914->77921 78501 b598c0 43 API calls 3 library calls 77914->78501 77916 b79239 78496 b92ba0 210 API calls 77916->78496 77918->77916 77918->77918 77924 a52380 118 API calls 77918->77924 77925 b7954c 77921->77925 77931 b7958e 77921->77931 77922->77800 77924->77916 78502 b7c230 596 API calls _wcsrchr 77925->78502 77927->77895 77929 b7955f 77929->77930 77929->77931 77930->77927 77932 a52c50 43 API calls 77931->77932 77933 b7959d 77932->77933 77934 b7ce60 275 API calls 77933->77934 77934->77927 77936 b9db0b GetLastError 77935->77936 77937 b9db55 GetEnvironmentVariableW 77935->77937 77936->77937 77940 b9db16 77936->77940 77938 b9dbd9 77937->77938 77939 b9db95 77937->77939 77942 b9dc0e 77938->77942 77946 a38300 42 API calls 77938->77946 77941 b9db9c 77939->77941 79080 a3f750 42 API calls 77939->79080 77943 b9db20 77940->77943 79079 a3f750 42 API calls 77940->79079 77944 b9dbc1 GetEnvironmentVariableW 77941->77944 77949 a381d0 42 API calls 77942->77949 77947 b9db43 GetUserNameW 77943->77947 77944->77938 77946->77942 77947->77937 77950 b9dc45 77949->77950 77951 a381d0 42 API calls 77950->77951 77954 b9dc5b std::_Throw_Cpp_error 77951->77954 77952 b9dcdc std::_Throw_Cpp_error 77955 c1ea25 _ValidateLocalCookies 5 API calls 77952->77955 77953 b9dd1a 77957 c23d8f std::_Throw_Cpp_error 41 API calls 77953->77957 77954->77952 77954->77953 77956 b9dd13 77955->77956 77956->77545 77958 b9dd1f 77957->77958 78992 b9e1d0 77958->78992 77963 a38960 41 API calls 77964 b9dd9c 77963->77964 77965 b9ddc9 RegDeleteValueW 77964->77965 79047 b47e60 77964->79047 77968 a38960 41 API calls 77965->77968 77969 b9dded 77968->77969 77970 a38960 41 API calls 77969->77970 77971 b9ddf9 77970->77971 77972 b9de15 77971->77972 77973 b9de07 RegCloseKey 77971->77973 77974 a38300 42 API calls 77972->77974 77973->77972 77975 b9de47 77974->77975 77976 b5bc60 46 API calls 77975->77976 77977 b9de69 77976->77977 77978 b9deb5 std::_Throw_Cpp_error 77977->77978 77981 b9e1bb 77977->77981 77979 b9df10 77978->77979 77982 b47e60 4 API calls 77978->77982 79058 b9e380 77979->79058 77984 c23d8f std::_Throw_Cpp_error 41 API calls 77981->77984 77982->77979 77983 b9df1a 77985 b5bc60 46 API calls 77983->77985 77986 b9e1c0 77984->77986 77987 b9df33 RegQueryInfoKeyW 77985->77987 77988 c23d8f std::_Throw_Cpp_error 41 API calls 77986->77988 77989 b9dfaf 77987->77989 77990 b9df74 77987->77990 77991 b9e1c5 77988->77991 77993 a38960 41 API calls 77989->77993 77992 a38960 41 API calls 77990->77992 77994 b9df80 77992->77994 77995 b9dfbb 77993->77995 77997 a38960 41 API calls 77994->77997 77996 a38960 41 API calls 77995->77996 77998 b9dfc7 RegDeleteKeyW 77996->77998 77999 b9df8c 77997->77999 77998->77999 78001 a38960 41 API calls 77999->78001 78002 b9e009 78001->78002 78003 a38960 41 API calls 78002->78003 78004 b9e01b 78003->78004 78005 a38960 41 API calls 78004->78005 78006 b9e02a 78005->78006 78007 b9e04e 78006->78007 78008 b9e041 RegCloseKey 78006->78008 78009 a38300 42 API calls 78007->78009 78008->78007 78010 b9e07c 78009->78010 78011 b5bc60 46 API calls 78010->78011 78012 b9e09b 78011->78012 78012->77986 78013 b9e0cf std::_Throw_Cpp_error 78012->78013 78014 b9e12f RegDeleteValueW 78013->78014 78015 b47e60 4 API calls 78013->78015 78017 a38960 41 API calls 78014->78017 78015->78014 78018 b9e160 78017->78018 78019 a38960 41 API calls 78018->78019 78020 b9e16f 78019->78020 78021 b9e18d 78020->78021 78022 b9e180 RegCloseKey 78020->78022 78023 c1ea25 _ValidateLocalCookies 5 API calls 78021->78023 78022->78021 78024 b9e1b4 78023->78024 78024->77545 78026 c1ea64 std::_Facet_Register 3 API calls 78025->78026 78027 b7f876 78026->78027 78028 a38300 42 API calls 78027->78028 78029 b7f8b9 78028->78029 78030 a38300 42 API calls 78029->78030 78031 b7f8fc 78030->78031 78032 a37830 42 API calls 78031->78032 78033 b7f917 78032->78033 78034 a37830 42 API calls 78033->78034 78035 b7f92a 78034->78035 78036 a37830 42 API calls 78035->78036 78037 b7f93a 78036->78037 78038 a37830 42 API calls 78037->78038 78040 b7f949 std::_Throw_Cpp_error 78038->78040 78039 b7f9f9 std::_Throw_Cpp_error 78041 c1ea25 _ValidateLocalCookies 5 API calls 78039->78041 78040->78039 78042 b7fa37 78040->78042 78043 b78939 78041->78043 78044 c23d8f std::_Throw_Cpp_error 41 API calls 78042->78044 78043->77557 78043->77586 78045 b7fa3c 78044->78045 78047 a3ad40 51 API calls 78046->78047 78048 b6be9d 78047->78048 78049 b6bea7 78048->78049 78050 b6bf53 78048->78050 78054 b6bed3 78049->78054 78055 b6bec8 78049->78055 78051 a3aa00 2 API calls 78050->78051 78052 b6bf5d 78051->78052 78053 a3ad40 51 API calls 78052->78053 78056 b6bf8d 78053->78056 79112 a3a880 43 API calls 4 library calls 78054->79112 78057 a3a2f0 52 API calls 78055->78057 78059 b6bf97 78056->78059 78060 b6c043 78056->78060 78061 b6bed1 78057->78061 78064 b6bfc3 78059->78064 78065 b6bfb8 78059->78065 78062 a3aa00 2 API calls 78060->78062 78061->77589 78063 b6c04d 78062->78063 79113 a3a880 43 API calls 4 library calls 78064->79113 78066 a3a2f0 52 API calls 78065->78066 78068 b6bfc1 78066->78068 78068->77589 78070 a3ad40 51 API calls 78069->78070 78076 b9ea45 ___crtLCMapStringW 78070->78076 78071 b9ebf9 78072 a3aa00 2 API calls 78071->78072 78073 b9ec03 78072->78073 78074 a3aa00 2 API calls 78073->78074 78075 b9ec0d 78074->78075 78076->78071 78076->78073 78077 b78f4e 78076->78077 78078 a3ad40 51 API calls 78076->78078 78079 a3a810 43 API calls 78076->78079 78080 a45b20 2 API calls 78076->78080 78081 b9eb92 78076->78081 78077->77608 78077->77609 78078->78076 78079->78076 78080->78076 78081->78077 78082 a52c50 43 API calls 78081->78082 78082->78077 79114 b6ba70 78083->79114 78085 b79ba5 78086 a3ad40 51 API calls 78085->78086 78087 b79bc3 78086->78087 78088 b79e99 78087->78088 78091 b91a80 2 API calls 78087->78091 78089 a3aa00 2 API calls 78088->78089 78090 b79ea3 78089->78090 78092 b9f0c0 53 API calls 78090->78092 78093 b79be9 78091->78093 78094 b79ef1 78092->78094 78095 b79bf9 78093->78095 78097 a52c50 43 API calls 78093->78097 78096 a3ad40 51 API calls 78094->78096 78098 a3ad40 51 API calls 78095->78098 78099 b79efd 78096->78099 78097->78095 78103 b79c01 78098->78103 78100 b7a7fe 78099->78100 78106 b79f2d 78099->78106 78107 b79f38 78099->78107 78101 a3aa00 2 API calls 78100->78101 78102 b7a808 78101->78102 78105 c23d8f std::_Throw_Cpp_error 41 API calls 78102->78105 78103->78088 78104 b79e26 78103->78104 78108 b79df9 78103->78108 78116 a3ad40 51 API calls 78103->78116 79146 b80060 78104->79146 78110 b7a80d 78105->78110 78111 a3a2f0 52 API calls 78106->78111 79150 a3a880 43 API calls 4 library calls 78107->79150 79145 b89440 79 API calls std::_Facet_Register 78108->79145 78114 c23d8f std::_Throw_Cpp_error 41 API calls 78110->78114 78124 b79f36 78111->78124 78113 b79e3c 78117 a52c50 43 API calls 78113->78117 78118 b7a812 78114->78118 78120 b79c77 78116->78120 78121 b79e4b 78117->78121 78122 a3aa00 2 API calls 78118->78122 78119 b79e08 78123 a3a2f0 52 API calls 78119->78123 78120->78088 78133 a3ad40 51 API calls 78120->78133 78121->77657 78123->78104 78125 b79fbe 78124->78125 78127 b79f7b WideCharToMultiByte 78124->78127 78128 a3ad40 51 API calls 78125->78128 78127->78125 78130 b79f94 78127->78130 78131 b79fc3 78128->78131 78135 b79f9a WideCharToMultiByte 78130->78135 78131->78100 78141 a70b90 54 API calls 78131->78141 78136 b79c9b 78133->78136 78135->78125 78136->78088 78151 b79ca3 78136->78151 78152 b79cf1 78151->78152 78156 a52c50 43 API calls 78151->78156 78180 b79d10 78151->78180 79126 a39d60 73 API calls 78152->79126 78155 a52c50 43 API calls 78159 b79d40 GetActiveWindow 78155->78159 78157 b79cea 78156->78157 78160 b68bb0 75 API calls 78157->78160 78166 b79d65 78159->78166 78167 b79d4f 78159->78167 78160->78152 79127 c1e5d5 GetProcessHeap HeapAlloc 78167->79127 78180->78155 78382->77558 78383->77548 78384->77611 78386->77635 78387->77653 78388->77659 78390 b79707 78389->78390 78390->78390 78391 a38300 42 API calls 78390->78391 78392 b79723 78391->78392 78393 b797a6 78392->78393 78394 b797c1 78392->78394 78397 b797bb 78393->78397 79214 b75af0 135 API calls 2 library calls 78393->79214 79215 b89050 78394->79215 78400 a3ad40 51 API calls 78397->78400 78401 b7980b 78400->78401 78402 b79815 78401->78402 78403 b79a4c 78401->78403 78408 b79832 78402->78408 78409 b79840 78402->78409 78404 a3aa00 2 API calls 78403->78404 78405 b79a56 78404->78405 78406 c23d8f std::_Throw_Cpp_error 41 API calls 78405->78406 78407 b79a5b 78406->78407 78411 a38960 41 API calls 78407->78411 78412 a3a2f0 52 API calls 78408->78412 78409->78409 79237 a3a880 43 API calls 4 library calls 78409->79237 78414 b79a95 78411->78414 78413 b7983e 78412->78413 78415 a3a530 43 API calls 78413->78415 78414->77719 78416 b7988e 78415->78416 78417 a3a530 43 API calls 78416->78417 78418 b798af 78417->78418 78419 a3a530 43 API calls 78418->78419 78420 b798d0 78419->78420 78421 b79917 78420->78421 78422 b79932 78420->78422 78427 b7992c 78421->78427 79238 b76280 305 API calls 2 library calls 78421->79238 78424 b89050 122 API calls 78422->78424 78425 b79955 78424->78425 78426 b89330 11 API calls 78425->78426 78426->78427 78428 a38960 41 API calls 78427->78428 78429 b799e0 78428->78429 78429->78405 78430 b79a13 std::_Throw_Cpp_error 78429->78430 78431 c1ea25 _ValidateLocalCookies 5 API calls 78430->78431 78432 b79a48 78431->78432 78432->77719 78433->77658 78434->77684 78435->77689 78436->77722 78437->77672 78438->77680 78440 b80060 2 API calls 78439->78440 78441 b7ce95 78440->78441 78442 a3ad40 51 API calls 78441->78442 78443 b7ce9a 78442->78443 78444 b7d13e 78443->78444 78447 b7cec5 78443->78447 78448 b7ced0 78443->78448 78445 a3aa00 2 API calls 78444->78445 78446 b7d148 78445->78446 78450 a3a2f0 52 API calls 78447->78450 79285 a3a880 43 API calls 4 library calls 78448->79285 78451 b7cece 78450->78451 78452 b73260 222 API calls 78451->78452 78453 b7cef0 78452->78453 78454 b7cfbf 78453->78454 78455 a3ad40 51 API calls 78453->78455 78463 b7cf2d 78453->78463 79287 b5fa40 7 API calls 78454->79287 78457 b7cf61 78455->78457 78457->78444 78462 a52380 118 API calls 78457->78462 78458 b7cff2 78459 b7d043 78458->78459 78460 a3ad40 51 API calls 78458->78460 78464 a3ad40 51 API calls 78459->78464 78480 b7d0b1 78459->78480 78461 b7d005 78460->78461 78461->78444 78465 b7cf89 78462->78465 78463->77722 78466 b7d075 78464->78466 78467 b7cfb1 78465->78467 78471 b7cfa2 78465->78471 78466->78444 79286 b92ba0 210 API calls 78467->79286 78473 a52380 118 API calls 78471->78473 78473->78467 78480->78463 78482->77735 78483->77742 78484->77758 78485->77763 78486->77772 78487->77761 78488->77747 78489->77818 78491->77844 78492->77861 78493->77867 78494->77866 78495->77891 78496->77896 78497->77930 78498->77879 78499->77887 78500->77927 78501->77921 78502->77929 78741 b9f0c0 78503->78741 78505 b79ef1 78506 a3ad40 51 API calls 78505->78506 78507 b79efd 78506->78507 78508 b7a7fe 78507->78508 78512 b79f2d 78507->78512 78513 b79f38 78507->78513 78509 a3aa00 2 API calls 78508->78509 78510 b7a808 78509->78510 78511 c23d8f std::_Throw_Cpp_error 41 API calls 78510->78511 78514 b7a80d 78511->78514 78515 a3a2f0 52 API calls 78512->78515 78822 a3a880 43 API calls 4 library calls 78513->78822 78517 c23d8f std::_Throw_Cpp_error 41 API calls 78514->78517 78520 b79f36 78515->78520 78518 b7a812 78517->78518 78519 a3aa00 2 API calls 78518->78519 78522 b7a81c 78519->78522 78521 b79fbe 78520->78521 78523 b79f7b WideCharToMultiByte 78520->78523 78524 a3ad40 51 API calls 78521->78524 78525 b7a8b3 78522->78525 78528 a3ad40 51 API calls 78522->78528 78523->78521 78526 b79f94 78523->78526 78527 b79fc3 78524->78527 78530 b79f9a WideCharToMultiByte 78526->78530 78527->78508 78747 a70b90 78527->78747 78529 b7a854 78528->78529 78531 b7a8c6 78529->78531 78532 b7a85a 78529->78532 78530->78521 78533 a3aa00 2 API calls 78531->78533 78536 a52380 118 API calls 78532->78536 78534 b7a8d0 78533->78534 78785 b91a80 78534->78785 78539 b7a87b 78536->78539 78862 b5d7a0 129 API calls 78539->78862 78541 b79ffd 78542 a3ad40 51 API calls 78541->78542 78557 b7a006 78542->78557 78545 b7a886 78863 b92ba0 210 API calls 78545->78863 78546 a3ad40 51 API calls 78564 b7a93f 78546->78564 78547 b7ad68 78550 b7ae2a 78547->78550 78555 a3ad40 51 API calls 78547->78555 78549 b7a891 78549->78525 78790 b880f0 78550->78790 78551 b7ae57 78554 a3aa00 2 API calls 78551->78554 78560 b7ae61 78554->78560 78561 b7ad7d 78555->78561 78556 b7a047 78824 b45f60 78556->78824 78557->78508 78557->78556 78566 b7a036 78557->78566 78558 b7ae32 78567 c1ea25 _ValidateLocalCookies 5 API calls 78558->78567 78559 b7ab77 78565 a3ad40 51 API calls 78559->78565 78568 a3aa00 2 API calls 78560->78568 78562 b7ad87 78561->78562 78563 b7ae75 78561->78563 78584 a52380 118 API calls 78562->78584 78577 a3aa00 2 API calls 78563->78577 78564->78551 78570 b7a967 78564->78570 78571 b7a975 78564->78571 78574 b7ab86 78565->78574 78572 a3a2f0 52 API calls 78566->78572 78573 b7ae4f 78567->78573 78576 b7ae6b 78568->78576 78579 a3a2f0 52 API calls 78570->78579 78864 a3a880 43 API calls 4 library calls 78571->78864 78575 b7a045 78572->78575 78574->78551 78580 b7ab90 78574->78580 78583 b59750 122 API calls 78575->78583 78582 a3aa00 2 API calls 78576->78582 78578 b7ae7f 78577->78578 78590 b7a973 78579->78590 78589 a70b90 54 API calls 78580->78589 78582->78563 78585 b7a06f 78583->78585 78586 b7ada8 78584->78586 78763 b9f160 78585->78763 78910 b88c30 75 API calls 78586->78910 78592 b7aba8 78589->78592 78865 b88ac0 78590->78865 78591 b7adb7 78594 b7addf 78591->78594 78600 b7add1 78591->78600 78595 b7abb5 78592->78595 78905 b46730 43 API calls 5 library calls 78592->78905 78911 b92ba0 210 API calls 78594->78911 78599 c28829 ___std_exception_destroy 14 API calls 78595->78599 78624 b7abc9 78595->78624 78596 b7a9c3 78602 b7a9d5 78596->78602 78611 b7aa23 78596->78611 78599->78624 78604 a52380 118 API calls 78600->78604 78601 b7aded 78601->78550 78876 b88490 78 API calls 2 library calls 78602->78876 78603 b7a084 78607 b7a135 78603->78607 78608 b7a1bb 78603->78608 78604->78594 78606 b7acad 78606->78547 78631 b7acd6 78606->78631 78836 b87620 RtlAllocateHeap DeleteFileW CreateFileW CloseHandle RaiseException 78607->78836 78616 b7a1cd SetEvent 78608->78616 78609 a3ad40 51 API calls 78615 b7ac4e 78609->78615 78612 b7ab12 78611->78612 78614 a3ad40 51 API calls 78611->78614 78612->78547 78612->78558 78879 b7f610 78612->78879 78613 b7a143 78617 a3ad40 51 API calls 78613->78617 78618 b7aa4c 78614->78618 78615->78560 78621 b7ac58 78615->78621 78774 b9f740 78616->78774 78622 b7a148 78617->78622 78618->78551 78632 a52380 118 API calls 78618->78632 78620 b7a9de 78620->78611 78620->78612 78628 a52380 118 API calls 78621->78628 78622->78508 78625 b7a152 78622->78625 78623 b7a217 78626 b7a21f 78623->78626 78627 b7a7be 78623->78627 78624->78606 78624->78609 78837 b89440 79 API calls std::_Facet_Register 78625->78837 78838 b87620 RtlAllocateHeap DeleteFileW CreateFileW CloseHandle RaiseException 78626->78838 78858 ba0360 63 API calls 78627->78858 78635 b7ac76 78628->78635 78631->78558 78634 a3ad40 51 API calls 78631->78634 78638 b7aa74 78632->78638 78633 b7a22f 78640 a3ad40 51 API calls 78633->78640 78642 b7ad01 78634->78642 78906 b5d7a0 129 API calls 78635->78906 78636 b7a7cd 78859 b9f260 78636->78859 78645 a3ad40 51 API calls 78638->78645 78658 b7a234 78640->78658 78642->78576 78646 b7ad0b 78642->78646 78643 b7a7df 78648 c1ea25 _ValidateLocalCookies 5 API calls 78643->78648 78644 b7a177 78649 b81510 245 API calls 78644->78649 78650 b7aa79 78645->78650 78655 a52380 118 API calls 78646->78655 78647 b7ac7f 78907 b92ba0 210 API calls 78647->78907 78653 b7a7f8 78648->78653 78654 b7a187 SetEvent 78649->78654 78650->78551 78877 a39d60 73 API calls 78650->78877 78652 b7ac8a 78652->78606 78654->78636 78656 b7a1ae 78654->78656 78657 b7ad2c 78655->78657 78656->78636 78908 b5d7a0 129 API calls 78657->78908 78658->78508 78659 b7a272 78658->78659 78662 a52c50 43 API calls 78658->78662 78663 b7a282 78659->78663 78664 b7a70e 78659->78664 78662->78659 78839 b9f3f0 54 API calls ___crtLCMapStringW 78663->78839 78666 a3ad40 51 API calls 78664->78666 78665 b7ad35 78909 b92ba0 210 API calls 78665->78909 78671 b7a713 78666->78671 78667 b7aaa3 78672 b7aacb 78667->78672 78677 b7aabd 78667->78677 78669 b7a299 78840 b9f300 54 API calls 78669->78840 78671->78508 78675 b7a71d 78671->78675 78878 b92ba0 210 API calls 78672->78878 78674 b7ad40 78674->78558 78682 b81510 245 API calls 78675->78682 78679 a52380 118 API calls 78677->78679 78679->78672 78680 b7a2d8 78841 b9f3f0 54 API calls ___crtLCMapStringW 78680->78841 78681 b7aaf4 78681->78612 78740 b7a70c 78682->78740 78685 b7a784 78685->78627 78686 b7a30d 78687 a38300 42 API calls 78686->78687 78688 b7a36d 78687->78688 78689 a37830 42 API calls 78688->78689 78690 b7a392 78689->78690 78842 b4f7c0 53 API calls 2 library calls 78690->78842 78692 b7a3a1 78843 b50080 41 API calls 2 library calls 78692->78843 78694 b7a3b4 78844 b416c0 42 API calls 78694->78844 78696 b7a3c4 78697 a38960 41 API calls 78696->78697 78698 b7a3d0 78697->78698 78698->78510 78699 b7a404 std::_Throw_Cpp_error 78698->78699 78700 a38300 42 API calls 78699->78700 78701 b7a43e 78700->78701 78845 b07f00 53 API calls _ValidateLocalCookies 78701->78845 78703 b7a44e 78703->78514 78704 b7a482 std::_Throw_Cpp_error 78703->78704 78857 b9f3f0 54 API calls ___crtLCMapStringW 78740->78857 78742 a3ad40 51 API calls 78741->78742 78743 b9f0fc 78742->78743 78744 a3aa00 2 API calls 78743->78744 78746 b9f102 78743->78746 78745 b9f158 78744->78745 78746->78505 78748 a70ba4 78747->78748 78752 a70c42 78747->78752 78748->78752 78912 a3a0f0 10 API calls 78748->78912 78750 a70bb9 78751 a70bc3 FindResourceW 78750->78751 78750->78752 78751->78752 78753 a70bd7 78751->78753 78752->78541 78823 b46730 43 API calls 5 library calls 78752->78823 78913 a3a1b0 LoadResource LockResource SizeofResource 78753->78913 78755 a70be1 78755->78752 78756 a70bea WideCharToMultiByte 78755->78756 78757 a70c56 78756->78757 78758 a70c0a 78756->78758 78760 a3aa00 2 API calls 78757->78760 78759 a70c25 WideCharToMultiByte 78758->78759 78914 a70d10 43 API calls 78758->78914 78759->78752 78759->78757 78762 a70c60 78760->78762 78764 b9f18c 78763->78764 78765 b9f1a1 78763->78765 78764->78603 78766 a52c50 43 API calls 78765->78766 78767 b9f1b2 78766->78767 78915 b9fb30 78767->78915 78770 b9f1ca CreateNamedPipeW 78771 b9f1f2 78770->78771 78772 b9f1fb CreateFileW 78771->78772 78773 b9f216 78771->78773 78772->78773 78773->78603 78775 b9f770 78774->78775 78776 b9f786 78774->78776 78775->78623 78777 a3ad40 51 API calls 78776->78777 78778 b9f78b 78777->78778 78779 b9f872 78778->78779 78782 b9f795 78778->78782 78780 a3aa00 2 API calls 78779->78780 78781 b9f87c 78780->78781 78783 a52c50 43 API calls 78782->78783 78784 b9f7c4 78783->78784 78784->78623 78786 b91a8d 78785->78786 78788 b7a928 78785->78788 78787 a3aa00 2 API calls 78786->78787 78786->78788 78789 b91ac0 78787->78789 78788->78546 78788->78612 78791 b88ac0 54 API calls 78790->78791 78792 b88127 78791->78792 78793 b8812d 78792->78793 78794 b88141 78792->78794 78793->78558 78930 b886f0 213 API calls 78794->78930 78796 b8814c 78931 b88910 12 API calls _ValidateLocalCookies 78796->78931 78798 b88167 78799 b881e9 78798->78799 78800 a3ad40 51 API calls 78798->78800 78801 b882e2 78799->78801 78802 b88233 78799->78802 78804 b88181 78800->78804 78803 a3aa00 2 API calls 78801->78803 78810 b88248 78802->78810 78934 b882f0 53 API calls 78802->78934 78805 b882ec 78803->78805 78806 b882d8 78804->78806 78807 b8818b 78804->78807 78809 a3aa00 2 API calls 78806->78809 78812 a52380 118 API calls 78807->78812 78809->78801 78814 b88278 78810->78814 78935 b882f0 53 API calls 78810->78935 78813 b881a9 78812->78813 78932 b88c30 75 API calls 78813->78932 78816 b8828e 78814->78816 78817 c28829 ___std_exception_destroy 14 API calls 78814->78817 78816->78558 78817->78816 78818 b881db 78933 b92ba0 210 API calls 78818->78933 78820 b881b3 78820->78818 78821 a52380 118 API calls 78820->78821 78821->78818 78822->78520 78823->78541 78825 b45f6d MultiByteToWideChar 78824->78825 78826 b45fca 78824->78826 78825->78826 78830 b45f85 78825->78830 78937 a3a650 RtlAllocateHeap RaiseException 78826->78937 78828 b45fd1 78828->78575 78829 b45fa0 MultiByteToWideChar 78831 b45fb7 78829->78831 78832 b45fd9 78829->78832 78830->78829 78936 a3a810 43 API calls 78830->78936 78831->78575 78834 a3aa00 2 API calls 78832->78834 78835 b45fe3 78834->78835 78836->78613 78837->78644 78838->78633 78839->78669 78840->78680 78841->78686 78842->78692 78843->78694 78844->78696 78845->78703 78857->78685 78858->78636 78860 b9f298 CloseHandle 78859->78860 78861 b9f29f 78859->78861 78860->78861 78861->78643 78862->78545 78863->78549 78864->78590 78866 b88bbe 78865->78866 78867 b88afe EnumResourceLanguagesW 78865->78867 78866->78596 78874 b88b46 78867->78874 78875 b88b8d 78867->78875 78869 b88bec 78871 a3aa00 2 API calls 78869->78871 78870 b88b9c 78870->78866 78872 c28829 ___std_exception_destroy 14 API calls 78870->78872 78873 b88bf6 78871->78873 78872->78866 78873->78596 78874->78869 78874->78875 78939 b88d40 53 API calls 5 library calls 78875->78939 78876->78620 78877->78667 78878->78681 78880 b7f61d 78879->78880 78884 b7f625 78879->78884 78880->78559 78881 b7f796 78882 a3aa00 2 API calls 78881->78882 78901 b7f726 78882->78901 78883 a3aa00 2 API calls 78900 b7f747 __Getctype 78883->78900 78884->78881 78885 b7f68e 78884->78885 78886 b7f678 78884->78886 78889 b7f68c __Getctype 78884->78889 78888 c28829 ___std_exception_destroy 14 API calls 78885->78888 78886->78889 78890 b7f78c 78886->78890 78887 a3aa00 2 API calls 78904 b7f736 78887->78904 78888->78889 78891 b7f6ec GetLastError 78889->78891 78889->78901 78889->78904 78892 a3aa00 2 API calls 78890->78892 78893 b7f6fb 78891->78893 78891->78904 78892->78881 78893->78881 78898 b7f718 78893->78898 78895 b7f784 78895->78559 78896 b7f7c6 78954 b7fa50 78896->78954 78898->78900 78898->78901 78902 b7f738 78898->78902 78900->78887 78900->78904 78901->78883 78901->78904 78903 c28829 ___std_exception_destroy 14 API calls 78902->78903 78903->78904 78904->78895 78940 b7fe60 GetLastError 78904->78940 78905->78595 78906->78647 78907->78652 78908->78665 78909->78674 78910->78591 78911->78601 78912->78750 78913->78755 78914->78759 78916 a3ad40 51 API calls 78915->78916 78917 b9fb6a 78916->78917 78918 b9fbda 78917->78918 78919 b9fb70 78917->78919 78920 a3aa00 2 API calls 78918->78920 78922 b9fb9d 78919->78922 78923 b9fb92 78919->78923 78921 b9fbe4 78920->78921 78929 a3a880 43 API calls 4 library calls 78922->78929 78924 a3a2f0 52 API calls 78923->78924 78926 b9fb9b 78924->78926 78927 a52380 118 API calls 78926->78927 78928 b9f1bd 78927->78928 78928->78770 78928->78771 78929->78926 78930->78796 78931->78798 78932->78820 78933->78799 78936->78829 78937->78828 78939->78870 78941 b7fe6a 78940->78941 78942 a3aa00 2 API calls 78941->78942 78943 b7fe78 78942->78943 78944 b7fed6 78943->78944 78945 b7fe9e 78943->78945 78950 b7fedd 78943->78950 78947 b7ff14 DestroyWindow 78944->78947 78944->78950 78960 b62240 78945->78960 78947->78896 78948 b7fead 78965 b800d0 6 API calls 78948->78965 78950->78896 78955 b7f7f7 78954->78955 78959 b7fa58 78954->78959 78955->78559 78956 b7fa75 78957 c28829 ___std_exception_destroy 14 API calls 78956->78957 78957->78955 78959->78956 78991 b7faa0 14 API calls ___std_exception_destroy 78959->78991 78986 b61850 LoadLibraryW 78960->78986 78963 b61850 3 API calls 78964 b62270 SendMessageW SendMessageW 78963->78964 78964->78948 78966 b8016a SetWindowPos 78965->78966 78967 b80163 78965->78967 78968 c1ea25 _ValidateLocalCookies 5 API calls 78966->78968 78967->78966 78969 b7feb7 78968->78969 78970 aaef90 GetWindowLongW 78969->78970 78971 aaefe9 78970->78971 78972 aaeff7 GetWindow 78970->78972 78973 aaf005 GetWindowRect 78971->78973 78972->78973 78974 aaf017 78973->78974 78985 aaf062 SetWindowPos 78973->78985 78975 aaf01b GetWindowLongW 78974->78975 78976 aaf030 MonitorFromWindow 78974->78976 78975->78976 78978 aaf07a 78976->78978 78979 aaf040 GetMonitorInfoW 78976->78979 78982 c1ea25 _ValidateLocalCookies 5 API calls 78978->78982 78979->78978 78980 aaf056 78979->78980 78981 aaf06d GetWindowRect 78980->78981 78980->78985 78981->78985 78983 aaf14c 78982->78983 78983->78896 78985->78978 78987 b618ab GetProcAddress 78986->78987 78988 b618bb 78986->78988 78987->78988 78989 b6192e FreeLibrary 78988->78989 78990 b6193c 78988->78990 78989->78990 78990->78963 78991->78959 78993 b9e380 42 API calls 78992->78993 78994 b9e211 78993->78994 79081 b9e300 78994->79081 78997 a39e20 42 API calls 78998 b9e235 78997->78998 79084 a6d8c0 78998->79084 79000 b9e248 79001 a38960 41 API calls 79000->79001 79002 b9e276 79001->79002 79003 b9e2a6 std::_Throw_Cpp_error 79002->79003 79006 b9e2ec 79002->79006 79004 a38960 41 API calls 79003->79004 79005 b9e2cf 79004->79005 79007 c1ea25 _ValidateLocalCookies 5 API calls 79005->79007 79008 c23d8f std::_Throw_Cpp_error 41 API calls 79006->79008 79009 b9dd77 79007->79009 79010 b9e2f1 79008->79010 79011 b5bc60 79009->79011 79012 a37830 42 API calls 79011->79012 79013 b5bce9 79012->79013 79094 b5c390 79013->79094 79016 b5bd3a 79018 b5bf67 79016->79018 79019 b5bd94 std::_Throw_Cpp_error 79016->79019 79017 a38960 41 API calls 79017->79016 79024 c23d8f std::_Throw_Cpp_error 41 API calls 79018->79024 79020 b5bdcf 79019->79020 79021 b5bdeb 79019->79021 79023 b5be76 79019->79023 79109 a38240 42 API calls 79020->79109 79027 a37830 42 API calls 79021->79027 79022 b5bef5 RegOpenKeyExW 79025 b5bf0a 79022->79025 79023->79022 79029 b5beb1 GetModuleHandleW 79023->79029 79030 b5beef 79023->79030 79028 b5bf6c 79024->79028 79031 b5bf24 79025->79031 79034 b5bf17 RegCloseKey 79025->79034 79032 b5bdde 79027->79032 79029->79031 79033 b5bec0 GetProcAddress 79029->79033 79030->79022 79030->79031 79035 c1ea25 _ValidateLocalCookies 5 API calls 79031->79035 79110 a39d80 42 API calls std::_Throw_Cpp_error 79032->79110 79033->79031 79036 b5bed2 79033->79036 79034->79031 79038 b5bf5e 79035->79038 79036->79025 79038->77963 79039 b5be13 79040 a381d0 42 API calls 79039->79040 79041 b5be32 79040->79041 79042 a38960 41 API calls 79041->79042 79043 b5be3e 79042->79043 79044 b5be5a 79043->79044 79045 a38960 41 API calls 79043->79045 79044->79023 79046 a38960 41 API calls 79044->79046 79045->79044 79046->79023 79048 b47f02 RegCreateKeyExW 79047->79048 79049 b47e99 79047->79049 79052 b47efb 79048->79052 79050 b47ef5 79049->79050 79051 b47e9e GetModuleHandleW 79049->79051 79050->79048 79050->79052 79053 b47ec6 GetProcAddress 79051->79053 79054 b47ead 79051->79054 79055 b47f34 79052->79055 79057 b47f2b RegCloseKey 79052->79057 79053->79052 79056 b47ed6 79053->79056 79054->77965 79055->77965 79056->79052 79057->79055 79059 b9e3d2 79058->79059 79060 b9e407 79058->79060 79062 a38300 42 API calls 79059->79062 79111 a37f60 42 API calls std::_Throw_Cpp_error 79060->79111 79064 b9e3f6 79062->79064 79063 b9e414 79065 a39e20 42 API calls 79063->79065 79066 b9e49e 79064->79066 79067 a38960 41 API calls 79064->79067 79065->79064 79068 a38960 41 API calls 79066->79068 79071 b9e4bd 79066->79071 79067->79066 79068->79071 79069 c1ea25 _ValidateLocalCookies 5 API calls 79070 b9e533 79069->79070 79070->77983 79072 b9e53a 79071->79072 79073 b9e4fd std::_Throw_Cpp_error 79071->79073 79074 c23d8f std::_Throw_Cpp_error 41 API calls 79072->79074 79073->79069 79075 b9e53f 79074->79075 79076 b9e599 std::_Throw_Cpp_error 79075->79076 79077 c23d8f std::_Throw_Cpp_error 41 API calls 79075->79077 79076->77983 79078 b9e5ce 79077->79078 79079->77947 79080->77944 79082 a38300 42 API calls 79081->79082 79083 b9e222 79082->79083 79083->78997 79085 a6d906 79084->79085 79086 a6da62 79085->79086 79087 a6d9df 79085->79087 79091 a6d90b std::_Locinfo::_Locinfo_ctor 79085->79091 79093 a388b0 42 API calls std::_Throw_Cpp_error 79086->79093 79090 a38850 42 API calls 79087->79090 79092 a6da06 std::_Locinfo::_Locinfo_ctor 79090->79092 79091->79000 79092->79000 79095 b5c3f6 79094->79095 79096 b5c3de 79094->79096 79098 b5c413 79095->79098 79099 b5c3fe 79095->79099 79097 a38300 42 API calls 79096->79097 79102 b5bd26 79097->79102 79100 b5c430 79098->79100 79101 b5c41b 79098->79101 79103 a38300 42 API calls 79099->79103 79105 b5c44d 79100->79105 79106 b5c438 79100->79106 79104 a38300 42 API calls 79101->79104 79102->79016 79102->79017 79103->79102 79104->79102 79105->79102 79108 a38300 42 API calls 79105->79108 79107 a38300 42 API calls 79106->79107 79107->79102 79108->79102 79109->79032 79110->79039 79111->79063 79112->78061 79113->78068 79115 a3ad40 51 API calls 79114->79115 79116 b6ba9d 79115->79116 79117 b6baa7 79116->79117 79118 b6bb51 79116->79118 79121 b6bad3 79117->79121 79122 b6bac8 79117->79122 79119 a3aa00 2 API calls 79118->79119 79120 b6bb5b 79119->79120 79124 b45f60 45 API calls 79121->79124 79123 a3a2f0 52 API calls 79122->79123 79125 b6bad1 79123->79125 79124->79125 79125->78085 79126->78180 79145->78119 79147 b80069 GetCurrentThreadId 79146->79147 79149 b8008b 79146->79149 79148 b80077 DestroyWindow 79147->79148 79147->79149 79148->78113 79149->78113 79150->78124 79214->78397 79216 a3ad40 51 API calls 79215->79216 79217 b8907b 79216->79217 79218 b890e2 79217->79218 79220 b89081 79217->79220 79219 a3aa00 2 API calls 79218->79219 79221 b890ec 79219->79221 79222 a3a2f0 52 API calls 79220->79222 79223 b8909e 79222->79223 79239 b890f0 79223->79239 79226 b89330 CreateThread 79227 b893ba GetLastError 79226->79227 79228 b893c3 79226->79228 79283 ba5370 79226->79283 79227->79228 79276 b5f310 MsgWaitForMultipleObjectsEx 79228->79276 79230 b893ca 79231 b893df WaitForSingleObject 79230->79231 79232 b89424 79230->79232 79233 b8941b CloseHandle 79231->79233 79234 b893ef GetExitCodeThread 79231->79234 79232->78397 79233->79232 79234->79233 79235 b89407 79234->79235 79235->79233 79236 b89410 TerminateThread 79235->79236 79236->79233 79237->78413 79238->78427 79240 b797e6 79239->79240 79241 b89127 GetActiveWindow 79239->79241 79240->79226 79242 b8914f 79241->79242 79243 b89143 79241->79243 79245 b89172 79242->79245 79248 c1e5d5 24 API calls 79242->79248 79244 b800d0 12 API calls 79243->79244 79247 b8914a KiUserCallbackDispatcher 79244->79247 79246 c1e6d7 7 API calls 79245->79246 79249 b8917c 79246->79249 79247->79242 79250 b8915e 79248->79250 79251 b8930f 79249->79251 79252 b89187 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 79249->79252 79250->79245 79253 b89165 SetLastError 79250->79253 79275 a4a0b0 RaiseException 79251->79275 79255 b891f2 GetCurrentThreadId 79252->79255 79253->79255 79257 b891ff 79255->79257 79256 b8931b 79258 a3aa00 2 API calls 79256->79258 79261 b89225 79257->79261 79263 a52c50 43 API calls 79257->79263 79270 b89248 SetWindowTextW GetDlgItem SetWindowTextW 79257->79270 79260 b89325 79258->79260 79274 a39d60 73 API calls 79261->79274 79262 b8929b 79264 a3ad40 51 API calls 79262->79264 79265 b8921d 79263->79265 79266 b892a0 79264->79266 79267 b68bb0 75 API calls 79265->79267 79266->79256 79269 b892a6 79266->79269 79267->79261 79271 a3a2f0 52 API calls 79269->79271 79270->79240 79270->79262 79272 b892c1 79271->79272 79272->79240 79274->79270 79275->79256 79277 b5f337 79276->79277 79278 b5f3a1 79276->79278 79279 b5f355 PeekMessageW 79277->79279 79280 b5f3ab 79277->79280 79278->79230 79281 b5f37d TranslateMessage DispatchMessageW 79279->79281 79282 b5f38b MsgWaitForMultipleObjectsEx 79279->79282 79280->79230 79281->79282 79282->79277 79282->79278 79284 ba5381 79283->79284 79285->78451 79286->78454 79287->78458 79293 aaa220 79294 aaa269 ShowWindow 79293->79294 79295 aaa2b7 79293->79295 79323 aaa100 79294->79323 79297 aaa32a 79295->79297 79298 aaa2bc GetWindowLongW SetWindowLongW NtdllDefWindowProc_W SetWindowLongW 79295->79298 79299 aaa39f 79297->79299 79300 aaa331 GetWindowLongW SetWindowLongW NtdllDefWindowProc_W SetWindowLongW 79297->79300 79322 aaa3c1 79298->79322 79302 aaa3e7 79299->79302 79303 aaa3a4 79299->79303 79300->79322 79306 aaa4b7 79302->79306 79315 aaa3f2 79302->79315 79338 aa9e80 45 API calls 2 library calls 79303->79338 79304 c1ea25 _ValidateLocalCookies 5 API calls 79305 aaa3e1 79304->79305 79308 aaa568 79306->79308 79309 aaa504 GetWindowRect 79306->79309 79306->79322 79314 aaa5c0 79308->79314 79318 aaa5e6 79308->79318 79308->79322 79309->79322 79310 aaa290 79312 aaa29c ShowWindow 79310->79312 79313 aaa297 79310->79313 79312->79322 79313->79312 79339 aab050 6 API calls _ValidateLocalCookies 79314->79339 79317 aaa43e GetWindowLongW SetWindowLongW NtdllDefWindowProc_W SetWindowLongW 79315->79317 79315->79322 79317->79322 79319 aaa69a SendMessageW 79318->79319 79318->79322 79321 aaa738 79319->79321 79321->79322 79322->79304 79324 aaa13e 79323->79324 79325 aaa18f 79323->79325 79331 aaa148 79324->79331 79332 aaa15e 79324->79332 79326 aaa1ad 79325->79326 79327 aaa194 79325->79327 79329 c1ea64 std::_Facet_Register 3 API calls 79326->79329 79328 c1ea64 std::_Facet_Register 3 API calls 79327->79328 79330 aaa168 79328->79330 79336 aaa14f 79329->79336 79340 af0d40 79330->79340 79334 c1ea64 std::_Facet_Register 3 API calls 79331->79334 79333 c1ea64 std::_Facet_Register 3 API calls 79332->79333 79333->79330 79334->79336 79337 aa9e80 45 API calls 2 library calls 79336->79337 79337->79310 79338->79322 79339->79322 79341 a37830 42 API calls 79340->79341 79342 af0ddb 79341->79342 79409 b41ec0 79342->79409 79345 b41ec0 50 API calls 79346 af0e9b 79345->79346 79347 b41ec0 50 API calls 79346->79347 79348 af0ede 79347->79348 79349 b41ec0 50 API calls 79348->79349 79350 af0f21 79349->79350 79351 b41ec0 50 API calls 79350->79351 79352 af0f64 79351->79352 79353 b41ec0 50 API calls 79352->79353 79354 af0faa 79353->79354 79355 b41ec0 50 API calls 79354->79355 79356 af0ff0 79355->79356 79357 b41ec0 50 API calls 79356->79357 79358 af1036 79357->79358 79359 b41ec0 50 API calls 79358->79359 79360 af107c 79359->79360 79361 b41ec0 50 API calls 79360->79361 79362 af10c2 79361->79362 79363 b41ec0 50 API calls 79362->79363 79364 af1108 79363->79364 79365 b41ec0 50 API calls 79364->79365 79366 af114e 79365->79366 79367 b41ec0 50 API calls 79366->79367 79368 af1194 79367->79368 79369 b41ec0 50 API calls 79368->79369 79370 af11da 79369->79370 79371 b41ec0 50 API calls 79370->79371 79372 af1220 79371->79372 79373 b41ec0 50 API calls 79372->79373 79374 af1266 79373->79374 79375 b41ec0 50 API calls 79374->79375 79376 af12ac 79375->79376 79377 b41ec0 50 API calls 79376->79377 79378 af12f2 79377->79378 79379 b41ec0 50 API calls 79378->79379 79380 af1338 79379->79380 79381 b41ec0 50 API calls 79380->79381 79382 af137e 79381->79382 79383 b41ec0 50 API calls 79382->79383 79384 af13c4 79383->79384 79385 b41ec0 50 API calls 79384->79385 79386 af140a 79385->79386 79387 b41ec0 50 API calls 79386->79387 79388 af1450 79387->79388 79389 b41ec0 50 API calls 79388->79389 79390 af1496 79389->79390 79391 b41ec0 50 API calls 79390->79391 79392 af14dc 79391->79392 79393 b41ec0 50 API calls 79392->79393 79394 af1522 79393->79394 79395 b41ec0 50 API calls 79394->79395 79396 af1568 79395->79396 79397 b41ec0 50 API calls 79396->79397 79398 af15ae 79397->79398 79399 b41ec0 50 API calls 79398->79399 79400 af15f4 79399->79400 79401 b41ec0 50 API calls 79400->79401 79402 af163a 79401->79402 79403 b41ec0 50 API calls 79402->79403 79404 af1680 79403->79404 79405 b41ec0 50 API calls 79404->79405 79406 af16c6 79405->79406 79407 b41ec0 50 API calls 79406->79407 79408 af170c 79407->79408 79410 b41ef7 79409->79410 79411 af0e5b 79409->79411 79412 c1ee76 3 API calls 79410->79412 79411->79345 79413 b41f01 79412->79413 79413->79411 79417 c1ede5 44 API calls 79413->79417 79415 b41f23 79418 c1ee25 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 79415->79418 79417->79415 79418->79411 79419 c1eeda 79420 c1ea64 std::_Facet_Register 3 API calls 79419->79420 79421 c1ef0f 79420->79421 79422 c1b45e 79424 c1b399 79422->79424 79425 c1bea5 79424->79425 79451 c1bc03 79425->79451 79427 c1beb5 79428 c1bf12 79427->79428 79429 c1bf36 79427->79429 79460 c1be43 6 API calls 2 library calls 79428->79460 79432 c1bfae LoadLibraryExA 79429->79432 79434 c1c00f 79429->79434 79435 c1c021 79429->79435 79445 c1c0dd 79429->79445 79431 c1bf1d RaiseException 79446 c1c10b 79431->79446 79433 c1bfc1 GetLastError 79432->79433 79432->79434 79438 c1bfd4 79433->79438 79439 c1bfea 79433->79439 79434->79435 79437 c1c01a FreeLibrary 79434->79437 79436 c1c07f GetProcAddress 79435->79436 79435->79445 79441 c1c08f GetLastError 79436->79441 79436->79445 79437->79435 79438->79434 79438->79439 79461 c1be43 6 API calls 2 library calls 79439->79461 79443 c1c0a2 79441->79443 79442 c1bff5 RaiseException 79442->79446 79443->79445 79462 c1be43 6 API calls 2 library calls 79443->79462 79463 c1be43 6 API calls 2 library calls 79445->79463 79446->79424 79448 c1c0c3 RaiseException 79449 c1bc03 DloadAcquireSectionWriteAccess 6 API calls 79448->79449 79450 c1c0da 79449->79450 79450->79445 79452 c1bc35 79451->79452 79453 c1bc0f 79451->79453 79452->79427 79464 c1bcac GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 79453->79464 79455 c1bc14 79457 c1bc30 79455->79457 79465 c1bdd5 VirtualQuery GetSystemInfo VirtualProtect DloadProtectSection 79455->79465 79466 c1bc36 GetModuleHandleW GetProcAddress GetProcAddress 79457->79466 79459 c1be7e 79459->79427 79460->79431 79461->79442 79462->79448 79463->79446 79464->79455 79465->79457 79466->79459
                        APIs
                        • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?,SystemFolder,0000000C,?,?,?), ref: 00B73913
                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00B73A0E
                        • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsFolder,0000000D,?,?,?), ref: 00B73B06
                        • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsVolume,0000000D,?,?,?), ref: 00B73BE5
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,WindowsVolume,0000000D,?,?,?), ref: 00B73D21
                        • SHGetSpecialFolderLocation.SHELL32(00000000,?,WindowsVolume,0000000D,?,?,?), ref: 00B73E02
                        • LoadLibraryW.KERNEL32(shfolder.dll,?,?,?), ref: 00B73E8C
                        • GetProcAddress.KERNEL32(?,SHGetFolderPathW), ref: 00B73EBE
                        • SHGetPathFromIDListW.SHELL32(?,?), ref: 00B73F73
                        • SHGetMalloc.SHELL32(00000000), ref: 00B73F8C
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Directory$FolderPathWindows$AddressAllocateFileFromHeapLibraryListLoadLocationMallocModuleNameProcSpecialSystem
                        • String ID: ProgramFiles64Folder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
                        • API String ID: 2148820474-2142986682
                        • Opcode ID: 26fa077d620af648b1e25912862542300c211803482b8b6880509bb5815e5251
                        • Instruction ID: 7ba72289e9d95790f7fa2e1cf2c49c5149b592d0ef227d879fb272ea9e2f0e41
                        • Opcode Fuzzy Hash: 26fa077d620af648b1e25912862542300c211803482b8b6880509bb5815e5251
                        • Instruction Fuzzy Hash: F7321870A002158BDB24DF24CC95BBAB3F5EF51710F1482ECE52A9B291EB319F85EB51
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • GetTickCount.KERNEL32 ref: 00B78633
                        • __Xtime_get_ticks.LIBCPMT ref: 00B7863B
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B78685
                        • GetCurrentProcess.KERNEL32(00000008,?,2BB8795F), ref: 00B78A6A
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00B78A71
                        • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00B78AA0
                        • CloseHandle.KERNEL32(00000000), ref: 00B78AB5
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,00000000), ref: 00B79383
                        • CreateThread.KERNEL32(00000000,00000000,00B79EB0,?,00000000,?), ref: 00B793BE
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,?), ref: 00B793F1
                          • Part of subcall function 00B7C230: GetCurrentProcess.KERNEL32(?,2BB8795F,?), ref: 00B7C299
                          • Part of subcall function 00B7C230: IsWow64Process.KERNEL32(00000000), ref: 00B7C2A0
                          • Part of subcall function 00B7C230: _wcsrchr.LIBVCRUNTIME ref: 00B7C321
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Process$CreateCurrentHeapToken$AllocateCloseCountEventHandleInformationObjectOpenSingleThreadTickUnothrow_t@std@@@WaitWow64Xtime_get_ticks__ehfuncinfo$??2@_wcsrchr
                        • String ID: /uninstall$Maintenance mode:$VersionString$\/:*?"<>|$\\?\$false$true
                        • API String ID: 4099394082-1899154899
                        • Opcode ID: be0e97783649d9c3f320409c25dd1eaecefd078a48ab3c72d8eb184b1c38fcbc
                        • Instruction ID: 14fcaba7dbf26035e820515c0d05b051eabfc5f95597ea7cb8247b178abdc884
                        • Opcode Fuzzy Hash: be0e97783649d9c3f320409c25dd1eaecefd078a48ab3c72d8eb184b1c38fcbc
                        • Instruction Fuzzy Hash: 66B2D370900609DFDB10DFA8C849BAEBBF5FF45310F1482A9E429EB291DB74AE45CB50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 622 b9da70-b9db09 GetUserNameW 623 b9db0b-b9db14 GetLastError 622->623 624 b9db55-b9db93 GetEnvironmentVariableW 622->624 623->624 627 b9db16-b9db1e 623->627 625 b9dbd9-b9dc0c 624->625 626 b9db95-b9db9a 624->626 630 b9dc0e-b9dc21 625->630 631 b9dc23-b9dc2b call a38300 625->631 628 b9db9c-b9dbb0 626->628 629 b9dbb2-b9dbbc call a3f750 626->629 632 b9db20-b9db34 627->632 633 b9db36-b9db3e call a3f750 627->633 634 b9dbc1-b9dbd3 GetEnvironmentVariableW 628->634 629->634 636 b9dc30-b9dc65 call a381d0 * 2 630->636 631->636 638 b9db43-b9db53 GetUserNameW 632->638 633->638 634->625 644 b9dc99-b9dcb6 636->644 645 b9dc67-b9dc79 636->645 638->624 648 b9dcb8-b9dcca 644->648 649 b9dce6-b9dd19 call c1ea25 644->649 646 b9dc7b-b9dc89 645->646 647 b9dc8f-b9dc96 call c1ea33 645->647 646->647 650 b9dd1a-b9dda1 call c23d8f call b9e1d0 call b5bc60 call a38960 646->650 647->644 652 b9dcdc-b9dce3 call c1ea33 648->652 653 b9dccc-b9dcda 648->653 667 b9ddcc-b9ddd2 650->667 668 b9dda3-b9ddc4 call b47e60 650->668 652->649 653->650 653->652 670 b9ddd4 667->670 671 b9ddd6-b9de05 RegDeleteValueW call a38960 * 2 667->671 672 b9ddc9 668->672 670->671 677 b9de15-b9de8b call a38300 call b5bc60 671->677 678 b9de07-b9de0e RegCloseKey 671->678 672->667 683 b9de8d-b9de9f 677->683 684 b9debf-b9ded9 677->684 678->677 685 b9dea1-b9deaf 683->685 686 b9deb5-b9debc call c1ea33 683->686 687 b9dedb-b9df0b call b47e60 684->687 688 b9df10-b9df72 call b9e380 call b5bc60 RegQueryInfoKeyW 684->688 685->686 690 b9e1bb call c23d8f 685->690 686->684 687->688 700 b9dfaf-b9dfd0 call a38960 * 2 688->700 701 b9df74-b9df95 call a38960 * 2 688->701 697 b9e1c0-b9e1c5 call c23d8f 690->697 711 b9dfe1-b9dfec 700->711 712 b9dfd2-b9dfda 700->712 713 b9df97-b9df9f 701->713 714 b9dfa6-b9dfad 701->714 715 b9dfee 711->715 716 b9dff0-b9dff7 RegDeleteKeyW 711->716 712->711 713->714 717 b9dffd-b9e03f call a38960 * 3 714->717 715->716 716->717 726 b9e04e-b9e0a5 call a38300 call b5bc60 717->726 727 b9e041-b9e044 RegCloseKey 717->727 732 b9e0d9-b9e0f5 726->732 733 b9e0a7-b9e0b9 726->733 727->726 736 b9e135-b9e139 732->736 737 b9e0f7-b9e12f call b47e60 732->737 734 b9e0bb-b9e0c9 733->734 735 b9e0cf-b9e0d6 call c1ea33 733->735 734->697 734->735 735->732 740 b9e13b 736->740 741 b9e13d-b9e15b RegDeleteValueW call a38960 736->741 737->736 740->741 745 b9e160-b9e17e call a38960 741->745 748 b9e18d-b9e1ba call c1ea25 745->748 749 b9e180-b9e183 RegCloseKey 745->749 749->748
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00B9DB05
                        • GetLastError.KERNEL32 ref: 00B9DB0B
                        • GetUserNameW.ADVAPI32(?,?), ref: 00B9DB53
                        • GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00B9DB89
                        • GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,00000000,00000000), ref: 00B9DBD3
                        • RegDeleteValueW.KERNEL32(?,?,00000000,80000001,00000001,00000000,2BB8795F), ref: 00B9DDD8
                        • RegCloseKey.KERNEL32(?,?,00000000,80000001,00000001,00000000,2BB8795F), ref: 00B9DE08
                        • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,2BB8795F,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B9DF5F
                        • RegDeleteKeyW.ADVAPI32(?,00000000), ref: 00B9DFF7
                        • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000), ref: 00B9E042
                        • RegDeleteValueW.KERNEL32(?,?,?,80000001,00000001,00000000,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000031,?,00000000,80000001,00000001,00000000), ref: 00B9E13F
                        • RegCloseKey.ADVAPI32(?,?,?,?,80000001,00000001,00000000,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000031,?,00000000,80000001,00000001,00000000), ref: 00B9E181
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CloseDelete$EnvironmentNameUserValueVariable$ErrorInfoLastQuery
                        • String ID: Software$Software\Microsoft\Windows\CurrentVersion\RunOnce$UserDomain
                        • API String ID: 3650088056-4079418357
                        • Opcode ID: cbc5a69b5200c05869e6b5d7fd0712640e7683622a7e173d1342360b40b8923d
                        • Instruction ID: 08d6274c39f5fa35aacfca01fe6ebbbccf1cf0de98e70a922f3f14dbb6f758bf
                        • Opcode Fuzzy Hash: cbc5a69b5200c05869e6b5d7fd0712640e7683622a7e173d1342360b40b8923d
                        • Instruction Fuzzy Hash: 95223A70D00249DFDF14DFA8C995BEEBBB4EF14704F2081A9E415B7291DB746A88CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1825 b599a0-b599fd GetCurrentProcess OpenProcessToken 1827 b59a0c-b59a2d GetTokenInformation 1825->1827 1828 b599ff-b59a07 GetLastError 1825->1828 1829 b59a2f-b59a38 GetLastError 1827->1829 1830 b59a5b-b59a5f 1827->1830 1831 b59aca-b59add 1828->1831 1832 b59aae GetLastError 1829->1832 1833 b59a3a-b59a59 call b59b10 GetTokenInformation 1829->1833 1830->1832 1834 b59a61-b59a90 AllocateAndInitializeSid 1830->1834 1835 b59aed-b59b09 call c1ea25 1831->1835 1836 b59adf-b59ae6 CloseHandle 1831->1836 1838 b59ab4 1832->1838 1833->1830 1833->1832 1834->1838 1839 b59a92-b59aac EqualSid FreeSid 1834->1839 1836->1835 1843 b59ab6-b59ac3 call c1efba 1838->1843 1839->1843 1843->1831
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 00B599E8
                        • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B599F5
                        • GetLastError.KERNEL32 ref: 00B599FF
                        • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00B59A29
                        • GetLastError.KERNEL32 ref: 00B59A2F
                        • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,?,?,?), ref: 00B59A55
                        • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B59A88
                        • EqualSid.ADVAPI32(00000000,?), ref: 00B59A97
                        • FreeSid.ADVAPI32(?), ref: 00B59AA6
                        • CloseHandle.KERNEL32(00000000), ref: 00B59AE0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Token$ErrorInformationLastProcess$AllocateCloseCurrentEqualFreeHandleInitializeOpen
                        • String ID:
                        • API String ID: 695978879-0
                        • Opcode ID: 94301c4a8eff6b94f75aee5e12a0947d8dbff995b9b44b1c11716d3ea4225746
                        • Instruction ID: 25029794ba5d248aae39834fb8ee43c313a4a161fe06033fded7a7c98c7d6c30
                        • Opcode Fuzzy Hash: 94301c4a8eff6b94f75aee5e12a0947d8dbff995b9b44b1c11716d3ea4225746
                        • Instruction Fuzzy Hash: 5D4118B1900209EFEF10DFA4DC49BEEBBB8EF09315F104099E815B6290D7799948DB64

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2135 b664d0-b665d7 call a38850 call c20c80 LoadStringW 2140 b66690-b666a4 2135->2140 2141 b665dd-b66607 call a38300 2135->2141 2142 b666a6-b666ac 2140->2142 2143 b666ae 2140->2143 2151 b66638 2141->2151 2152 b66609-b66636 call a38960 2141->2152 2145 b666e5-b666fa LoadStringW 2142->2145 2143->2145 2146 b666b0-b666b9 2143->2146 2145->2140 2148 b666fc-b66729 call a38300 2145->2148 2149 b666c7-b666df call c20c80 2146->2149 2150 b666bb-b666c5 call b668d0 2146->2150 2167 b6675a 2148->2167 2168 b6672b-b66758 call a38960 2148->2168 2164 b666e2 2149->2164 2150->2164 2155 b6663b-b66642 2151->2155 2152->2155 2161 b66676-b6668a 2155->2161 2162 b66644-b66656 2155->2162 2169 b667ac-b667b5 2161->2169 2165 b6666c-b66673 call c1ea33 2162->2165 2166 b66658-b66666 2162->2166 2164->2145 2165->2161 2166->2165 2172 b66818-b66855 call c23d8f 2166->2172 2175 b6675d-b66764 2167->2175 2168->2175 2170 b667b7-b667c7 2169->2170 2171 b667f8-b66817 call c1ea25 2169->2171 2176 b667d9-b667f1 call c1ea33 2170->2176 2177 b667c9-b667d7 2170->2177 2189 b66857 2172->2189 2190 b668be-b668c8 call a3aa00 2172->2190 2182 b66766-b66778 2175->2182 2183 b66798-b667a8 2175->2183 2176->2171 2177->2172 2177->2176 2187 b6678e-b66795 call c1ea33 2182->2187 2188 b6677a-b66788 2182->2188 2183->2169 2187->2183 2188->2172 2188->2187 2193 b668a1-b668b2 SysAllocStringLen 2189->2193 2194 b66859-b6685b 2189->2194 2197 b6685e-b66898 CLSIDFromString SysFreeString call c1ea25 2193->2197 2198 b668b4-b668b9 call a3aa00 2193->2198 2194->2197 2202 b6689d-b668a0 2197->2202 2198->2190
                        APIs
                        • LoadStringW.USER32(?,00000000,?,00000100), ref: 00B665CC
                        • LoadStringW.USER32(?,00000000,?,00000001), ref: 00B666ED
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LoadString
                        • String ID:
                        • API String ID: 2948472770-0
                        • Opcode ID: 1910dea92588814e73261d91d14bee97b8f9c43add61175c40b55add965fd74a
                        • Instruction ID: c4b30f58907f5c7484238b4128e9b91a191d442080487323d29cbb02539c7935
                        • Opcode Fuzzy Hash: 1910dea92588814e73261d91d14bee97b8f9c43add61175c40b55add965fd74a
                        • Instruction Fuzzy Hash: F9C18E71D102499FDB04CFA8C9457EDFBF5FF48314F24822AE815AB291EB786A44CB90
                        APIs
                        • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B19FB1
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • LoadLibraryExW.KERNEL32(?,00000000,00000000,00C7F31D,000000FF), ref: 00B1A084
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DirectoryFindHeapLibraryLoadProcessResourceSystem
                        • String ID: UxTheme.dll
                        • API String ID: 2891229163-352951104
                        • Opcode ID: 264090f947552d5fd8e976b382badf916fc456b14ff751c8fe98c54f2d17f598
                        • Instruction ID: 1bb99c42b7ce8a0ff0d846799661e6f71d1fdd3fdba7674147044dc358d9cbcd
                        • Opcode Fuzzy Hash: 264090f947552d5fd8e976b382badf916fc456b14ff751c8fe98c54f2d17f598
                        • Instruction Fuzzy Hash: 48A19AB0501745EFE714CF68C958B9ABBF0FF04318F20825DD8299B681D7BAA658CF91
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00B8915E,?,?), ref: 00C1E5DA
                        • HeapAlloc.KERNEL32(00000000,?,?), ref: 00C1E5E1
                        • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 00C1E627
                        • HeapFree.KERNEL32(00000000,?,?), ref: 00C1E62E
                          • Part of subcall function 00C1E473: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,00C1E61D,?,?,?), ref: 00C1E497
                          • Part of subcall function 00C1E473: HeapAlloc.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E49E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$Process$Alloc$Free
                        • String ID:
                        • API String ID: 1864747095-0
                        • Opcode ID: a807eee5b511bf6bdc4c7ad990b7f1c234607fdf5abce40e07b50746832e2eac
                        • Instruction ID: 2dc06b5f3bbe2c8231a1f4583825943004657f022c7f1eaf26a1b346b6faf582
                        • Opcode Fuzzy Hash: a807eee5b511bf6bdc4c7ad990b7f1c234607fdf5abce40e07b50746832e2eac
                        • Instruction Fuzzy Hash: 0FF0B4B2A04A1157CB352BB97C08BAF2995AFD77A57114029FA66C7151EF20CC81ABA0
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,?,?), ref: 00B5E55D
                        • FindClose.KERNEL32(00000000), ref: 00B5E5BC
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Find$AllocateCloseFileFirstHeap
                        • String ID:
                        • API String ID: 1673784098-0
                        • Opcode ID: 88a7665110762f38446a2aa502219cd0c53c18f533185a01ab1d2597b39cd5b6
                        • Instruction ID: 4e8c9110acf96f423037e65f2d8cf6871b992d19f9038ecec8ba5cd79e18c2f4
                        • Opcode Fuzzy Hash: 88a7665110762f38446a2aa502219cd0c53c18f533185a01ab1d2597b39cd5b6
                        • Instruction Fuzzy Hash: 8D31A3B1905614DBDB28DF14D948B5AB7F4EB04329F2041E9EC2997280F7709A48CB41
                        APIs
                        • CreateNamedPipeW.KERNEL32(?,00000003,00000006,000000FF,00007F90,00007F90,00001388,00000000,?,2BB8795F,2BB8795F,?,?,?,00000000,00C92C65), ref: 00B9F1E7
                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,2BB8795F,2BB8795F,?,?,?,00000000,00C92C65,000000FF), ref: 00B9F20D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Create$FileNamedPipe
                        • String ID:
                        • API String ID: 1328467360-0
                        • Opcode ID: 8c92423c9c7e4ab478f8dfd6425860110dc3465a115e1434407fc313b5556424
                        • Instruction ID: 21e2814f49e9babc22210577e7374fc0472073f096d9dd202ce39296f2cdeaca
                        • Opcode Fuzzy Hash: 8c92423c9c7e4ab478f8dfd6425860110dc3465a115e1434407fc313b5556424
                        • Instruction Fuzzy Hash: 8C31E631A84746BFE721CF14CC05BA9BBE4EB05730F20866AF965A76D0DB71A940CB44
                        APIs
                        • __set_se_translator.LIBVCRUNTIME ref: 00A6E568
                        • SetUnhandledExceptionFilter.KERNEL32(00B5D410), ref: 00A6E57E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled__set_se_translator
                        • String ID:
                        • API String ID: 2480343447-0
                        • Opcode ID: 28fbc936d4650986f815140d1a3b8f6c17ac955ae9b68d39f5fa976c066914db
                        • Instruction ID: bb53f067f7ea0faee75165a04d1195e4a611c224ec2e18042199cf350746b24c
                        • Opcode Fuzzy Hash: 28fbc936d4650986f815140d1a3b8f6c17ac955ae9b68d39f5fa976c066914db
                        • Instruction Fuzzy Hash: F1E086667443906EC710A350AC09F5A7FA4AF96715F0544B6F600A3261C7B058499B71
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00B79F84
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00B79FB8
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$FindHeapProcessResource
                        • String ID: %hu$A valid language was received from commnad line. This is:$AI_BOOTSTRAPPERLANGS$Advinst_Extract_$Code returned to Windows by setup:$Language of a related product is:$Language selected programatically for UI:$Language used for UI:$Languages of setup:$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$Software\Caphyon\Advanced Installer\
                        • API String ID: 2083075878-297406034
                        • Opcode ID: 29b22974a675f648dc8481cff85e4a0cd4d87d22f608aa312eb84aa7c667ec34
                        • Instruction ID: 63b4633f6acc14e147990f517c88206cddf4eb6128133fb5b92982fb4aa02bff
                        • Opcode Fuzzy Hash: 29b22974a675f648dc8481cff85e4a0cd4d87d22f608aa312eb84aa7c667ec34
                        • Instruction Fuzzy Hash: A152D2319016499FDB14DF68CD55BAEB7F4EF45310F1482A8E829EB2D2DB349E04CB92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1150 b44200-b4423e call a3ad40 1153 b44240-b4426c 1150->1153 1154 b442be-b4433f call a3aa00 call b44720 call b5e480 call a3a530 1150->1154 1158 b4426e-b44289 call b45ff0 1153->1158 1159 b4428b-b442a6 call b45ff0 1153->1159 1171 b44390-b443e2 call b46160 GetModuleHandleW 1154->1171 1172 b44341-b4436a call b44830 call a52c50 1154->1172 1168 b442a9-b442bb 1158->1168 1159->1168 1177 b443e4-b443f8 call c1ee76 1171->1177 1178 b4441c-b44423 1171->1178 1185 b44374-b4438a MoveFileW call b5e480 1172->1185 1186 b4436c-b4436f 1172->1186 1177->1178 1191 b443fa-b44419 GetProcAddress call c1ee25 1177->1191 1181 b44425 1178->1181 1182 b4442c-b4443a 1178->1182 1181->1182 1187 b44474-b4447b 1182->1187 1188 b4443c-b44450 call c1ee76 1182->1188 1185->1171 1203 b44711-b44716 call c2a1f7 1185->1203 1186->1185 1189 b44484-b44492 1187->1189 1190 b4447d 1187->1190 1188->1187 1204 b44452-b44471 GetProcAddress call c1ee25 1188->1204 1194 b44494-b444a8 call c1ee76 1189->1194 1195 b444cc-b444d3 1189->1195 1190->1189 1191->1178 1194->1195 1212 b444aa-b444c9 GetProcAddress call c1ee25 1194->1212 1201 b444d5 1195->1201 1202 b444dc-b44687 1195->1202 1201->1202 1205 b44691-b446a3 call b19f70 1202->1205 1209 b4471b 1203->1209 1204->1187 1215 b446a5-b446c5 call b45c50 1205->1215 1212->1195 1219 b446c7-b446ca 1215->1219 1220 b446cf-b446e4 1215->1220 1219->1220 1221 b446e6-b446e9 1220->1221 1222 b446ee-b44710 call c1ea25 1220->1222 1221->1222
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • MoveFileW.KERNEL32(?,?), ref: 00B4437A
                        • GetModuleHandleW.KERNEL32(kernel32,?), ref: 00B443BC
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectory), ref: 00B4445C
                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B444B4
                          • Part of subcall function 00B19F70: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B19FB1
                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00B44404
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        Strings
                        • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00B44297
                        • kernel32.dll, xrefs: 00B445BF
                        • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00B44277, 00B4427F
                        • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00B44290, 00B4429F
                        • SetSearchPathMode, xrefs: 00B443FE
                        • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00B44272
                        • SetDllDirectory, xrefs: 00B44456
                        • SetDefaultDllDirectories, xrefs: 00B444AE
                        • kernel32, xrefs: 00B443B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressProc$ExclusiveLock$AcquireConditionDirectoryFileHandleHeapModuleMoveProcessReleaseSystemVariableWake
                        • String ID: @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$SetDefaultDllDirectories$SetDllDirectory$SetSearchPathMode$kernel32$kernel32.dll
                        • API String ID: 2125439804-3455668873
                        • Opcode ID: 1a2cc0649a4f19967d78555a143f20c58481421f5fd701849bf5ebb6fe22b8aa
                        • Instruction ID: 621cd10142090b63033ca396a14aba6c1965df23846785bd12bc2b3beeb6859e
                        • Opcode Fuzzy Hash: 1a2cc0649a4f19967d78555a143f20c58481421f5fd701849bf5ebb6fe22b8aa
                        • Instruction Fuzzy Hash: 0AE16CB0901A89DFDF20CF55C949BAEBBB4FF05318F108159E819AB391D7B49A08CF61
                        APIs
                        • GetActiveWindow.USER32 ref: 00B79D40
                        • SetLastError.KERNEL32(0000000E), ref: 00B79D5D
                        • GetCurrentThreadId.KERNEL32 ref: 00B79D75
                        • EnterCriticalSection.KERNEL32(00D629CC), ref: 00B79D92
                        • LeaveCriticalSection.KERNEL32(00D629CC), ref: 00B79DB5
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00B79F84
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00B79FB8
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,00D5D6E0,00B93680,?), ref: 00B45F78
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00B45FAA
                        • SetEvent.KERNEL32(?,?,00000000,?,00000001), ref: 00B7A18D
                        • SetEvent.KERNEL32(?,?,00000000,?), ref: 00B7A1FF
                          • Part of subcall function 00B87620: DeleteFileW.KERNEL32(?,00000000,00000000,?,00000000,80004005,?,?,?,?,2BB8795F), ref: 00B8764B
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$CriticalEventSection$ActiveCurrentDeleteEnterErrorFileHeapLastLeaveProcessThreadWindow
                        • String ID: Advinst_Extract_$Code returned to Windows by setup:$FILES.7z
                        • API String ID: 1965834561-2771609608
                        • Opcode ID: 312ef25e1710c8930d88d164b4938688955fc50b22942ce13943552d08d839df
                        • Instruction ID: 5d55c73c77cec97b5db8252e7ac9734c5ab17d0c190226a039279ca595ce62ba
                        • Opcode Fuzzy Hash: 312ef25e1710c8930d88d164b4938688955fc50b22942ce13943552d08d839df
                        • Instruction Fuzzy Hash: 3492CD30900249DFDB10DBA8C849BEEBBF4EF55314F1482E9E419AB292DB749E45CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1702 b890f0-b89121 1703 b892e6-b892f7 1702->1703 1704 b89127-b89141 GetActiveWindow 1702->1704 1705 b8914f-b89157 1704->1705 1706 b89143-b89145 call b800d0 1704->1706 1708 b89159-b89163 call c1e5d5 1705->1708 1709 b89172-b89181 call c1e6d7 1705->1709 1711 b8914a KiUserCallbackDispatcher 1706->1711 1708->1709 1717 b89165-b8916d SetLastError 1708->1717 1715 b8930f-b89316 call a4a0b0 1709->1715 1716 b89187-b891ec GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 1709->1716 1711->1705 1720 b8931b-b89325 call a3aa00 1715->1720 1719 b891f2-b89209 GetCurrentThreadId 1716->1719 1717->1719 1723 b8920b-b89212 1719->1723 1724 b8926e 1719->1724 1727 b89214-b89220 call a52c50 call b68bb0 1723->1727 1728 b89225-b89262 call b61aa0 call a39d60 1723->1728 1725 b89271-b89299 SetWindowTextW GetDlgItem SetWindowTextW 1724->1725 1725->1703 1729 b8929b-b892a4 call a3ad40 1725->1729 1727->1728 1728->1725 1740 b89264-b8926c 1728->1740 1729->1720 1738 b892a6-b892c8 call a3a2f0 1729->1738 1745 b892fa-b8930d GetDlgItem SetWindowTextW 1738->1745 1746 b892ca-b892dc 1738->1746 1740->1725 1745->1746 1746->1703 1747 b892de-b892e1 1746->1747 1747->1703
                        APIs
                        • GetActiveWindow.USER32 ref: 00B8912A
                        • SetLastError.KERNEL32(0000000E,?,?), ref: 00B89167
                        • GetCurrentThreadId.KERNEL32 ref: 00B891F2
                        • SetWindowTextW.USER32(?,00000000), ref: 00B8927C
                        • GetDlgItem.USER32(?,000003E9), ref: 00B89286
                        • SetWindowTextW.USER32(00000000,?), ref: 00B89292
                        • GetDlgItem.USER32(?,00000002), ref: 00B892FF
                        • SetWindowTextW.USER32(00000000,?), ref: 00B89307
                          • Part of subcall function 00B800D0: GetDlgItem.USER32(?,00000002), ref: 00B800F0
                          • Part of subcall function 00B800D0: GetWindowRect.USER32(00000000,?), ref: 00B80106
                          • Part of subcall function 00B800D0: ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,00B8914A,?,?), ref: 00B8011F
                          • Part of subcall function 00B800D0: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,00B8914A,?,?), ref: 00B8012A
                          • Part of subcall function 00B800D0: GetDlgItem.USER32(00000000,000003E9), ref: 00B8013C
                          • Part of subcall function 00B800D0: GetWindowRect.USER32(00000000,?), ref: 00B80152
                          • Part of subcall function 00B800D0: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,?,?,?,00B8914A), ref: 00B80195
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Item$RectText$ActiveCurrentErrorInvalidateLastShowThread
                        • String ID:
                        • API String ID: 127311041-0
                        • Opcode ID: ce9e95d46f76e24825fa921085cd5b8b2ed49dbc68ab57b7a04b92db0680ddd6
                        • Instruction ID: 9924173d86dc9219dd7f37c76b5c08b8c194f3e5623f6915d16be2ff7383e5db
                        • Opcode Fuzzy Hash: ce9e95d46f76e24825fa921085cd5b8b2ed49dbc68ab57b7a04b92db0680ddd6
                        • Instruction Fuzzy Hash: 9C61CF71501705EFDB10EF68CD48B6ABBF4EF04320F148299F825AB2A1DB70A904CF61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1748 a41830-a4189c 1749 a4189e-a418b2 call c1ee76 1748->1749 1750 a418d9-a418e0 1748->1750 1749->1750 1757 a418b4-a418d6 call c1ede5 call c1ee25 1749->1757 1751 a418e6 call b599a0 1750->1751 1752 a41b17-a41b53 call a37830 call c1ea25 1750->1752 1758 a418eb-a418ed 1751->1758 1757->1750 1761 a418f3-a418fe 1758->1761 1762 a41a3b-a41a4d GetTempPathW 1758->1762 1766 a41900-a41914 call c1ee76 1761->1766 1767 a4194a-a41951 1761->1767 1765 a41a4f-a41a51 1762->1765 1765->1752 1772 a41a57-a41a7f 1765->1772 1766->1767 1781 a41916-a41947 GetModuleHandleW GetProcAddress call c1ee25 1766->1781 1769 a41965-a4198f GetWindowsDirectoryW call c28813 1767->1769 1770 a41953-a41963 1767->1770 1782 a41992-a419a1 1769->1782 1770->1782 1776 a41a80-a41a89 1772->1776 1776->1776 1780 a41a8b-a41ac7 call a38300 call b4f6f0 1776->1780 1791 a41ac9-a41ade 1780->1791 1792 a41afa-a41b10 1780->1792 1781->1767 1782->1765 1789 a419a7-a419f4 call b59ba0 call b59d90 * 2 call b5a300 1782->1789 1812 a419f6-a41a24 CreateDirectoryW 1789->1812 1813 a41a2a-a41a39 call b59c40 1789->1813 1794 a41af0-a41af7 call c1ea33 1791->1794 1795 a41ae0-a41aee 1791->1795 1792->1752 1794->1792 1795->1794 1797 a41b54-a41c20 call c23d8f call a41830 call a37830 call a38960 call a41c30 call a38960 call c1ea25 1795->1797 1812->1813 1813->1765
                        APIs
                        • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W,?), ref: 00A41927
                        • GetProcAddress.KERNEL32(00000000), ref: 00A4192E
                        • CreateDirectoryW.KERNEL32(?,?,S-1-5-32-544,10000000,00000001,S-1-5-18,10000000,00000001), ref: 00A41A24
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                        • GetWindowsDirectoryW.KERNEL32(?,00000104,2BB8795F,?,?), ref: 00A41971
                        • GetTempPathW.KERNEL32(00000104,?,2BB8795F,?,?), ref: 00A41A47
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireDirectoryRelease$AddressConditionCreateHandleModulePathProcTempVariableWakeWindows
                        • String ID: GetTempPath2W$Kernel32.dll$S-1-5-18$S-1-5-32-544$\SystemTemp\
                        • API String ID: 846588460-595641723
                        • Opcode ID: e4df29b464790d498309c152f93ccc6fec488411910eb8abb51c69c1643de474
                        • Instruction ID: 34db45ee3087984833ab44edc07a5361f9a39ded8d6676afd848bc7c6eb2d4e1
                        • Opcode Fuzzy Hash: e4df29b464790d498309c152f93ccc6fec488411910eb8abb51c69c1643de474
                        • Instruction Fuzzy Hash: 0AA1A7B1D013189FDB20DF94DD89BEDB7B4EB44310F1441A9E909A7291EB745E88CF61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1846 c1e367-c1e372 1847 c1e381-c1e398 LoadLibraryExA 1846->1847 1848 c1e374-c1e380 DecodePointer 1846->1848 1849 c1e412 1847->1849 1850 c1e39a-c1e3af call c1e417 1847->1850 1851 c1e414-c1e416 1849->1851 1850->1849 1854 c1e3b1-c1e3c6 call c1e417 1850->1854 1854->1849 1857 c1e3c8-c1e3dd call c1e417 1854->1857 1857->1849 1860 c1e3df-c1e3f4 call c1e417 1857->1860 1860->1849 1863 c1e3f6-c1e410 DecodePointer 1860->1863 1863->1851
                        APIs
                        • DecodePointer.KERNEL32(?,?,?,00C1E6AD,00D5BF64,00000000,?,?,00B9F0A1,?), ref: 00C1E379
                        • LoadLibraryExA.KERNEL32(atlthunk.dll,00000000,00000800,?,?,?,00C1E6AD,00D5BF64,00000000,?,?,00B9F0A1,?), ref: 00C1E38E
                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00B9F0A1,?), ref: 00C1E40A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DecodePointer$LibraryLoad
                        • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                        • API String ID: 1423960858-1745123996
                        • Opcode ID: 519a925b96eee7b07340965d401b3f234781db1fe8da54ae0e21f98a2fa3fd35
                        • Instruction ID: ad0efb108076caa6ae125cabe5108d1ace3c2aa89fe97e6b39daa3c87f35dff3
                        • Opcode Fuzzy Hash: 519a925b96eee7b07340965d401b3f234781db1fe8da54ae0e21f98a2fa3fd35
                        • Instruction Fuzzy Hash: A901C4716443006ACE01ABA0AD0AFDA3B549F03B19F144075FC15F72E3D7A2AE8DF6A5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1864 b44830-b4488c call b44720 call a3ad40 1869 b44892 1864->1869 1870 b4497d-b449e9 call a3aa00 FreeLibrary EnterCriticalSection 1864->1870 1871 b44895-b448c5 call a39d60 call b5e480 1869->1871 1875 b44a33-b44a57 LeaveCriticalSection 1870->1875 1876 b449eb-b449ef 1870->1876 1908 b448c7-b448de 1871->1908 1909 b448fa-b4490a 1871->1909 1877 b44a97-b44a9f 1875->1877 1878 b44a59-b44a5d 1875->1878 1880 b44a01-b44a03 1876->1880 1881 b449f1-b449fb DestroyWindow 1876->1881 1882 b44aa1-b44aa4 1877->1882 1883 b44ac9-b44ad7 1877->1883 1884 b44a6e-b44a73 1878->1884 1885 b44a5f-b44a68 call c28829 1878->1885 1880->1875 1887 b44a05-b44a09 1880->1887 1881->1880 1882->1883 1890 b44aa6-b44aab 1882->1890 1892 b44ad9 1883->1892 1893 b44afa-b44b14 call b49c90 1883->1893 1894 b44a85-b44a94 call c1ea33 1884->1894 1895 b44a75-b44a7e call c28829 1884->1895 1885->1884 1888 b44a1a-b44a30 call c1ea33 1887->1888 1889 b44a0b-b44a14 call c28829 1887->1889 1888->1875 1889->1888 1902 b44ab3-b44ac7 1890->1902 1903 b44aad-b44aaf 1890->1903 1905 b44ae0-b44ae4 1892->1905 1894->1877 1895->1894 1902->1883 1902->1890 1903->1902 1913 b44ae6-b44aed 1905->1913 1914 b44af3-b44af8 1905->1914 1916 b448e0-b448e3 1908->1916 1917 b448e8-b448f2 call a3ad40 1908->1917 1918 b44950-b4495f 1909->1918 1919 b4490c-b44910 1909->1919 1913->1914 1914->1893 1914->1905 1916->1917 1917->1870 1931 b448f8 1917->1931 1922 b44961-b44964 1918->1922 1923 b44969-b4497c 1918->1923 1924 b44942-b44948 call a3a880 1919->1924 1925 b44912-b44916 1919->1925 1922->1923 1930 b4494d 1924->1930 1925->1924 1929 b44918-b4492e call a3a530 1925->1929 1934 b44930-b44938 1929->1934 1935 b4493b-b44940 1929->1935 1930->1918 1931->1871 1934->1935 1935->1930
                        APIs
                          • Part of subcall function 00B44830: GetModuleFileNameW.KERNEL32(00000000,?,00000104,2BB8795F,00000000,?,00C86576,000000FF), ref: 00B44778
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • FreeLibrary.KERNEL32(?,2BB8795F,?,00000001,?), ref: 00B449B9
                        • EnterCriticalSection.KERNEL32(00D5D67C,?,2BB8795F), ref: 00B449D7
                        • DestroyWindow.USER32(00000000,?,2BB8795F), ref: 00B449F5
                        • LeaveCriticalSection.KERNEL32(00D5D67C,?,2BB8795F), ref: 00B44A3E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CriticalSection$DestroyEnterFileFreeHeapLeaveLibraryModuleNameProcessWindow
                        • String ID: %s%lu$.local
                        • API String ID: 861831077-548699545
                        • Opcode ID: b0ee415ec47463482d8886d2291842ca851e62b4b57f95ef2f73644caae35b42
                        • Instruction ID: d3805c892e822d137b6f6b0c0df9ff49c5c3444533a4ca95664e0c48b4d80eb7
                        • Opcode Fuzzy Hash: b0ee415ec47463482d8886d2291842ca851e62b4b57f95ef2f73644caae35b42
                        • Instruction Fuzzy Hash: C891DA71A01714DFDB20DF68C844B6ABBF4FF00325F1446ADE856AB391DB74AA04DBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1937 b5bc60-b5bd31 call a37830 call b5c390 1942 b5bd60-b5bd6a 1937->1942 1943 b5bd33-b5bd5d call a38960 1937->1943 1945 b5bd6c-b5bd7e 1942->1945 1946 b5bd9e-b5bdb7 1942->1946 1943->1942 1948 b5bd94-b5bd9b call c1ea33 1945->1948 1949 b5bd80-b5bd8e 1945->1949 1950 b5be76-b5be94 1946->1950 1951 b5bdbd-b5bdc3 1946->1951 1948->1946 1949->1948 1955 b5bf67-b5bf6f call c23d8f 1949->1955 1952 b5be96 1950->1952 1953 b5be98-b5beaa 1950->1953 1956 b5bdc5 1951->1956 1957 b5bdc7-b5bdcd 1951->1957 1952->1953 1960 b5bef5-b5bf04 RegOpenKeyExW 1953->1960 1961 b5beac-b5beaf 1953->1961 1956->1957 1958 b5bdcf-b5bde9 call a38240 1957->1958 1959 b5bdeb-b5bdfd call a37830 1957->1959 1978 b5be02-b5be24 call a39d80 1958->1978 1959->1978 1964 b5bf0a-b5bf0f 1960->1964 1968 b5beb1-b5bebe GetModuleHandleW 1961->1968 1969 b5beef-b5bef3 1961->1969 1972 b5bf11-b5bf15 1964->1972 1973 b5bf3e-b5bf64 call c1ea25 1964->1973 1970 b5bf3b 1968->1970 1975 b5bec0-b5bed0 GetProcAddress 1968->1975 1969->1960 1969->1970 1970->1973 1976 b5bf24-b5bf39 1972->1976 1977 b5bf17-b5bf1e RegCloseKey 1972->1977 1975->1970 1980 b5bed2-b5beed 1975->1980 1976->1973 1977->1976 1985 b5be26 1978->1985 1986 b5be28-b5be4a call a381d0 call a38960 1978->1986 1980->1964 1985->1986 1991 b5be5d-b5be66 1986->1991 1992 b5be4c-b5be5a call a38960 1986->1992 1991->1950 1994 b5be68-b5be71 call a38960 1991->1994 1992->1991 1994->1950
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,2BB8795F), ref: 00B5BEB6
                        • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00B5BEC6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5BF18
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressCloseHandleModuleProc
                        • String ID: Advapi32.dll$RegOpenKeyTransactedW
                        • API String ID: 4190037839-3913318428
                        • Opcode ID: 06a283284a3b6711023628159e444aa31f1e15a2c2c434abebd328430ac170e4
                        • Instruction ID: ff6701e3f1280840eaa98eefbd3e1078fed4a528dab1bad9839ef3e110e83300
                        • Opcode Fuzzy Hash: 06a283284a3b6711023628159e444aa31f1e15a2c2c434abebd328430ac170e4
                        • Instruction Fuzzy Hash: 5CA15BB1900308DFDB24CF68C945BAEBBF4FF48314F148599E855AB291DB74A948CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1997 ba32f0-ba333b call b59b10 2000 ba333d-ba3342 1997->2000 2001 ba3347-ba3355 1997->2001 2002 ba34f1-ba351b call c1efba 2000->2002 2003 ba3360-ba3381 2001->2003 2005 ba338b-ba33a2 SetFilePointer 2003->2005 2006 ba3383-ba3389 2003->2006 2008 ba33b2-ba33c7 ReadFile 2005->2008 2009 ba33a4-ba33ac GetLastError 2005->2009 2006->2005 2010 ba34ec 2008->2010 2011 ba33cd-ba33d4 2008->2011 2009->2008 2009->2010 2010->2002 2011->2010 2012 ba33da-ba33eb 2011->2012 2012->2003 2013 ba33f1-ba33fd 2012->2013 2014 ba3400-ba3404 2013->2014 2015 ba3411-ba3415 2014->2015 2016 ba3406-ba340f 2014->2016 2017 ba3438-ba343a 2015->2017 2018 ba3417-ba341d 2015->2018 2016->2014 2016->2015 2020 ba343d-ba343f 2017->2020 2018->2017 2019 ba341f-ba3422 2018->2019 2021 ba3434-ba3436 2019->2021 2022 ba3424-ba342a 2019->2022 2023 ba3441-ba3444 2020->2023 2024 ba3454-ba3456 2020->2024 2021->2020 2022->2017 2025 ba342c-ba3432 2022->2025 2023->2013 2026 ba3446-ba344f 2023->2026 2027 ba3458-ba3461 2024->2027 2028 ba3466-ba348c SetFilePointer 2024->2028 2025->2017 2025->2021 2026->2003 2027->2003 2028->2010 2029 ba348e-ba34a3 ReadFile 2028->2029 2029->2010 2030 ba34a5-ba34a9 2029->2030 2030->2010 2031 ba34ab-ba34b5 2030->2031 2032 ba34cf-ba34d4 2031->2032 2033 ba34b7-ba34bd 2031->2033 2032->2002 2033->2032 2034 ba34bf-ba34c7 2033->2034 2034->2032 2035 ba34c9-ba34cd 2034->2035 2035->2032 2036 ba34d6-ba34ea 2035->2036 2036->2002
                        APIs
                        • SetFilePointer.KERNEL32(00C9816D,-00000400,?,00000002,00000400,2BB8795F,?,?,?), ref: 00BA3396
                        • GetLastError.KERNEL32(?,?), ref: 00BA33A4
                        • ReadFile.KERNEL32(00C9816D,00000000,00000400,?,00000000,?,?), ref: 00BA33BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$ErrorLastPointerRead
                        • String ID: ADVINSTSFX
                        • API String ID: 64821003-4038163286
                        • Opcode ID: 7020bbead59404c9d8d36281041d23fc64228c990ba3218bdbc3c52323bf9cd7
                        • Instruction ID: 9f7b7b5ab33862ecae083179a879a11ec3685736f06e6f4a447584ec5c5228c2
                        • Opcode Fuzzy Hash: 7020bbead59404c9d8d36281041d23fc64228c990ba3218bdbc3c52323bf9cd7
                        • Instruction Fuzzy Hash: D961C071A082099BDB11CF68C881BBEBBF5FF4AB14F2442A5F501A7381DB349E45CB60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2037 b47e60-b47e97 2038 b47f02-b47f19 RegCreateKeyExW 2037->2038 2039 b47e99-b47e9c 2037->2039 2042 b47f1f-b47f21 2038->2042 2040 b47ef5-b47ef9 2039->2040 2041 b47e9e-b47eab GetModuleHandleW 2039->2041 2040->2038 2045 b47efb-b47f00 2040->2045 2043 b47ec6-b47ed4 GetProcAddress 2041->2043 2044 b47ead-b47ec3 2041->2044 2046 b47f44-b47f55 2042->2046 2047 b47f23-b47f29 2042->2047 2043->2045 2048 b47ed6-b47ef3 2043->2048 2045->2042 2049 b47f34-b47f41 2047->2049 2050 b47f2b-b47f32 RegCloseKey 2047->2050 2048->2042 2049->2046 2050->2049
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,2BB8795F,00000000,?,?,?,00000000,00C461A0,000000FF), ref: 00B47EA3
                        • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00B47ECC
                        • RegCreateKeyExW.KERNEL32(?,00B5BF9F,00000000,00000000,00000000,00C461A0,00000000,00000000,00C461A0,2BB8795F,00000000,?,?,?,00000000,00C461A0), ref: 00B47F19
                        • RegCloseKey.ADVAPI32(00000000,?,?,?,00000000,00C461A0,000000FF), ref: 00B47F2C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressCloseCreateHandleModuleProc
                        • String ID: Advapi32.dll$RegCreateKeyTransactedW
                        • API String ID: 1765684683-2994018265
                        • Opcode ID: d6f55c12f23bf6d7834cf8d1aadd7ff3d9225c353b4d44f6c57e42108e153fca
                        • Instruction ID: 3698745c6a8f5ad6e2c35eed5b5c069bafe9ea963aeee9fbdf3486e1f4cd3314
                        • Opcode Fuzzy Hash: d6f55c12f23bf6d7834cf8d1aadd7ff3d9225c353b4d44f6c57e42108e153fca
                        • Instruction Fuzzy Hash: 4731B472644345FFEB208F45DC45FABBBA8FB04760F10416AF915E7680DB71A904D6A4

                        Control-flow Graph

                        APIs
                        • GetDlgItem.USER32(?,00000002), ref: 00B800F0
                        • GetWindowRect.USER32(00000000,?), ref: 00B80106
                        • ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,00B8914A,?,?), ref: 00B8011F
                        • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,00B8914A,?,?), ref: 00B8012A
                        • GetDlgItem.USER32(00000000,000003E9), ref: 00B8013C
                        • GetWindowRect.USER32(00000000,?), ref: 00B80152
                        • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,?,?,?,00B8914A), ref: 00B80195
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Rect$Item$InvalidateShow
                        • String ID:
                        • API String ID: 2147159307-0
                        • Opcode ID: 0bdb43b1247983423f06296ed54c6a115100593e27278bb98657e0dca865115b
                        • Instruction ID: 0df29e7960bc762439b56e0c73cad51316b34c4f096b741f8da9f10876c818c1
                        • Opcode Fuzzy Hash: 0bdb43b1247983423f06296ed54c6a115100593e27278bb98657e0dca865115b
                        • Instruction Fuzzy Hash: 64216B71614304AFE300DF24DC49A6BBBE8EF8C711F108619F889DA291EB30E9418B62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2057 b89330-b893b8 CreateThread 2058 b893ba-b893c0 GetLastError 2057->2058 2059 b893c3-b893dd call b5f310 2057->2059 2058->2059 2062 b893df-b893ed WaitForSingleObject 2059->2062 2063 b89424-b89432 2059->2063 2064 b8941b-b8941e CloseHandle 2062->2064 2065 b893ef-b89405 GetExitCodeThread 2062->2065 2064->2063 2065->2064 2066 b89407-b8940e 2065->2066 2066->2064 2067 b89410-b89415 TerminateThread 2066->2067 2067->2064
                        APIs
                        • CreateThread.KERNEL32(00000000,00000000,00BA5370,00CED3A8,00000000,?), ref: 00B893AD
                        • GetLastError.KERNEL32 ref: 00B893BA
                        • WaitForSingleObject.KERNEL32(00000000,FFFFFFFF), ref: 00B893E3
                        • GetExitCodeThread.KERNEL32(00000000,?), ref: 00B893FD
                        • TerminateThread.KERNEL32(00000000,00000000), ref: 00B89415
                        • CloseHandle.KERNEL32(00000000), ref: 00B8941E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Thread$CloseCodeCreateErrorExitHandleLastObjectSingleTerminateWait
                        • String ID:
                        • API String ID: 1566822279-0
                        • Opcode ID: d11c5add4b274c71966c6eac616b13409a967b20691c1ef80eb9d834d93b2690
                        • Instruction ID: 4cd316b04936a2908290bbaa58a643e0588de4da9f58b5336b8858c3f1caf222
                        • Opcode Fuzzy Hash: d11c5add4b274c71966c6eac616b13409a967b20691c1ef80eb9d834d93b2690
                        • Instruction Fuzzy Hash: F231BBB59006099BDF10DF94CD09BEEBBF8FB09715F104259E821B72E0D7799A04CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2068 b68bb0-b68c00 call a3a530 2071 b68c02-b68c0d call a3a700 2068->2071 2072 b68c10-b68c22 GetFileVersionInfoSizeW 2068->2072 2071->2072 2074 b68d74 2072->2074 2075 b68c28-b68c33 call b59b10 2072->2075 2076 b68d76-b68d8b 2074->2076 2083 b68c35-b68c38 2075->2083 2084 b68c3d-b68c4a 2075->2084 2079 b68d95-b68dbf call c1efba 2076->2079 2080 b68d8d-b68d90 2076->2080 2080->2079 2083->2074 2085 b68c4c-b68c57 call a3a700 2084->2085 2086 b68c5a-b68c6b GetFileVersionInfoW 2084->2086 2085->2086 2086->2074 2089 b68c71-b68c7a call a3ad40 2086->2089 2093 b68dc0-b68dca call a3aa00 2089->2093 2094 b68c80-b68ca5 2089->2094 2099 b68ca7-b68cab 2094->2099 2100 b68cb9-b68cbe 2094->2100 2099->2100 2101 b68cad-b68cb7 2099->2101 2102 b68cc3-b68ce2 call a39d60 2100->2102 2101->2102 2105 b68ce4-b68cef call a3a700 2102->2105 2106 b68cf2-b68d04 2102->2106 2105->2106 2110 b68d06-b68d0a 2106->2110 2111 b68d59-b68d6a 2106->2111 2110->2111 2113 b68d0c-b68d11 2110->2113 2111->2074 2112 b68d6c-b68d6f 2111->2112 2112->2074 2114 b68d17-b68d1f 2113->2114 2115 b68d13-b68d15 2113->2115 2117 b68d20-b68d29 2114->2117 2116 b68d30-b68d4b call a3a880 2115->2116 2121 b68d55-b68d57 2116->2121 2122 b68d4d-b68d50 2116->2122 2117->2117 2118 b68d2b-b68d2e 2117->2118 2118->2116 2121->2076 2122->2121
                        APIs
                        • GetFileVersionInfoSizeW.KERNELBASE(80004005,00C92C65,2BB8795F,?,?,00000000,?,?,00000000,00C92C65,000000FF,?,80004005,2BB8795F,?), ref: 00B68C15
                        • GetFileVersionInfoW.KERNELBASE(80004005,?,00000000,000000FF,00000000,?,00000000,?,?,00000000,00C92C65,000000FF,?,80004005,2BB8795F,?), ref: 00B68C63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: FileInfoVersion$Size
                        • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                        • API String ID: 2104008232-2149928195
                        • Opcode ID: cab5e3455085bdb005fd63ed84835605f5237ff0e2207de6c11d1c21967fd286
                        • Instruction ID: c7c590c915058302f98e59b79ebd8dd23722c7edb82af461df4f6eea1714caa3
                        • Opcode Fuzzy Hash: cab5e3455085bdb005fd63ed84835605f5237ff0e2207de6c11d1c21967fd286
                        • Instruction Fuzzy Hash: 7161AE71901609DFDB14DFA8C989AAEB7F8FF15315F1442AEE811E7291EB349D04CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2123 b61850-b618a9 LoadLibraryW 2124 b618d4-b61919 2123->2124 2125 b618ab-b618b9 GetProcAddress 2123->2125 2131 b6191c-b6192c 2124->2131 2125->2124 2126 b618bb-b618c8 2125->2126 2128 b618cb-b618cd 2126->2128 2128->2124 2129 b618cf-b618d2 2128->2129 2129->2131 2133 b6192e-b61935 FreeLibrary 2131->2133 2134 b6193c-b6194f 2131->2134 2133->2134
                        APIs
                        • LoadLibraryW.KERNEL32(ComCtl32.dll,2BB8795F,?,?,00000000), ref: 00B6188E
                        • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00B618B1
                        • FreeLibrary.KERNEL32(00000000), ref: 00B6192F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: ComCtl32.dll$LoadIconMetric
                        • API String ID: 145871493-764666640
                        • Opcode ID: 28ec1970e7cd4a2c211b6d56da0800bf9247e341a9ad4baa20a63113607da095
                        • Instruction ID: ddbcbbc0e0e54414eb43b35ee8fa4f3aa3e140a44661e54cfca2f426bafd154d
                        • Opcode Fuzzy Hash: 28ec1970e7cd4a2c211b6d56da0800bf9247e341a9ad4baa20a63113607da095
                        • Instruction Fuzzy Hash: EC3195B1A00355ABDF108F99CC44BAFBFF8EB48314F04456AF915E7280D7794D008BA0
                        APIs
                        • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 00B5F331
                        • PeekMessageW.USER32(?,00000000), ref: 00B5F377
                        • TranslateMessage.USER32(00000000), ref: 00B5F382
                        • DispatchMessageW.USER32(00000000), ref: 00B5F389
                        • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,000005FF,00000004), ref: 00B5F39B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 4084795276-0
                        • Opcode ID: adb1711c565837f0abce3681c10f8889ef8bd1a62420c8e5387b246e1a466ecb
                        • Instruction ID: 9a405f93b339081fd1654800796fe2d3bb2111256599c83f2d407cfd078f859b
                        • Opcode Fuzzy Hash: adb1711c565837f0abce3681c10f8889ef8bd1a62420c8e5387b246e1a466ecb
                        • Instruction Fuzzy Hash: 291132316443066AE210CB519C81FBAB3DCEB89771F400266FE10E61C0D730E9888B35
                        APIs
                        • PathIsUNCW.SHLWAPI(?,2BB8795F,?,00000010,?), ref: 00B80F2C
                          • Part of subcall function 00B599A0: GetCurrentProcess.KERNEL32 ref: 00B599E8
                          • Part of subcall function 00B599A0: OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B599F5
                          • Part of subcall function 00B599A0: GetLastError.KERNEL32 ref: 00B599FF
                          • Part of subcall function 00B599A0: CloseHandle.KERNEL32(00000000), ref: 00B59AE0
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Process$CloseCurrentErrorFindHandleHeapLastOpenPathResourceToken
                        • String ID: Extraction path set to:$[WindowsVolume]$\\?\
                        • API String ID: 1971330335-3538578949
                        • Opcode ID: 7146339ad78ca1c1597e62b2043749fa1fad7536916085cb1906342a5a15b289
                        • Instruction ID: c3223f52023e97e09097b33e4e1d87239aef8431aac8aa885f73f9cd3554838f
                        • Opcode Fuzzy Hash: 7146339ad78ca1c1597e62b2043749fa1fad7536916085cb1906342a5a15b289
                        • Instruction Fuzzy Hash: 92C1C330901646DFDB11EFACC944BAEF7F5EF50311F1482A8E815AB2A2DB309D45CBA1
                        APIs
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,2BB8795F,?,00000010,?,00B7BD50,?), ref: 00B78316
                        • SetFilePointer.KERNEL32(00000000,?,00000010,00000000), ref: 00B7835F
                        • ReadFile.KERNEL32(00000000,2BB8795F,?,?,00000000,00000078,?), ref: 00B783A1
                        • CloseHandle.KERNEL32(00000000), ref: 00B7841A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandlePointerRead
                        • String ID:
                        • API String ID: 4133201480-0
                        • Opcode ID: 59849597510b00e3b2ecf0e6305981f6e3311b1bf84a71bbe329cc7293e91829
                        • Instruction ID: 25deaf6daa9a279d42d3206518e0a61697ab1916413b3fc8cfacf4c1da57b7be
                        • Opcode Fuzzy Hash: 59849597510b00e3b2ecf0e6305981f6e3311b1bf84a71bbe329cc7293e91829
                        • Instruction Fuzzy Hash: 6D519070940609EBDB11CB98CC88BAEFBF8FF45324F148299E425AB2D1DB749D05CB64
                        APIs
                          • Part of subcall function 00B785B0: GetTickCount.KERNEL32 ref: 00B78633
                          • Part of subcall function 00B785B0: __Xtime_get_ticks.LIBCPMT ref: 00B7863B
                          • Part of subcall function 00B785B0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B78685
                          • Part of subcall function 00B9DA70: GetUserNameW.ADVAPI32(?,?), ref: 00B9DB05
                          • Part of subcall function 00B9DA70: GetLastError.KERNEL32 ref: 00B9DB0B
                          • Part of subcall function 00B9DA70: GetUserNameW.ADVAPI32(?,?), ref: 00B9DB53
                          • Part of subcall function 00B9DA70: GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00B9DB89
                          • Part of subcall function 00B9DA70: GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,00000000,00000000), ref: 00B9DBD3
                        • GetCurrentProcess.KERNEL32(00000008,?,2BB8795F), ref: 00B78A6A
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00B78A71
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: EnvironmentNameProcessUserVariable$CountCurrentErrorLastOpenTickTokenUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@
                        • String ID: \/:*?"<>|
                        • API String ID: 1564237509-3830478854
                        • Opcode ID: 99f3ccc10266404172cd0798a315419a641f02e68269d9c032a75bad179847c3
                        • Instruction ID: 4536b13d9b5f21ce5fcdc400ad3a93d16b32a52dd39a66315297625363c8dca1
                        • Opcode Fuzzy Hash: 99f3ccc10266404172cd0798a315419a641f02e68269d9c032a75bad179847c3
                        • Instruction Fuzzy Hash: 65B1D170D00308DFDB10DF68C9557AEBBB0EF05714F208269E869AB391DB746A49CBA1
                        APIs
                        • __freea.LIBCMT ref: 00C38CBB
                          • Part of subcall function 00C36B67: RtlAllocateHeap.NTDLL(00000000,00000000,00C3490E,?,00C38AB8,?,00000000,?,00C28898,00000000,00C3490E,?,?,?,?,00C34708), ref: 00C36B99
                        • __freea.LIBCMT ref: 00C38CD0
                        • __freea.LIBCMT ref: 00C38CE0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: __freea$AllocateHeap
                        • String ID:
                        • API String ID: 2243444508-0
                        • Opcode ID: 4e36f39a33e7372a3403d4be0a6e42dc4965c38e4f6f90d647c326fcf80b8bfd
                        • Instruction ID: 71b0def37470712c99ced21e919adbce9a18c2396100e5ad64cacca505228ebf
                        • Opcode Fuzzy Hash: 4e36f39a33e7372a3403d4be0a6e42dc4965c38e4f6f90d647c326fcf80b8bfd
                        • Instruction Fuzzy Hash: BD51D0B2621316AFEF25AF649C81EBB76A9EF04354F150128BD14D6250EF70CD58A7B0
                        APIs
                        • SetFilePointer.KERNEL32(?,?,?,00000000,2BB8795F,?,?), ref: 00B84297
                        • ReadFile.KERNEL32(?,00000000,00000018,?,00000000), ref: 00B843A2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$PointerRead
                        • String ID:
                        • API String ID: 3154509469-0
                        • Opcode ID: 46c6c5f71955a7c80b002d99e9b2fb249bfb98e579e0655aa3de1d9951062894
                        • Instruction ID: d19133759102b731acc7b28ff202f0f60515d3bb2fc2f1d1251610c2a96eb96f
                        • Opcode Fuzzy Hash: 46c6c5f71955a7c80b002d99e9b2fb249bfb98e579e0655aa3de1d9951062894
                        • Instruction Fuzzy Hash: C0616DB1D006099FDB04DFA8D945B9EFBF4FB45720F14436AE825A7391EB74AA04CB90
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,2BB8795F,?,00000000,?,80004005,?,00000000), ref: 00B810E0
                        • GetLastError.KERNEL32 ref: 00B81110
                        • GetLastError.KERNEL32(?), ref: 00B811A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast$CreateFile
                        • String ID:
                        • API String ID: 1722934493-0
                        • Opcode ID: ce312f58d9453a29939db2d054b2d498244dd45e97bfd7b2523707eed42d232c
                        • Instruction ID: 42a94c58a5bdfcccc0fb10524229a5a660c8ba27cc01aea2f3d7c501c5e45bea
                        • Opcode Fuzzy Hash: ce312f58d9453a29939db2d054b2d498244dd45e97bfd7b2523707eed42d232c
                        • Instruction Fuzzy Hash: 7451B371A00B059FDB10EF68D845B9AF7F5FF45320F148B99E526A72E1EB30A905CB90
                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,00C2A070,?,00C23B82,?,?,2BB8795F,00C23B82,?), ref: 00C2A087
                        • TerminateProcess.KERNEL32(00000000,?,00C2A070,?,00C23B82,?,?,2BB8795F,00C23B82,?), ref: 00C2A08E
                        • ExitProcess.KERNEL32 ref: 00C2A0A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 00539e8a14504a1510d408db529ebee4cdaf3593d44eed8ba9cdde42b24881da
                        • Instruction ID: 8d0cf41dad83f485d40ab78aabc3b5a3c525c15c7e6c78b0a3d0ec9e9a96b51a
                        • Opcode Fuzzy Hash: 00539e8a14504a1510d408db529ebee4cdaf3593d44eed8ba9cdde42b24881da
                        • Instruction Fuzzy Hash: 8AD06C31000219ABDB116FA1ED09B9E3F2AAF86359B008011B91A4A472CB369D96AA85
                        APIs
                          • Part of subcall function 00C3D0D0: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00C3D0FB
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00C3D3E7,?,00000000,?,?,?), ref: 00C3D601
                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C3D3E7,?,00000000,?,?,?), ref: 00C3D643
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID:
                        • API String ID: 546120528-0
                        • Opcode ID: b270fdabb366fcdf55a49ff45dff75fc8e7c3c68b7d2261cc040e9f5dbb873b3
                        • Instruction ID: d2d361a61962d6a6fbc5e379765232e1f78612dc78bc425c3049c812521b938c
                        • Opcode Fuzzy Hash: b270fdabb366fcdf55a49ff45dff75fc8e7c3c68b7d2261cc040e9f5dbb873b3
                        • Instruction Fuzzy Hash: 3E5137709203454EDB20CF35E8426AEFBF5EF42304F14456ED0ABCB252D7759A46DB90
                        APIs
                        • RegQueryValueExW.KERNEL32(?,?,00000000,000000C8,00000000,000000C8,000000C8), ref: 00B9262E
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000002,00000000,00000002,00000002,000000C8), ref: 00B92670
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: 57a766666facd41c1ac1fa7b089563f0ca65581c0925644148c7bf83db0b011e
                        • Instruction ID: 600cd5dc28b800c07e606702ce3b3fb90aaa80d46afcc87450acea4860ec2b35
                        • Opcode Fuzzy Hash: 57a766666facd41c1ac1fa7b089563f0ca65581c0925644148c7bf83db0b011e
                        • Instruction Fuzzy Hash: 5E51AE71D00219ABDF21EBA4CD45BAFB7B8EF15310F100569E811F7291DB35AE04DBA2
                        APIs
                        • _wcsrchr.LIBVCRUNTIME ref: 00B924A1
                        • RegOpenKeyExW.KERNEL32(00000001,?,00000000,00000001,?,?,?,?,?,00000001,\Software), ref: 00B92510
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Open_wcsrchr
                        • String ID:
                        • API String ID: 1765551594-0
                        • Opcode ID: ee41c36784a47165017cba043ab5f7087381bb030353e50970f090eb13e00ee5
                        • Instruction ID: 1aa2e4baba35fa6d566df935300091d3eae3be8204311703f6dbe33b8b3870e7
                        • Opcode Fuzzy Hash: ee41c36784a47165017cba043ab5f7087381bb030353e50970f090eb13e00ee5
                        • Instruction Fuzzy Hash: EF518071E00615AFDB00CBA8CC95BAEBBF9FB44325F1042A9E925A73D1D7749904CB91
                        APIs
                        • GetLastError.KERNEL32(00B7F7C6), ref: 00B7FE60
                        • DestroyWindow.USER32(00000000,00000000), ref: 00B7FF17
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DestroyErrorLastWindow
                        • String ID:
                        • API String ID: 1182162058-0
                        • Opcode ID: e2c0886f43b0288997902284ec784d56f52369b20332687d1387024b6f419838
                        • Instruction ID: 94a061c7a572b9a9931e489327e0048d04e8d9aa5e3e8ea5af6abf05a013ba4b
                        • Opcode Fuzzy Hash: e2c0886f43b0288997902284ec784d56f52369b20332687d1387024b6f419838
                        • Instruction Fuzzy Hash: FB21D57261020A9BDB20AF08EC017BA77D4EB55321F004266FC18CB691CB75EC65DBF5
                        APIs
                          • Part of subcall function 00B61850: LoadLibraryW.KERNEL32(ComCtl32.dll,2BB8795F,?,?,00000000), ref: 00B6188E
                          • Part of subcall function 00B61850: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00B618B1
                          • Part of subcall function 00B61850: FreeLibrary.KERNEL32(00000000), ref: 00B6192F
                        • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00B62284
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B6228F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LibraryMessageSend$AddressFreeLoadProc
                        • String ID:
                        • API String ID: 3032493519-0
                        • Opcode ID: 461c96e1bb94cbeb0b15b145ccd2ddd67bfa55c29ff8737d84a4f1c03f654040
                        • Instruction ID: cab5a8844b35f7eef09afbd677541ba8f85ed79b3caeb65f7f481929a6ca5bec
                        • Opcode Fuzzy Hash: 461c96e1bb94cbeb0b15b145ccd2ddd67bfa55c29ff8737d84a4f1c03f654040
                        • Instruction Fuzzy Hash: C6F0303178131837F66021595C47F67B68DD781BA9F14427AFA98AF2C2ECC67C0002E8
                        APIs
                        • LCMapStringEx.KERNEL32(?,00C38BFA,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00C388AC
                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00C38BFA,?,?,00000000,?,00000000), ref: 00C388CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: String
                        • String ID:
                        • API String ID: 2568140703-0
                        • Opcode ID: 3852cac5eae3aa48339a7bbf811013565d26d2af906fec31a4e2f506f8e91a4c
                        • Instruction ID: 2c8079aa46ee154ecb7f4c9cc18ab43c5a6ece46b092ef54aeda9209e13380eb
                        • Opcode Fuzzy Hash: 3852cac5eae3aa48339a7bbf811013565d26d2af906fec31a4e2f506f8e91a4c
                        • Instruction Fuzzy Hash: E7F0763201121ABBCF126F91DC05EDE3F26EF887A0F058121FE1866061CB32D935AB91
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00B80069
                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00C8F950,000000FF), ref: 00B80078
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CurrentDestroyThreadWindow
                        • String ID:
                        • API String ID: 2223599578-0
                        • Opcode ID: e156b155e3efb9370a6778135d59bd763dfc44e0b655f33a7a488d869b73c938
                        • Instruction ID: 3276b60cff72151620d81cc670a9767fad9d03ea57885be02265bf125944937b
                        • Opcode Fuzzy Hash: e156b155e3efb9370a6778135d59bd763dfc44e0b655f33a7a488d869b73c938
                        • Instruction Fuzzy Hash: 70F0A7710127409BD370BB29EE48B47BBD5AF54B61F10095DE486DAAA0C7B0F844CB24
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00C3E6A1,?,00000000,?,?,00C3E942,?,00000007,?,?,00C3ED94,?,?), ref: 00C36B43
                        • GetLastError.KERNEL32(?,?,00C3E6A1,?,00000000,?,?,00C3E942,?,00000007,?,?,00C3ED94,?,?), ref: 00C36B4E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: d07d629ec714a52fc23ef74b01224ea6a80b3b41ff1c5773106cf88e45426963
                        • Instruction ID: 4d176fbeeb5109962ba5661a2b169aa225a8378f10181caf4e400dca36354b6b
                        • Opcode Fuzzy Hash: d07d629ec714a52fc23ef74b01224ea6a80b3b41ff1c5773106cf88e45426963
                        • Instruction Fuzzy Hash: FEE08672500314ABCB112BB4BC0DB9A7B989B01355F014010F51CD6161DB388A919B94
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,00D5D6E0,00B93680,?), ref: 00B45F78
                        • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00B45FAA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide
                        • String ID:
                        • API String ID: 626452242-0
                        • Opcode ID: 7e23174175d15c3a061c1c1bc58dc5a222e905940c5d4aa5ff50c31e4a977efd
                        • Instruction ID: f1350074be18a9149875a38fbf27b7bfb96c05d3444f382bf282d619c6117a0e
                        • Opcode Fuzzy Hash: 7e23174175d15c3a061c1c1bc58dc5a222e905940c5d4aa5ff50c31e4a977efd
                        • Instruction Fuzzy Hash: 43014532301A22AFD6209B49DC89F1EF799EF90321F204129F315EB2D1CB206D1197A1
                        APIs
                        • GetLastError.KERNEL32(00000000,00000000,00C23EA4,00C38AD6,?,00C28898,00000000,00C3490E,?,?,?,?,00C34708,?,?,00000004), ref: 00C368DB
                        • SetLastError.KERNEL32(00000000), ref: 00C3697D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: f7a629349c26f0a0d62bf983430507dafd283424b4d832eccec7e827051406c0
                        • Instruction ID: 2704836e6f57cab6809bf2494c7c1b47365741b40c39b5a90f7443b245c1bbfc
                        • Opcode Fuzzy Hash: f7a629349c26f0a0d62bf983430507dafd283424b4d832eccec7e827051406c0
                        • Instruction Fuzzy Hash: 801104712247047ED7103FB5ACC6F2B3A68AB027A9F104530FB25E61E2DE618C09B270
                        APIs
                        • GetCPInfo.KERNEL32(E8458D00,?,00C3D3F3,00C3D3E7,00000000), ref: 00C3D1D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-0
                        • Opcode ID: f63076482fadf56fc365696a242ad1363fd03ce235abc4efa2710eeef55e008d
                        • Instruction ID: 1fb4f5049df0bb7f373e701216b4d59ae18a2e017b162136354449dddbf9f7df
                        • Opcode Fuzzy Hash: f63076482fadf56fc365696a242ad1363fd03ce235abc4efa2710eeef55e008d
                        • Instruction Fuzzy Hash: BA514CB19142589ADB218E28EC80BEA7BBCEB55704F2405EDE5ABD7142C331DE46DF20
                        APIs
                        • EnumResourceLanguagesW.KERNEL32(?,00000010,00000001,00B88C00,?), ref: 00B88B0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: EnumLanguagesResource
                        • String ID:
                        • API String ID: 4141015960-0
                        • Opcode ID: d50cfd65cbe71e2bb4c550da15e73623f5d060ed61e7f82a791bd227ed9ffac5
                        • Instruction ID: e091b15f8dc1ad2cd638e5b7b86e66dbb4d3f2c55c0c91d9d9f5bc2ec5a96af9
                        • Opcode Fuzzy Hash: d50cfd65cbe71e2bb4c550da15e73623f5d060ed61e7f82a791bd227ed9ffac5
                        • Instruction Fuzzy Hash: 7341A0B190020A9FDB10EF98C951BDFFBF4FF44324F14066AE815A7691DB76A944CBA0
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,?,?,00C36924,00000001,00000364,?,00000002,000000FF,?,00C28898,00000000,00C3490E,?), ref: 00C38110
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 29753e9506db8c9c956de62122878d4a9976dad066a61b299279c0595b981e97
                        • Instruction ID: 2488418820349f52ff5175d2964351face80c7738388b73a2f9d29189a4c2333
                        • Opcode Fuzzy Hash: 29753e9506db8c9c956de62122878d4a9976dad066a61b299279c0595b981e97
                        • Instruction Fuzzy Hash: CAF0E23262072467DB216A229C06B5F3B49AF42770F198412BC24E7191CE31EE0E92E0
                        APIs
                          • Part of subcall function 00C2068A: RaiseException.KERNEL32(E06D7363,00000001,00000003,2BB8795F,?,?,00B9F158,80004005,2BB8795F,?,?), ref: 00C206EA
                        • RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AllocateExceptionHeapRaise
                        • String ID:
                        • API String ID: 3789339297-0
                        • Opcode ID: 56b946831043f50530e05f9eb47408c62faeba7c376fb3e91211985f46b6d8e9
                        • Instruction ID: 37fc5a807594c3a4cccafce59d3c0e107440955924552af8efa1da87baae8172
                        • Opcode Fuzzy Hash: 56b946831043f50530e05f9eb47408c62faeba7c376fb3e91211985f46b6d8e9
                        • Instruction Fuzzy Hash: 40F02772A44708BFC700CF04DC02F6ABBA8FB08B10F00462AFC1593690DB32A804CA50
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,00000000,00C3490E,?,00C38AB8,?,00000000,?,00C28898,00000000,00C3490E,?,?,?,?,00C34708), ref: 00C36B99
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 5c7417bebf4f01a27d941006e008478e09e3d9fac8895b3b7bf3171911e69316
                        • Instruction ID: 7aca936f0f761df927d8a166a4c64241ed36f23a31073c0ffb7d9a61bdd9ec10
                        • Opcode Fuzzy Hash: 5c7417bebf4f01a27d941006e008478e09e3d9fac8895b3b7bf3171911e69316
                        • Instruction Fuzzy Hash: E7E0E5321303207BEA213626DC04B5BB6989F023A4F118110AC25E30D0DB25DE00A9A0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID:
                        • API String ID: 431132790-0
                        • Opcode ID: 4896d363d7196ea0d55f39db7a4a6bd1c37307202416999644e2ff5a49ca2a76
                        • Instruction ID: b4d1bb6542d6b12ea88a862201def172f272cd69b8677bc5ead0c98e66dad774
                        • Opcode Fuzzy Hash: 4896d363d7196ea0d55f39db7a4a6bd1c37307202416999644e2ff5a49ca2a76
                        • Instruction Fuzzy Hash: F7E075B2C4120EAADF00EFE4C442AEEBBB8AB04300F504126A605E6141EA7497859BA1
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C1B3A1
                          • Part of subcall function 00C1BEA5: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00C1BEB0
                          • Part of subcall function 00C1BEA5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C1BF18
                          • Part of subcall function 00C1BEA5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C1BF29
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: e86ce5c99732973a0beb019ce57af1c8c334c13e0bc27fb910d9698dabfa3fb4
                        • Instruction ID: 610cb603472948335b73f66d752e5182ed8fea2d30d0423fec3447f1f439b685
                        • Opcode Fuzzy Hash: e86ce5c99732973a0beb019ce57af1c8c334c13e0bc27fb910d9698dabfa3fb4
                        • Instruction Fuzzy Hash: A6B012C125A001BD760451151D02CBB015CC4D3BA2330411BFC04C5240DB804C8E3431
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C1B3A1
                          • Part of subcall function 00C1BEA5: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00C1BEB0
                          • Part of subcall function 00C1BEA5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C1BF18
                          • Part of subcall function 00C1BEA5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C1BF29
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 422d144e869eefa658975c196b355be52ebf97eef219d23be8ed7429e04c2128
                        • Instruction ID: 5ac89998a3976bf7d8e076fbbb42c000467bf7ddfded856ad18727a52cd6fade
                        • Opcode Fuzzy Hash: 422d144e869eefa658975c196b355be52ebf97eef219d23be8ed7429e04c2128
                        • Instruction Fuzzy Hash: 88B012D1258001BD760452151D02CB701DCC4D3B22B30411BFD04C4240DB804C8E3431
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C1B3A1
                          • Part of subcall function 00C1BEA5: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00C1BEB0
                          • Part of subcall function 00C1BEA5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C1BF18
                          • Part of subcall function 00C1BEA5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C1BF29
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 47b3b1e58bf870ee82bbdfd83190b549019156e0c27af3fbb7c5c9340eed41f4
                        • Instruction ID: e3776820c7d6170ab3c6939bba04ed563297da042526b73c74bf1d6864203fb6
                        • Opcode Fuzzy Hash: 47b3b1e58bf870ee82bbdfd83190b549019156e0c27af3fbb7c5c9340eed41f4
                        • Instruction Fuzzy Hash: 8DB012D1258401BD760451151D03DB7015CC4D3B22330411BFC04C4240EF804D8E3431
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C1B3A1
                          • Part of subcall function 00C1BEA5: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00C1BEB0
                          • Part of subcall function 00C1BEA5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C1BF18
                          • Part of subcall function 00C1BEA5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C1BF29
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 6306a5e26fda61180d42b8916e372a767d6a34df0dbc3a4cbe26b8b78d0e070e
                        • Instruction ID: 8fd0b054a3ac93deacb1e246d5d6187c61007a82c5e84f7aae4dcd867aa4547b
                        • Opcode Fuzzy Hash: 6306a5e26fda61180d42b8916e372a767d6a34df0dbc3a4cbe26b8b78d0e070e
                        • Instruction Fuzzy Hash: 77B012D1259501BD760451151C02DB7015CC4C3B22330421BFC04C4240DB804DCD3431
                        APIs
                        • CloseHandle.KERNEL32(?,2BB8795F,?,?,00000000,00C97393,000000FF), ref: 00B9F299
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 9ce16791955a6a46856b8ad2076eca00c3a70f40f615088ba475eb447c1ad83c
                        • Instruction ID: 5ddb17495924d4706e9f6fe511a4c1b356f8bcc6f80e9645504d57daccc6f905
                        • Opcode Fuzzy Hash: 9ce16791955a6a46856b8ad2076eca00c3a70f40f615088ba475eb447c1ad83c
                        • Instruction Fuzzy Hash: 9F112EB1904A45DFD710CF68C944B5ABBF9FB05730F108769E825D76D0D775AD048B80
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: 100$10000$100000$12000$120000$1500$15000$1500000$1800$2000$20000$200000$3000$30000$3000000$500$5000$6000$800$8000$AI_AppSearchEx$AI_ChainProductsPseudo$AI_CountRowAction$AI_DefaultActionCost$AI_DownloadPrereq$AI_ExtractPrereq$AI_Game$AI_GxInstall$AI_GxUninstall$AI_InstallPostPrerequisite$AI_InstallPrerequisite$AI_PreRequisite$AI_ProcessAccounts$AI_ProcessGroups$AI_ProcessTasks$AI_ScheduledTasks$AI_UninstallAccounts$AI_UninstallGroups$AI_UninstallTasks$AI_UserAccounts$AI_UserGroups$AI_XmlAttribute$AI_XmlElement$AI_XmlInstall$AI_XmlUninstall$AppId$AppSearch$BindImage$Complus$Component$Component_$CostFinalize$CostInitialize$CreateFolder$CreateFolders$CreateShortcuts$DuplicateFile$DuplicateFiles$Environment$Extension$Feature$Feature_$File$FileCost$FileSize$Font$IniFile$InstallFiles$InstallFinalize$InstallInitialize$InstallODBC$InstallServices$InstallValidate$Location$MIME$MoveFile$MoveFiles$MsiAssembly$MsiConfigureServices$MsiPublishAssemblies$MsiUnpublishAssemblies$ODBCDataSource$ODBCDriver$ODBCTranslator$Options$Patch$PatchFiles$PatchSize$ProcessComponents$ProgId$PublishComponent$PublishComponents$PublishFeatures$RegisterClassInfo$RegisterComPlus$RegisterExtensionInfo$RegisterFonts$RegisterMIMEInfo$RegisterProgIdInfo$RegisterTypeLibraries$Registry$RemoveDuplicateFiles$RemoveEnvironmentStrings$RemoveExistingProducts$RemoveFile$RemoveFiles$RemoveFolders$RemoveIniFile$RemoveIniValues$RemoveODBC$RemoveRegistry$RemoveRegistryValues$RemoveShortcuts$SelfReg$SelfRegModules$SelfUnregModules$ServiceControl$ServiceInstall$Shortcut$StartServices$StopServices$TypeLib$UnpublishComponents$UnpublishFeatures$UnregisterClassInfo$UnregisterComPlus$UnregisterExtensionInfo$UnregisterFonts$UnregisterMIMEInfo$UnregisterProgIdInfo$WriteEnvironmentStrings$WriteIniValues$WriteRegistryValues$~
                        • API String ID: 0-2910470256
                        • Opcode ID: 6a0a529b7ffda5368ddd4f9707f951c6bd281e4127cef546e0a63d495bfc3f49
                        • Instruction ID: b50983cf2ca6d926b30c6c31335d3d8a6bde82f585213044200607f37ac5cecd
                        • Opcode Fuzzy Hash: 6a0a529b7ffda5368ddd4f9707f951c6bd281e4127cef546e0a63d495bfc3f49
                        • Instruction Fuzzy Hash: 0B730860A48384A6EB55EB709E157AE7B219B62707F20436CFA416F3D1DFF4078487B2
                        APIs
                        • CreateFileW.KERNEL32(00D5D704,C0000000,00000003,00000000,00000004,00000080,00000000,2BB8795F,00D5D6E0,00D5D6F8,?), ref: 00B92F20
                        • GetLastError.KERNEL32 ref: 00B92F3D
                        • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 00B92FB6
                        • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 00B930BA
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 00B9312B
                        • WriteFile.KERNEL32(00000000,00D5CBD8,00000000,00000000,00000000,?,0000001C), ref: 00B9315B
                        • WriteFile.KERNEL32(00000000,000000B7,?,00000000,00000000,00CD28AC,00000002), ref: 00B93206
                        • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B9320F
                        • FlushFileBuffers.KERNEL32(00000000,?,0000001C), ref: 00B93160
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 00B93303
                        • WriteFile.KERNEL32(00000000,00000000,00000002,?,00000000,?,0000001D), ref: 00B93389
                        • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 00B93394
                        • WriteFile.KERNEL32(00000000,000000FF,?,00000000,00000000,00CD28AC,00000002,?,?,CPU: ,00000005), ref: 00B93408
                        • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B93411
                        • WriteFile.KERNEL32(00000000,000000B7,?,00000000,00000000,00CD28AC,00000002), ref: 00B93496
                        • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B9349F
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$BuffersFlushWrite$DebugOutputString$CreateErrorFindHeapLastPointerProcessResource
                        • String ID: CPU: $LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86
                        • API String ID: 611875259-1312762833
                        • Opcode ID: cd1c3bdc0a3e044d0921c3047e0bd8855ef59b429f4b6638949b05fe05173ec7
                        • Instruction ID: 062a11054fcd79081c3c14392259be7473b07a73fea4487c1aa9c951507a88a6
                        • Opcode Fuzzy Hash: cd1c3bdc0a3e044d0921c3047e0bd8855ef59b429f4b6638949b05fe05173ec7
                        • Instruction Fuzzy Hash: E1128E70A012099FDB10DF68CD49BAEBBF4FF05314F1482A8E815AB2A2DB74DE45CB50
                        APIs
                        • lstrcmpiW.KERNEL32(?,?,msix,00000004,?,?,?,?,?, ?(-|/)+q,00CD451E), ref: 00A6EF21
                        • lstrcmpiW.KERNEL32(?,?,msixbundle,0000000A,msix,00000004,?,?,?,?,?, ?(-|/)+q,00CD451E), ref: 00A6F0B1
                        • GetCurrentThreadId.KERNEL32 ref: 00A6F2A1
                        • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?, ?(-|/)+q,00CD451E), ref: 00A6F641
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F6C4
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F6CB
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F6D2
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F6E8
                        • GetCurrentThreadId.KERNEL32 ref: 00A6F8DE
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F9EF
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F9F6
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6F9FD
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00A6FA04
                          • Part of subcall function 00A52380: FindClose.KERNEL32(00000000), ref: 00A524BF
                          • Part of subcall function 00A52380: PathIsUNCW.SHLWAPI(?,*.*,00000000), ref: 00A52577
                          • Part of subcall function 00B616C0: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,2BB8795F,?,00000000), ref: 00B6170B
                          • Part of subcall function 00B616C0: GetLastError.KERNEL32(?,00000000), ref: 00B61715
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_$CurrentThreadlstrcmpi$CloseErrorFindFormatHeapLastMessagePathProcessSleep
                        • String ID: ?(-|/)+q$($Launch failed. Error:$Launching file:$Return code of launched file:$appx$msix$msixbundle
                        • API String ID: 3415484555-3482523422
                        • Opcode ID: a24e88e6895575b2581a864188ad88720acfaa68f7d2957e2f0344c13c4e80db
                        • Instruction ID: 38629a0eb73adc84a62b4c3ad0da7d2f6b79390187e03fe30311d4bf1b8390ce
                        • Opcode Fuzzy Hash: a24e88e6895575b2581a864188ad88720acfaa68f7d2957e2f0344c13c4e80db
                        • Instruction Fuzzy Hash: 5CA2AD71D00258DFDB24DF68C845BADB7B1BF45314F1482A9E419AB292EB70AE84CB91
                        APIs
                        • ShowWindow.USER32(?,00000000,2BB8795F,?,?), ref: 00AAA274
                        • ShowWindow.USER32(?,00000005,?,?), ref: 00AAA2A1
                        • GetWindowLongW.USER32(FFFFFFFB,000000F0), ref: 00AAA2D0
                        • SetWindowLongW.USER32(FFFFFFFB,000000F0,00000000), ref: 00AAA2EE
                        • NtdllDefWindowProc_W.NTDLL(FFFFFFFB,0000000C,?,?,?,?), ref: 00AAA301
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00AAA319
                        • GetWindowLongW.USER32(FFFFFFFB,000000F0), ref: 00AAA345
                        • SetWindowLongW.USER32(FFFFFFFB,000000F0,00000000), ref: 00AAA363
                        • NtdllDefWindowProc_W.NTDLL(FFFFFFFB,00000080,?,?,?,?), ref: 00AAA379
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00AAA391
                        • GetWindowLongW.USER32(0000000100000003,000000F0), ref: 00AAA445
                        • SetWindowLongW.USER32(0000000100000003,000000F0,00000000), ref: 00AAA463
                        • NtdllDefWindowProc_W.NTDLL(0000000100000003,00000086,?,00000000,?,?), ref: 00AAA475
                        • SetWindowLongW.USER32(0000000100000003,000000F0,00000000), ref: 00AAA487
                        • GetWindowRect.USER32(?,?), ref: 00AAA528
                        • SendMessageW.USER32(00000000,00000112,0000F060,00000000), ref: 00AAA724
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Long$NtdllProc_$Show$MessageRectSend
                        • String ID:
                        • API String ID: 4041393160-0
                        • Opcode ID: 28f6f6e7f2a4feca0b354135980777421ae476ec5bc9ea49eb7690bc7eba98be
                        • Instruction ID: 47016b1480c9f568445a558092ecc5b745d729e38a552b83e2dc864575ac023e
                        • Opcode Fuzzy Hash: 28f6f6e7f2a4feca0b354135980777421ae476ec5bc9ea49eb7690bc7eba98be
                        • Instruction Fuzzy Hash: 68323774900319EFDB21CF64C988BAEBBF1FF59320F248159E915AB2E0C771A840DB91
                        APIs
                        • FindClose.KERNEL32(00000000), ref: 00A524BF
                        • PathIsUNCW.SHLWAPI(?,*.*,00000000), ref: 00A52577
                        • FindFirstFileW.KERNEL32(?,?,*.*,00000000), ref: 00A526CC
                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 00A526E6
                        • GetFullPathNameW.KERNEL32(?,00000000,?,00000000), ref: 00A52719
                        • FindClose.KERNEL32(00000000,?,?), ref: 00A5277D
                        • SetLastError.KERNEL32(0000007B,?,?), ref: 00A52787
                        • _wcsrchr.LIBVCRUNTIME ref: 00A527DD
                        • _wcsrchr.LIBVCRUNTIME ref: 00A527FD
                        • PathIsUNCW.SHLWAPI(*.*,?,2BB8795F), ref: 00A52995
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Path$Find$CloseFullName_wcsrchr$ErrorFileFirstLast
                        • String ID: *.*$\\?\$\\?\UNC\
                        • API String ID: 1241272779-1700010636
                        • Opcode ID: 605409dd788af7b4b552cbe4f70cc3ab6e7946c772f887f5f8cd21b5ff044e83
                        • Instruction ID: a00bc72912e0f4def7d767e524d799a70f191e36b094c0acf6a672d01c55db9d
                        • Opcode Fuzzy Hash: 605409dd788af7b4b552cbe4f70cc3ab6e7946c772f887f5f8cd21b5ff044e83
                        • Instruction Fuzzy Hash: EC320270600601DFDB14DF68C989B6EF7B5FF66316F104228E8159B2A1EB71AD08CB90
                        APIs
                          • Part of subcall function 00A46B60: EnterCriticalSection.KERNEL32(00D629CC,2BB8795F,00000000,?,?,?,?,?,?,00A4638E,00C4930D,000000FF), ref: 00A46B9D
                          • Part of subcall function 00A46B60: LoadCursorW.USER32(00000000,00007F00), ref: 00A46C18
                          • Part of subcall function 00A46B60: LoadCursorW.USER32(00000000,00007F00), ref: 00A46CBE
                        • SysFreeString.OLEAUT32(00000000), ref: 00A46773
                        • SysAllocString.OLEAUT32(00000000), ref: 00A467A4
                        • GetWindowLongW.USER32(?,000000EC), ref: 00A4687B
                        • GetWindowLongW.USER32(?,000000EC), ref: 00A4688B
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A46896
                        • NtdllDefWindowProc_W.NTDLL(?,?,00000001,?), ref: 00A468A4
                        • GetWindowLongW.USER32(?,000000EB), ref: 00A468B2
                        • SetWindowTextW.USER32(?,00CCF96C), ref: 00A46951
                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00A46986
                        • GlobalLock.KERNEL32(00000000), ref: 00A46994
                        • GlobalUnlock.KERNEL32(?), ref: 00A469E8
                        • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00A46A73
                        • SysFreeString.OLEAUT32(00000000), ref: 00A46A8C
                        • NtdllDefWindowProc_W.NTDLL(?,?,?,00000000), ref: 00A46AD3
                        • SysFreeString.OLEAUT32(00000000), ref: 00A46AF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Long$String$FreeGlobal$AllocCursorLoadNtdllProc_$CriticalEnterLockSectionTextUnlock
                        • String ID:
                        • API String ID: 4180125975-0
                        • Opcode ID: 065581fcfeea02c5c54ecb3e791946bef9b3aaca4bf9224a1698adc0c7caa3c7
                        • Instruction ID: 2be3802e46215f8f2cc271981669109eb574bcd10d0d7ddcd4550b52a70280b9
                        • Opcode Fuzzy Hash: 065581fcfeea02c5c54ecb3e791946bef9b3aaca4bf9224a1698adc0c7caa3c7
                        • Instruction Fuzzy Hash: FFD1C075900309EFDB10DFA4CD48BAFBBB8EF86714F144169E811E7291DB759A04CBA2
                        APIs
                        • GetWindowLongW.USER32(?,000000EB), ref: 00A50643
                        • ShowWindow.USER32(00000000,?), ref: 00A50662
                        • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00A50670
                        • GetWindowRect.USER32(00000000,?), ref: 00A50687
                        • ShowWindow.USER32(00000000,?), ref: 00A506A8
                        • SetWindowLongW.USER32(?,000000EB,?), ref: 00A506BF
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        • ShowWindow.USER32(?,?), ref: 00A507FD
                        • GetWindowLongW.USER32(?,000000EB), ref: 00A5082C
                        • ShowWindow.USER32(?,?), ref: 00A50849
                        • GetWindowRect.USER32(?,?), ref: 00A5086E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$LongShow$Rect$AllocateHeap
                        • String ID:
                        • API String ID: 283321994-0
                        • Opcode ID: 80c3a78c9b094b086b27f1d31cb455091fbd62968836629021e3a70c835b88e3
                        • Instruction ID: 1d5d34050c6eb93db3f19d719ccd9e9add4cf95f221f8a99ddb0caaa9308b3b7
                        • Opcode Fuzzy Hash: 80c3a78c9b094b086b27f1d31cb455091fbd62968836629021e3a70c835b88e3
                        • Instruction Fuzzy Hash: 82422571A043089FCB24CFA8D984AAEBBF5FF89311F14465EE855EB260D730A949CF51
                        APIs
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • CopyFileW.KERNEL32(?,?,00000000,00000000,00000000), ref: 00B70E35
                        • CopyFileW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,?), ref: 00B713E6
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,00D5D6E0,00B93680,?), ref: 00B45F78
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00B45FAA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharCopyFileHeapMultiWide$AllocateFindProcessResource
                        • String ID: AI_PRODUCTNAME_ARP$InstanceId$ProductCode$ProductName$\\?\$instname-custom.mst$instname-target.msi$instname-template.msi${%0.8X-%0.4X-%0.4X-%0.2X%0.2X-%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X}
                        • API String ID: 2938402143-731456645
                        • Opcode ID: 5f393da0c53cc3d17c9a49fb3d435b8613bff01084d045e595230ea0c0851d4a
                        • Instruction ID: ec38ea095b8e59d34d4bec16cd6084496e4a47af05335e5f6e8d66a1dee9466f
                        • Opcode Fuzzy Hash: 5f393da0c53cc3d17c9a49fb3d435b8613bff01084d045e595230ea0c0851d4a
                        • Instruction Fuzzy Hash: B4E2AF71900649DBDB00DFACC945BAEBBF4EF45314F1481A9E419EB292EB34DE04CBA1
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • FindFirstFileW.KERNEL32(?,?,?,00000001), ref: 00B6CA82
                        • FindClose.KERNEL32(00000000), ref: 00B6CAB0
                        • FindClose.KERNEL32(00000000), ref: 00B6CB39
                        Strings
                        • No acceptable version found., xrefs: 00B6D04C
                        • No acceptable version found. Operating System not supported., xrefs: 00B6D03E
                        • No acceptable version found. It must be downloaded., xrefs: 00B6D030
                        • No acceptable version found. It is already downloaded and it will be installed., xrefs: 00B6D045
                        • Not selected for install., xrefs: 00B6D053
                        • No acceptable version found. It must be installed from package., xrefs: 00B6D029
                        • An acceptable version was found., xrefs: 00B6D022
                        • No acceptable version found. It must be downloaded manually from a site., xrefs: 00B6D037
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Find$Close$FileFirstHeapProcess
                        • String ID: An acceptable version was found.$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.
                        • API String ID: 4254541338-749633484
                        • Opcode ID: d5d7744b9fd4a2a011ec9ce586fb88ac035469bea8b7b3c41efa8c1d35505a00
                        • Instruction ID: f42b9b0114f8f024c3111e03d7cd5ddd2486d31998272b3f10d69e1fe0506bda
                        • Opcode Fuzzy Hash: d5d7744b9fd4a2a011ec9ce586fb88ac035469bea8b7b3c41efa8c1d35505a00
                        • Instruction Fuzzy Hash: E5F18B7190060ACFDB10DF28C9497AEFBF5EF45310F1486D9D899AB392DB389A44CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: = "$ AND $"', '$' AND `Control_`='$') TEMPORARY$', '$ControlEvent$Control_Default$Dialog$EndDialog$INSERT INTO `ControlEvent` (`Dialog_`, `Control_`,`Event`,`Argument`, `Condition`, `Ordering`) VALUES ('$`Dialog_`='
                        • API String ID: 0-200699992
                        • Opcode ID: a4e38bc7a4dfdfaf889ad5208e2c6e22354a5cbd2bcbdff2f824a70a774085d8
                        • Instruction ID: a048fb0ddc124775a5491145be2581080e06f96b670dac4b4a3de4f79df6f295
                        • Opcode Fuzzy Hash: a4e38bc7a4dfdfaf889ad5208e2c6e22354a5cbd2bcbdff2f824a70a774085d8
                        • Instruction Fuzzy Hash: B462AD70E00258DFDB14DF68CD84BEEBBB1BF59314F108299E409A7291DB74AA89CF51
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • CloseHandle.KERNEL32(?,2BB8795F,00000000), ref: 00B86631
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CloseHandleHeapProcess
                        • String ID:
                        • API String ID: 3728050799-0
                        • Opcode ID: 858c80a7d106379eaec3a01b218d137f2d5152adbb0164903420c6703d8939ea
                        • Instruction ID: 9a43cbf987bf3259f5f1b0bddbde3f70f4af93c24be5ba7d73fce1e781733e37
                        • Opcode Fuzzy Hash: 858c80a7d106379eaec3a01b218d137f2d5152adbb0164903420c6703d8939ea
                        • Instruction Fuzzy Hash: E162B9B0900659CFDB20DF28CD4479EBBF0AF46314F1482D9D548AB2A2DB749E85CF95
                        APIs
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A6B70F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: ' AND `Control_`='$AiTabPage$ControlEvent$Dialog$SpawnDialog$Title$`Dialog_`='
                        • API String ID: 3850602802-1412757306
                        • Opcode ID: f17b52f4e9f58abf560bba645d46181c89e9a2bc58ab9416929e655977c01911
                        • Instruction ID: 251856f83a394c9608ad15befeedc76813ec3376f6a7367feae8b1af9f81f3aa
                        • Opcode Fuzzy Hash: f17b52f4e9f58abf560bba645d46181c89e9a2bc58ab9416929e655977c01911
                        • Instruction Fuzzy Hash: C272AE71D10258CFDB14DF68C894BEEB7B1FF59304F148299E445AB391DB74AA84CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: $AI_DynInstances$AI_GenNewCompGuids$AI_MajorUpgrades$InstanceId$Manufacturer$OldProductCode$ProductCode$ProductVersion$UpgradeCode
                        • API String ID: 0-614494711
                        • Opcode ID: 9ef50375ce38334fbc44bb37fec1e4df6948366a2c19c28b8b2d9aee15fbfa4b
                        • Instruction ID: 747921e74666079644c686fa0dcc564910548c0adaff7b59638250d83d96e145
                        • Opcode Fuzzy Hash: 9ef50375ce38334fbc44bb37fec1e4df6948366a2c19c28b8b2d9aee15fbfa4b
                        • Instruction Fuzzy Hash: 6662F031D00258CFCB18CB64CD94BEEBBB1BF55315F148299E846B7291DB746E88CBA1
                        APIs
                        • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00A61461
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00A61982
                        • SendMessageW.USER32(?,0000102B,?,0000000F), ref: 00A61A30
                        • SendMessageW.USER32(?,00001003,00000001,?), ref: 00A61AD1
                          • Part of subcall function 00B52560: __cftof.LIBCMT ref: 00B525B0
                        • SendMessageW.USER32(?,0000101E,00000000,0000FFFE), ref: 00A61D08
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$ExclusiveLock$AcquireRelease$ConditionVariableWake__cftof
                        • String ID: AiFeatIco$Icon
                        • API String ID: 1739475930-1280411655
                        • Opcode ID: 856f08ff7de26004b67934b0eb4608a2ca36ac1f80bdaa896872dea2b4b0364d
                        • Instruction ID: 7b6f14f50c5c7acb0475a9e6566799aa78020d8790d3d7d1bfbc3e5f33d8ab81
                        • Opcode Fuzzy Hash: 856f08ff7de26004b67934b0eb4608a2ca36ac1f80bdaa896872dea2b4b0364d
                        • Instruction Fuzzy Hash: 7D626971900658DFDB24CF68CD88BEEBBB1BB49304F144199E45AAB391DB746E84CF90
                        APIs
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                        • GetStdHandle.KERNEL32(000000F5,?,2BB8795F,?,?), ref: 00B6472A
                        • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 00B64731
                        • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 00B64745
                        • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00B6474C
                        • GetStdHandle.KERNEL32(000000F5,000000FF,?,00000000,?,00000000,00CD28AC,00000002,?,?), ref: 00B647DB
                        • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00B647E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ConsoleHandle$AttributeExclusiveLockText$AcquireBufferInfoReleaseScreen
                        • String ID: Error
                        • API String ID: 3518662907-2619118453
                        • Opcode ID: 12ac7fdb75d7c5df327a7ba5c10c95a06f781d393cbda6c3001fad6e8d378025
                        • Instruction ID: ac82b6ecf4ee060019ba67d5503d2239915a7f39b975e2c979e75dabb8bcd34e
                        • Opcode Fuzzy Hash: 12ac7fdb75d7c5df327a7ba5c10c95a06f781d393cbda6c3001fad6e8d378025
                        • Instruction Fuzzy Hash: C9425970D0075ACBDB24CF68CD45BADBBB0FF55314F1042A9E419A7291EB786A84DFA0
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • _wcsrchr.LIBVCRUNTIME ref: 00B8F07D
                        • _wcsrchr.LIBVCRUNTIME ref: 00B8F0A5
                        • GetLogicalDriveStringsW.KERNEL32(00000064,?), ref: 00B8F0FE
                        • GetDriveTypeW.KERNEL32(?), ref: 00B8F11A
                        • Wow64DisableWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00B8F1A1
                        • Wow64RevertWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00B8F401
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Wow64$DriveRedirection_wcsrchr$DisableHeapLogicalProcessRevertStringsType
                        • String ID: ]%!
                        • API String ID: 1737443197-1069524040
                        • Opcode ID: 6fa6f8d098b97ec4bd5e1c9d07001980f9560db22b20d2474f911ed3038ead82
                        • Instruction ID: 45189be226d44071a0b24439caf924e233ea4c437481d62fd9984939eef60957
                        • Opcode Fuzzy Hash: 6fa6f8d098b97ec4bd5e1c9d07001980f9560db22b20d2474f911ed3038ead82
                        • Instruction Fuzzy Hash: 69F1927190055ACFDB24EF68C848BADB7F4EF55310F1481E9E459A72A2DB709E84CF90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireRelease$ConditionVariableWake
                        • String ID: AiVerMax$AiVerMin$MsiNTProductType$ServicePackLevel$ServicePackLevelMinor$VersionNT$VersionNT64$WindowsBuild
                        • API String ID: 4258034872-3011993468
                        • Opcode ID: 313f49b8cc36b78a0d6eb1ec68021c9dbe367ae0cdee39ea8d76f9e9d617a85a
                        • Instruction ID: 0167ee688c94d3bdbb0beeb5479a5d843e29d6e4ed94b9c4a8760aefd2cd76df
                        • Opcode Fuzzy Hash: 313f49b8cc36b78a0d6eb1ec68021c9dbe367ae0cdee39ea8d76f9e9d617a85a
                        • Instruction Fuzzy Hash: B0528C70A00258DFDB14DF68C994FADB7B1BF55304F15829DE40AAB391DB70AE84CBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 02d45b9efcf4cceb6864c0395dc181c1ec6ff01f0763061b09b8deac51941ae2
                        • Instruction ID: d5ad8e7543c7e0e6f0a7433df8937767c826179086a596c578b645a063904294
                        • Opcode Fuzzy Hash: 02d45b9efcf4cceb6864c0395dc181c1ec6ff01f0763061b09b8deac51941ae2
                        • Instruction Fuzzy Hash: 57D23871E082288FDB65CE28DD40BEAB7B5FB44305F1841EAD85DE7240E778AE858F41
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: ' AND `Control_`='$.xaml$AiTabPage$Binary.xaml$ControlEvent$D$`Dialog_`='
                        • API String ID: 0-3446021766
                        • Opcode ID: 5f3c8de74152b817f7177d14097fd25a9883b8d532c6d6fc6ab7fc5178c860a8
                        • Instruction ID: 701bcc9536d32ef4dc8050d6e67bc69ddca8dfd201068e1e32a34a8dbb682670
                        • Opcode Fuzzy Hash: 5f3c8de74152b817f7177d14097fd25a9883b8d532c6d6fc6ab7fc5178c860a8
                        • Instruction Fuzzy Hash: 51B29B70D00258DFDB24DB68C984BEEBBB5BF55300F1081D9E449A7292DB74AE88CF91
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • GetLastError.KERNEL32 ref: 00BA65DD
                        • CoInitialize.OLE32(00000000), ref: 00BA6B91
                        • CoCreateInstance.COMBASE(00CED46C,00000000,00000001,00CED47C,00000000), ref: 00BA6BC1
                        • CoUninitialize.COMBASE ref: 00BA6D78
                        Strings
                        • {374DE290-123F-4565-9164-39C4925E467B}, xrefs: 00BA6C0D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateErrorHeapInitializeInstanceLastProcessUninitialize
                        • String ID: {374DE290-123F-4565-9164-39C4925E467B}
                        • API String ID: 3594623390-4280329633
                        • Opcode ID: a2e35acdd82dd88f23e6b5f6b2eb130bd053e67b9ef1740871fa15cff12a0035
                        • Instruction ID: ff6f379e2b5804f684c7f5ea8cfbbcae1d4d7e69c82b387309004cfb09c0ac61
                        • Opcode Fuzzy Hash: a2e35acdd82dd88f23e6b5f6b2eb130bd053e67b9ef1740871fa15cff12a0035
                        • Instruction Fuzzy Hash: AF52C4B0A04705DBDB11DF68C849BAEB7F4EF56310F188199E801EB291EB75DD05CBA1
                        APIs
                        • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,2BB8795F,?,00000000,00000000), ref: 00BA38B1
                        • FindNextFileW.KERNEL32(?,00000000), ref: 00BA38CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: FileFind$FirstNext
                        • String ID:
                        • API String ID: 1690352074-0
                        • Opcode ID: 90c627d180ca4aa677840ffd97c61ce8c0d2a8c793b613554c6b839666bd7d16
                        • Instruction ID: cf5d468b9115a9509b12d0bc3d3d16a63f535ec19d50f8c96d0de8eec065a0e5
                        • Opcode Fuzzy Hash: 90c627d180ca4aa677840ffd97c61ce8c0d2a8c793b613554c6b839666bd7d16
                        • Instruction Fuzzy Hash: F1715C71900689DFDF10DFA8C948BDEBBF4FF19324F148169E815AB291DB349A04CB51
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000C,00C1E485,00000000,?,00C1E61D,?,?,?), ref: 00C1E56B
                        • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,00C1E61D,?,?,?), ref: 00C1E592
                        • HeapAlloc.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E599
                        • InitializeSListHead.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E5A6
                        • GetProcessHeap.KERNEL32(00000000,00000000,?,00C1E61D,?,?,?), ref: 00C1E5BB
                        • HeapFree.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E5C2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                        • String ID:
                        • API String ID: 1475849761-0
                        • Opcode ID: 5138155f82097367a4367c48654e1629bd2b8586de999e35d9e93585d6b8e06f
                        • Instruction ID: a49a4021d9bb2ffce48f1fcd42533d12f5453f3785ad07a245bfa4eb667b70f1
                        • Opcode Fuzzy Hash: 5138155f82097367a4367c48654e1629bd2b8586de999e35d9e93585d6b8e06f
                        • Instruction Fuzzy Hash: 51F0A4716016019BD7109F29AC08B1B77A9BF9A71AF00002AEE56C3250EB30CC408A60
                        APIs
                        • _wcsrchr.LIBVCRUNTIME ref: 00B5DBB8
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • FindFirstFileW.KERNEL32(?,00000000,?,?,00B712AD), ref: 00B5DCB8
                        • FindFirstFileW.KERNEL32(?,00000000,0000002A,?,00000000,?,?,00B712AD), ref: 00B5DD55
                        • FindClose.KERNEL32(00000000,?,00000000,?,?,00B712AD), ref: 00B5DD7B
                        • FindClose.KERNEL32(00000000,?,00000000,?,?,00B712AD), ref: 00B5DDC5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst$HeapProcess_wcsrchr
                        • String ID:
                        • API String ID: 968983534-0
                        • Opcode ID: 9a2f4f04524ebcfdd1aef3060c4b93c96ab18051b6aaa7fc898e58f3435a1fcc
                        • Instruction ID: 09986df320fa30365b25739ca4e9c50d61f8b44b0d7f4033b4d0696ea19cbc50
                        • Opcode Fuzzy Hash: 9a2f4f04524ebcfdd1aef3060c4b93c96ab18051b6aaa7fc898e58f3435a1fcc
                        • Instruction Fuzzy Hash: 8771E171A002459BDB20DF68CC44BAEB7F4FF4532AF1083A9E815972C0D7B49A48CB90
                        APIs
                        • GetProcessHeap.KERNEL32(?,00000000,00CCF96C,00000000), ref: 00ABCF10
                        • HeapFree.KERNEL32(00000000,?,00000000,00CCF96C,00000000), ref: 00ABCF16
                        Strings
                        • TextControlForeground, xrefs: 00ABCDC1
                        • TextControlForegroundFocused, xrefs: 00ABCD5C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID: TextControlForeground$TextControlForegroundFocused
                        • API String ID: 3859560861-993231238
                        • Opcode ID: 96fb94bc77c1138cd474fe8035158d4e350484cb6778929655ef64d18f1e7d19
                        • Instruction ID: df798de002541daafb67e303735338e22bc68a523ee80693c426d12e3f911ab7
                        • Opcode Fuzzy Hash: 96fb94bc77c1138cd474fe8035158d4e350484cb6778929655ef64d18f1e7d19
                        • Instruction Fuzzy Hash: AB52CD70D00248DFCB14DFA8C945BEEBBB4FF44324F20426DE515AB2A2DB74AA45CB91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 574ee3e7ae2eaa060d8c240e0e3effab78a123393c400bbf031c84402723425f
                        • Instruction ID: 8aebc513a61952906fe4b05dd8196701bad00ce187f2c82ed3ab1449940c010a
                        • Opcode Fuzzy Hash: 574ee3e7ae2eaa060d8c240e0e3effab78a123393c400bbf031c84402723425f
                        • Instruction Fuzzy Hash: B4B16972A14255AFDB15CF68C881BFEBBA5EF59310F14C16AE814AB342D234DE05CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ff6a4623c2b19e6940c81724913b12c32a59399eec6a6be32555447a9ca174a3
                        • Instruction ID: 08d0f40b605d66d8039acc0a52339a3964d35bb274305348dfb98ed87cb91911
                        • Opcode Fuzzy Hash: ff6a4623c2b19e6940c81724913b12c32a59399eec6a6be32555447a9ca174a3
                        • Instruction Fuzzy Hash: 77819B71911218DFDB50DF28CC89B99BBF4EF45314F1482E9E858AB292DB309E84CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: AI_CONTROL_VISUAL_STYLE$AI_CONTROL_VISUAL_STYLE_EX$AI_NO_BORDER_HOVER$AI_NO_BORDER_NORMAL
                        • API String ID: 0-932585912
                        • Opcode ID: 8b44b271bcb5eba36228a389ce1f11fb86a7534756dd1099af8b7c9c9c83b3d9
                        • Instruction ID: 28dc28eb5caf575f1d8f26d46f75b7fc7b8c7e27a2bb1899e3bb0cd555654f59
                        • Opcode Fuzzy Hash: 8b44b271bcb5eba36228a389ce1f11fb86a7534756dd1099af8b7c9c9c83b3d9
                        • Instruction Fuzzy Hash: 1042F571D002288FDB18DF68CC447ADB7B1FF95301F148259E895BB391DB78AA49CBA1
                        APIs
                        • RegCloseKey.ADVAPI32(00000033,?,?,00000002,00CCF96C,00000000,?,80000001,00000001,00000000,AppEvents\Schemes\Apps\Explorer\Navigating\.Current,00000033,2BB8795F), ref: 00A4EA74
                        • RegCloseKey.ADVAPI32(?,00000033,?,?,00CCF96C,00000000,?,80000001,00000000,00000000,AppEvents\Schemes\Apps\Explorer\Navigating\.Current,00000033,2BB8795F,?,?), ref: 00A4EC9D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Close
                        • String ID: AppEvents\Schemes\Apps\Explorer\Navigating\.Current
                        • API String ID: 3535843008-2431777889
                        • Opcode ID: 740705382c9eee5865610e0b28ef3e83f4e1cffe2de31e11cb7f849a2cfbb618
                        • Instruction ID: dbd5f16581a6b47cda4196d003b4c474a508b23b8afa5659ad5d3f3fbcc11812
                        • Opcode Fuzzy Hash: 740705382c9eee5865610e0b28ef3e83f4e1cffe2de31e11cb7f849a2cfbb618
                        • Instruction Fuzzy Hash: 2BF1CE71D102489FDB14DF68CD85BEEBBB5FF88310F208259E855B7281DB74AA84CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: /Kim
                        • API String ID: 0-585551710
                        • Opcode ID: 884db506bfeaa2d6a0d15d3727ced6282ffdbd57d2223ae0e919d8d6ed13b581
                        • Instruction ID: 5b16333f6bcaa78eaa4a671c482e23ba84d37cfb9dbbde6d95ddea9f452a4e85
                        • Opcode Fuzzy Hash: 884db506bfeaa2d6a0d15d3727ced6282ffdbd57d2223ae0e919d8d6ed13b581
                        • Instruction Fuzzy Hash: 1A81F372B087484FCB18CE2D88817AABBE2EBD8350F594A6DF489C7351D6B4DD05C792
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: __aulldvrm
                        • String ID: /Kim
                        • API String ID: 1302938615-585551710
                        • Opcode ID: ac2c661a9f34f89f6a13e63258d665641b0842ed8778d74f9f61d66a0ebdbb8c
                        • Instruction ID: 47d92442a93c354de89585325423ce89e5a5557c2b57223fbccde37147d4edb0
                        • Opcode Fuzzy Hash: ac2c661a9f34f89f6a13e63258d665641b0842ed8778d74f9f61d66a0ebdbb8c
                        • Instruction Fuzzy Hash: 51812672B087484FC708CE2D88806BABBD6EBD8350F59866EF448C7352D6B0DD09C792
                        APIs
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,00000000), ref: 00A7C98E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DiskFreeSpace
                        • String ID: OutOfDiskSpace$PrimaryVolumePath
                        • API String ID: 1705453755-3793120454
                        • Opcode ID: f16a0ab073aea282d667916b034ec5d9103ab6d957e00cf3a6ef23295da0b843
                        • Instruction ID: 0488f8f88ce5d3dd936bb20d1d48de12b375d7adbd9d8481319e343f9a36e7f3
                        • Opcode Fuzzy Hash: f16a0ab073aea282d667916b034ec5d9103ab6d957e00cf3a6ef23295da0b843
                        • Instruction Fuzzy Hash: D3719C31910258EFCB15DF68CD81BEDB7B5BF19310F148299F649A7282DB346E88CB91
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,00000000,?), ref: 00B9053C
                        • FindClose.KERNEL32(00000000), ref: 00B90687
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Find$AllocateCloseFileFirstHeap
                        • String ID: %d.%d.%d.%d
                        • API String ID: 1673784098-3491811756
                        • Opcode ID: a61114b611bcec949bb871744db636151e34d4fbd4e0faef2ed4196edaab99af
                        • Instruction ID: e34455d01be9bbd2f64c85d68bb4f3a680eb89c131d1ee1ef8742223e8b4a00c
                        • Opcode Fuzzy Hash: a61114b611bcec949bb871744db636151e34d4fbd4e0faef2ed4196edaab99af
                        • Instruction Fuzzy Hash: A7616A71905219DFDF20EF28C949B9DBBB4EF45314F1082E9E819AB291DB759E84CF80
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: <> "$ = "$Hide$Show
                        • API String ID: 0-289022205
                        • Opcode ID: 8e027d6d8f9fc904850d79d4ee387fb82d4ef15711bcb06882332972b5d34942
                        • Instruction ID: fef2856558947f54cbdcadb890025d5016f43e06b941e2db9758bef75b66ccda
                        • Opcode Fuzzy Hash: 8e027d6d8f9fc904850d79d4ee387fb82d4ef15711bcb06882332972b5d34942
                        • Instruction Fuzzy Hash: 97F17C70D00259CFDB14DF64C955BAEB7B1BF65304F1082DAE00A7B292DB746A84CFA1
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • GetLocaleInfoW.KERNEL32(?,00000002,00CCF96C,00000000), ref: 00B88CA1
                        • GetLocaleInfoW.KERNEL32(?,00000002,00B88815,-00000001,00000078,-00000001), ref: 00B88CDD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: InfoLocale$HeapProcess
                        • String ID: %d-%s
                        • API String ID: 3246605784-1781338863
                        • Opcode ID: 329d35fae1752b0d1cc4dea5ee41534ebbbe1e3a320948d47db11d345837c486
                        • Instruction ID: d692d7560ee7ba3214138a9b68ab16afce269a387840b33b4338990521b2cea2
                        • Opcode Fuzzy Hash: 329d35fae1752b0d1cc4dea5ee41534ebbbe1e3a320948d47db11d345837c486
                        • Instruction Fuzzy Hash: EE317C71900209ABDB00DF98CD4ABAEFBB8FF04725F10416DF515AB2D1DB759904CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: MultipleInstances$MultipleInstancesProps$OldProductCode$ProductCode
                        • API String ID: 0-469785651
                        • Opcode ID: 93e9e4fca5edb94b0af3bd7bc61b39e34dc30f255ceacedf8b1c193d3574d3a1
                        • Instruction ID: fcad8656a733851536fdb6db8707d507f781c42e2d8606d654ea8db5ac15ed60
                        • Opcode Fuzzy Hash: 93e9e4fca5edb94b0af3bd7bc61b39e34dc30f255ceacedf8b1c193d3574d3a1
                        • Instruction Fuzzy Hash: 57C1E176A10205CFCB18CF28C991ABAB7B2FF45307B15816DDD026B255EB30AD49CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: inf$nan$nan(ind)$nan(snan)
                        • API String ID: 0-3276396208
                        • Opcode ID: 7ec5a36ede4de6b80da23daffd63a8b4763d7611c9854a7785b1948e928002e4
                        • Instruction ID: 79fa5674dded60140f6d63494e644c87f345a50914df15ec1091dfbe6d3169be
                        • Opcode Fuzzy Hash: 7ec5a36ede4de6b80da23daffd63a8b4763d7611c9854a7785b1948e928002e4
                        • Instruction Fuzzy Hash: 8B713731B086418BD714DE2D98812BAB7D1EFD9310F588ABEE885D7340DAB4DD0A9792
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,2BB8795F,00000000,?), ref: 00B41279
                        • FindNextFileW.KERNEL32(000000FF,00000010), ref: 00B4137F
                        • FindClose.KERNEL32(000000FF), ref: 00B413D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 8628956f1a84a33ec60b374549f50732d8b5580d47bee48efd5cf1274d1871e8
                        • Instruction ID: 91f5285d2a9d17425346b2317369dfef41ea76f6aafb462e372fbab7e57c6c32
                        • Opcode Fuzzy Hash: 8628956f1a84a33ec60b374549f50732d8b5580d47bee48efd5cf1274d1871e8
                        • Instruction Fuzzy Hash: 8261A770E00259DFCF24DFA8C888BEEBBB8EB05310F1486A9E455A7281DB705E84DF51
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00C23C7B
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00C23C85
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00C23C92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: e94fa3e203d13638769c41c721eea3b39ac60f58761821b05e59f02ded811efa
                        • Instruction ID: 706809d77951544bd5e5cdbdb5e7785cee8b5294d6bd786edaafc23cc3b75b32
                        • Opcode Fuzzy Hash: e94fa3e203d13638769c41c721eea3b39ac60f58761821b05e59f02ded811efa
                        • Instruction Fuzzy Hash: 5531B575901228ABCB21DF28DD897CDBBB4BF08310F5042EAE41CA7251EB749F859F45
                        APIs
                        • LoadResource.KERNEL32(00000000,00000000,2BB8795F,00000001,00000000,?,00000000,00C45AD0,000000FF,?,00A3A15C,2BB8795F,?,?,*.*,?), ref: 00A3A1DB
                        • LockResource.KERNEL32(00000000,?,00A3A15C,2BB8795F,?,?,*.*,?,00000000,00C461A0,000000FF,?,00A3A300,?,?,*.*), ref: 00A3A1E6
                        • SizeofResource.KERNEL32(00000000,00000000,?,00A3A15C,2BB8795F,?,?,*.*,?,00000000,00C461A0,000000FF,?,00A3A300,?,?), ref: 00A3A1F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Resource$LoadLockSizeof
                        • String ID:
                        • API String ID: 2853612939-0
                        • Opcode ID: e6e04964b229d1072c740cdb41d0d623af8e8b492e70f3bdf14ec56311b0921a
                        • Instruction ID: e96dcb25ac0abde1456b12638ec0283be3f5811a3980c499c794c92291ce5dc7
                        • Opcode Fuzzy Hash: e6e04964b229d1072c740cdb41d0d623af8e8b492e70f3bdf14ec56311b0921a
                        • Instruction Fuzzy Hash: 7411EB72A00A249BCB34DF59DC45B7BF7E8EB9A721F01452AFC5AD3250E6369C008690
                        APIs
                        • GetWindowLongW.USER32(0000001B,000000FC), ref: 00A48CA9
                        • SetWindowLongW.USER32(0000001B,000000FC,?), ref: 00A48CB7
                        • DestroyWindow.USER32(0000001B,?,?,?,?,?,?,?,?,80004003,?,00000000,?,?,00CD1CCC), ref: 00A48CE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Long$Destroy
                        • String ID:
                        • API String ID: 3055081903-0
                        • Opcode ID: 5a4f6911907c2a6b3df06293b89262cc75db4234d229abd396fe2c54f2e48779
                        • Instruction ID: f4a04063ce0b1d3bf9a0ede73e2e7254915660ddba7ab537cdd0e2903414891e
                        • Opcode Fuzzy Hash: 5a4f6911907c2a6b3df06293b89262cc75db4234d229abd396fe2c54f2e48779
                        • Instruction Fuzzy Hash: 66F03034006B11DBDB615F28FD45B967BE0BF05732B00871DE8AAC66E0CB35A844DB10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: +$AI_TREE_ITEMS_IMAGES$AiRefreshCost
                        • API String ID: 0-77810284
                        • Opcode ID: 26d8b48ceacb7220b8a3e0d3120f5723069ef5352e73ea1abbacd7083942d250
                        • Instruction ID: b6fe95c134a4c5b608faca9ac7cbbb1c8460f00d701a56cc856d038ba435995b
                        • Opcode Fuzzy Hash: 26d8b48ceacb7220b8a3e0d3120f5723069ef5352e73ea1abbacd7083942d250
                        • Instruction Fuzzy Hash: 0E028C70D00348DFDB15CFA8C949BDEBBB0AF15304F24819EE445AB392DB755A48DBA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: ) AND ( $Show$gfff
                        • API String ID: 0-344708357
                        • Opcode ID: 683a8ac3cbf9ecddcf0ba9a702287f74a0aceb4e6bea801df7036d185b838215
                        • Instruction ID: 2eceefc80822b8722209f59e3bbd009412d51cacca7e1c5ca59fbbe62c07cba1
                        • Opcode Fuzzy Hash: 683a8ac3cbf9ecddcf0ba9a702287f74a0aceb4e6bea801df7036d185b838215
                        • Instruction Fuzzy Hash: 74D17871900658CFDB24DF68C945BAEBBF1EF45314F1482DDE44AAB281DB70AE84CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: ElevetionShield$V
                        • API String ID: 0-1713583497
                        • Opcode ID: 6421e042a7a75a5581ff748a68ac33cd6b02da310fcfc92b4c1cb13be978b19b
                        • Instruction ID: 955577e966296f1bc114a7042f9bf49e72ff9d489863342c97381a5bd325faa9
                        • Opcode Fuzzy Hash: 6421e042a7a75a5581ff748a68ac33cd6b02da310fcfc92b4c1cb13be978b19b
                        • Instruction Fuzzy Hash: 0FA28B70D01298DEDF20DFA8C985BDEBBB0BF15304F248199E449A7291DB746A88CF61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 423aa1991e8c071495ca86e1b201fe26525c53e52d190e3902999f40fa1ebccc
                        • Instruction ID: d531098343182f3959f7b57f12800cd0a72c377163843038acf3b612acf1d55e
                        • Opcode Fuzzy Hash: 423aa1991e8c071495ca86e1b201fe26525c53e52d190e3902999f40fa1ebccc
                        • Instruction Fuzzy Hash: 80F13071E002299FDF14CFA9D980AADB7B1FF48314F158269E825BB790D7309E45CB94
                        APIs
                        • SendMessageW.USER32(?,0000102B,00000000,00000001), ref: 00A62D1B
                        • SendMessageW.USER32(?,0000102B,?,-00000002), ref: 00A62F05
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: cf9d38beb7e2d2db1f441f5f60742031fe8e73806bcd2d8d4ad304d5ab7445c9
                        • Instruction ID: 572d39dfa6cfc9c2b4240d5ea4ab7bb6c5d6769c05b837160c04ed4184fcb6d2
                        • Opcode Fuzzy Hash: cf9d38beb7e2d2db1f441f5f60742031fe8e73806bcd2d8d4ad304d5ab7445c9
                        • Instruction Fuzzy Hash: 05B1D271A00646AFCB18CF24C995BE9FBF5FF19300F18826AE459DB291D735E950CB90
                        APIs
                        • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,2BB8795F,?,00000000), ref: 00B6170B
                        • GetLastError.KERNEL32(?,00000000), ref: 00B61715
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AllocateErrorFormatHeapLastMessage
                        • String ID:
                        • API String ID: 4114510652-0
                        • Opcode ID: 413656ee0495b9c95377400867f20db1ea36d787867d74f0140fab91bdc85de5
                        • Instruction ID: b757dab324a2b3d7eab59cfa2b972e51da476ad128fea6230d3d3b0e96c0d5e8
                        • Opcode Fuzzy Hash: 413656ee0495b9c95377400867f20db1ea36d787867d74f0140fab91bdc85de5
                        • Instruction Fuzzy Hash: 8241D2B2A002159FDB14CF99D9067BEF7F8EF44714F1806AAE805EB380DBB95D008791
                        APIs
                        • GetWindowLongW.USER32(00000004,000000FC), ref: 00A501A7
                        • SetWindowLongW.USER32(00000004,000000FC,?), ref: 00A501B9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: b998ff95f2de4d7fd05f6531a0c20f1dd05fcbe376f00b1b80a2f36cd3a17587
                        • Instruction ID: 11c526a7b042ed5be0511e4e3bc42c35b4eeab26be8d5b41f563a0ca1629dd73
                        • Opcode Fuzzy Hash: b998ff95f2de4d7fd05f6531a0c20f1dd05fcbe376f00b1b80a2f36cd3a17587
                        • Instruction Fuzzy Hash: FD415AB0A01B46EFDB10CF64D908B5ABBA4BF14325F104259E824DBA90D776A928DB90
                        APIs
                        • GetWindowLongW.USER32(00000000,000000FC), ref: 00AA974F
                        • SetWindowLongW.USER32(00000000,000000FC,?), ref: 00AA975D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: e717a3f4d874a8469a94a1eef834015b2e3b7cf2423160c97bc552083d0570d9
                        • Instruction ID: d3368877ce8aa3e9860e7b964fb73361f0cea84b891de05246d3e3c7e0d50c0a
                        • Opcode Fuzzy Hash: e717a3f4d874a8469a94a1eef834015b2e3b7cf2423160c97bc552083d0570d9
                        • Instruction Fuzzy Hash: 5D315971900609EFCB10DF69C984B9AFBB4FF05320F148269E825EB7D0D771A954CBA0
                        APIs
                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00C1DFF3,?,?,?,?,00B78640), ref: 00C1E249
                        • GetSystemTimeAsFileTime.KERNEL32(?,00000000,?,00C1DFF3,?,?,?,?,00B78640), ref: 00C1E24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Time$FileSystem$Precise
                        • String ID:
                        • API String ID: 743729956-0
                        • Opcode ID: 162c2c25bba815a504eff27197bdee8d428349912b11cdad6151bbe0ee435273
                        • Instruction ID: 454bedb8f781c815534d23139a6df0c0c75d72a8436e66bc1e326e3b9e809ff6
                        • Opcode Fuzzy Hash: 162c2c25bba815a504eff27197bdee8d428349912b11cdad6151bbe0ee435273
                        • Instruction Fuzzy Hash: 76D02232901238DB8A012B91FC047DCBB2CDE8BB217040013EC06C3220CB311C00AFE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2
                        • API String ID: 0-450215437
                        • Opcode ID: e6d37be5ca15f58824cdae2cc024159def93f4d826d525e321ff6bac9d99a7fa
                        • Instruction ID: c2815091679fe4153d41dab7ed1dbaeae3f52ff412d62ab29f9d929cc9ffe432
                        • Opcode Fuzzy Hash: e6d37be5ca15f58824cdae2cc024159def93f4d826d525e321ff6bac9d99a7fa
                        • Instruction Fuzzy Hash: 7852A0B1A083569BCB04DF69D99196FB7E5BF84304F00893EF49AD7241EB34D928C792
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: gfff
                        • API String ID: 0-1553575800
                        • Opcode ID: ea2b43c00c9b19c57762a5f41b424a3901e2a93ea3d96498973638769c5a1c79
                        • Instruction ID: 0fec1060d1f6e96e05cd62a7283093da405b3b30c7846eb9e6a3d925fa5ee051
                        • Opcode Fuzzy Hash: ea2b43c00c9b19c57762a5f41b424a3901e2a93ea3d96498973638769c5a1c79
                        • Instruction Fuzzy Hash: 87122635B043418BD7689E2CD9C53BDB6E6EB94300F14487EE996CB3A1E6BACD448707
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExceptionRaise__floor_pentium4
                        • String ID: unordered_map/set too long
                        • API String ID: 996205981-306623848
                        • Opcode ID: bd2ebba29bf7a6575b37855029f6be9a188cf4260edbd09d7034ad4b6d21f374
                        • Instruction ID: 0f2b55f4bc410bb6069ad0b7ad13eac4325e18d3d2d2e3df466fa1e7114db6a2
                        • Opcode Fuzzy Hash: bd2ebba29bf7a6575b37855029f6be9a188cf4260edbd09d7034ad4b6d21f374
                        • Instruction Fuzzy Hash: 6412F5B1A002099FCB15DF69C881AADFBF5FF49310F14826AE816EB391D735E941CB90
                        APIs
                          • Part of subcall function 00C36786: GetLastError.KERNEL32(?,?,00C2849E,?,?,00000000,?,00000003,00C23B82,?,00C23AF1,?,?,00C23D00), ref: 00C3678A
                          • Part of subcall function 00C36786: SetLastError.KERNEL32(00000000,?,00C23D00,?,?,?,?,?,00000000,?,?,?,00C34650,00D527B8,0000000C,00C3490E), ref: 00C3682C
                        • EnumSystemLocalesW.KERNEL32(00C3FA29,00000001,00000000,?,-00000050,?,00C4005A,00000000,?,?,?,00000055,?), ref: 00C3F975
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 85470f883d0411466018f88d904e2f95534584a77b5f1c1f74a126a9358ad9c3
                        • Instruction ID: 6dcee9a7a606915ff4a72f4c782d1c971360ddfdbcae1f6e9bf72188bdf3f76b
                        • Opcode Fuzzy Hash: 85470f883d0411466018f88d904e2f95534584a77b5f1c1f74a126a9358ad9c3
                        • Instruction Fuzzy Hash: A8113636610704AFDB189F79D89177AB791FF80328F14483DE54687600D3716903CB40
                        APIs
                          • Part of subcall function 00C36786: GetLastError.KERNEL32(?,?,00C2849E,?,?,00000000,?,00000003,00C23B82,?,00C23AF1,?,?,00C23D00), ref: 00C3678A
                          • Part of subcall function 00C36786: SetLastError.KERNEL32(00000000,?,00C23D00,?,?,?,?,?,00000000,?,?,?,00C34650,00D527B8,0000000C,00C3490E), ref: 00C3682C
                        • EnumSystemLocalesW.KERNEL32(00C3FC7C,00000001,0000000C,?,-00000050,?,00C4001E,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00C3F9E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: e0e5f3179f586abc49e20950175209faaa6d46ccfee48e301ad0c4b01b595d50
                        • Instruction ID: 1d53127aea1cff2550d978e098e2407886fbf330ddbca736a00b94b750cb0206
                        • Opcode Fuzzy Hash: e0e5f3179f586abc49e20950175209faaa6d46ccfee48e301ad0c4b01b595d50
                        • Instruction Fuzzy Hash: 6EF022366103086FDB245F389881B6A7B91EF81368F15493DF9018B690C6719C42C650
                        APIs
                          • Part of subcall function 00C36786: GetLastError.KERNEL32(?,?,00C2849E,?,?,00000000,?,00000003,00C23B82,?,00C23AF1,?,?,00C23D00), ref: 00C3678A
                          • Part of subcall function 00C36786: SetLastError.KERNEL32(00000000,?,00C23D00,?,?,?,?,?,00000000,?,?,?,00C34650,00D527B8,0000000C,00C3490E), ref: 00C3682C
                        • EnumSystemLocalesW.KERNEL32(00C3F811,00000001,0000000C,?,?,00C4007C,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00C3F8EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: cd97790442d85cf5244fd2486dde1a3743839335a9546cb5add4ecca845c256f
                        • Instruction ID: 7394d950951d8100915dfbf51745750e50ce93a749c043a3ba43ceb5e16129cf
                        • Opcode Fuzzy Hash: cd97790442d85cf5244fd2486dde1a3743839335a9546cb5add4ecca845c256f
                        • Instruction Fuzzy Hash: 1AF0553AB003086BCB08AF39D80576ABF94EFC2724F06406DEA058B290C2319D43C790
                        APIs
                        • NtdllDefWindowProc_W.NTDLL(?,?,00000000,00000000,00A60717,?,?,?), ref: 00A5B450
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: NtdllProc_Window
                        • String ID:
                        • API String ID: 4255912815-0
                        • Opcode ID: 711a4541e16f757f54e4146b307357e25365b300fd87b49f0e67b299c20de850
                        • Instruction ID: 9a7fa9a16906209d9706ba1d524b00c5d96d24ee61f577087fd19083730b0acb
                        • Opcode Fuzzy Hash: 711a4541e16f757f54e4146b307357e25365b300fd87b49f0e67b299c20de850
                        • Instruction Fuzzy Hash: A1F05E34024245EFE7258F54C858A79B7B6FB44317F4445E6E884C5562D3358D59DE30
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00C35ED0,?,20001004,00000000,00000002,?,?,00C354D2), ref: 00C3872A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 4e4de0e757eab534b8197835306d86a4e274b55abb489b67bb26233c9343464c
                        • Instruction ID: 0c7c2a32bac44364a277385f761935152075c1de95e7c6819b3287397eba08d9
                        • Opcode Fuzzy Hash: 4e4de0e757eab534b8197835306d86a4e274b55abb489b67bb26233c9343464c
                        • Instruction Fuzzy Hash: 44E04F31511628FBCF122F61DC08B9E7F16EF45760F104011FD1566162CF729D25AAD5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0e+00
                        • API String ID: 0-2793203700
                        • Opcode ID: 891f300ee4578775ff5a195a601a65ca0d0038f0b5df74d7a2a3bb316f28f745
                        • Instruction ID: b9223dfe41923568589b3a3f7d45d1b7e4d1835cb56f7a2ae6e44e8e83f75f0d
                        • Opcode Fuzzy Hash: 891f300ee4578775ff5a195a601a65ca0d0038f0b5df74d7a2a3bb316f28f745
                        • Instruction Fuzzy Hash: FF61D232F083098BC7089E2D9C913AAF7E1EBC9350F48467DF949CB391E6B5D9488781
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7ade833c4cac4ee5ba55a59260bc7c061021ca901487469528522075e01916de
                        • Instruction ID: 41bb9a5f3b67519dc4674a389eba5a87d6f80298ebaacb597a417f3f842a1482
                        • Opcode Fuzzy Hash: 7ade833c4cac4ee5ba55a59260bc7c061021ca901487469528522075e01916de
                        • Instruction Fuzzy Hash: CF725970D00269CFDB24DF68CD45BEDBBB4AF14304F1081E9E858A7292EB749A85DF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 72db8719782bc2cc37eda25ac61ad2ff5f58557fd9f548eca9a0b3d487e96489
                        • Instruction ID: 5d3920460c0e59b1032e8936f69240ba864ff98bc65e5c068584d6378b28a052
                        • Opcode Fuzzy Hash: 72db8719782bc2cc37eda25ac61ad2ff5f58557fd9f548eca9a0b3d487e96489
                        • Instruction Fuzzy Hash: 1702B132B083564FC718CE2DC8916AAF7D6EBD8350F484A6DE885C7391DA74DD49CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ea46f1a9dc83f3b045535a86bf9e991aa4413d7dcb551506b6eb226ac1528f6a
                        • Instruction ID: e2cc0824d7b59395ac918f6a4bb46d086a9d35f6f983fdde8dd23bce9936c85f
                        • Opcode Fuzzy Hash: ea46f1a9dc83f3b045535a86bf9e991aa4413d7dcb551506b6eb226ac1528f6a
                        • Instruction Fuzzy Hash: A4D1E075A083518FC7148F28C8806AABBE1EBD9340F584A7EFA99C7351E7B1D905C782
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d835544d8bbef956da019e9a9dbc615793c6606258e93a25dfabbfbdc2c94e08
                        • Instruction ID: bf22012ef5e82fc2c59ecbb3109a28f79327aa2d67c239b8fa4cdcfe91b543b3
                        • Opcode Fuzzy Hash: d835544d8bbef956da019e9a9dbc615793c6606258e93a25dfabbfbdc2c94e08
                        • Instruction Fuzzy Hash: 6AE1CF70A087258FCB24CF68E4C4A6EB7F1FF45310B244B5DE4669BA91D730AE41CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 156db8f513f2d5f8d000a2910508acc26875950f66462aef7599a54e7cbdca93
                        • Instruction ID: 9a8e5b35360276fe24ab1257faf3ea14921cf5d9aca1f2f343152144f6dc5d37
                        • Opcode Fuzzy Hash: 156db8f513f2d5f8d000a2910508acc26875950f66462aef7599a54e7cbdca93
                        • Instruction Fuzzy Hash: C2E169B1900209AFCB14CF68C591BADFBF5FF08350F15826AE819AB391D775AA40CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 85b53aa0918ac14a443af001173dbb8725401621a8ff4b2b64c770ed282ad99d
                        • Instruction ID: 145f6c5e4a63046c1f276e5db7202968802a79077a2edb00e7ca4f0802a9edb3
                        • Opcode Fuzzy Hash: 85b53aa0918ac14a443af001173dbb8725401621a8ff4b2b64c770ed282ad99d
                        • Instruction Fuzzy Hash: 45C1F230608666CFCB28CF68E4D46BEBBB1BF05310F24471DE86697AA1C730AE45DB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 54edb6517d666f24f99120c0a34d56e2e5e786cbcf89b9f0deb22c785def0d89
                        • Instruction ID: 43114aa6958d1770133cd7d9005c809d3f95f9400f282a9a53b90958ef10ad41
                        • Opcode Fuzzy Hash: 54edb6517d666f24f99120c0a34d56e2e5e786cbcf89b9f0deb22c785def0d89
                        • Instruction Fuzzy Hash: 4C91A272B043154FD708CE2DCD9136AF6E6ABC8314F19853EF99AC73A1E679D8418A81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 721425040fc8ad6a5c666584ca5512f036834d75ae285096be3a2e9b4d92c346
                        • Instruction ID: 18ac7df2e12655e71fc87efac3233d512df49c00c5ad9c5020b8c31f2c32a4d6
                        • Opcode Fuzzy Hash: 721425040fc8ad6a5c666584ca5512f036834d75ae285096be3a2e9b4d92c346
                        • Instruction Fuzzy Hash: 0671F372B183068FC304CE2DD84126BBBD6EBD8360F184A6DE495D7380DA74D909C782
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateHeapInstanceProcess
                        • String ID:
                        • API String ID: 776714826-0
                        • Opcode ID: e70ea4b4bdc9ef896914aa1aefb4eb8bf6f745cf4ccb7e271fec918f53c1d133
                        • Instruction ID: e78937e63dcef7b347d9ab4048bcd0b667cb9d8d7e88619c51d629858d78cd4e
                        • Opcode Fuzzy Hash: e70ea4b4bdc9ef896914aa1aefb4eb8bf6f745cf4ccb7e271fec918f53c1d133
                        • Instruction Fuzzy Hash: 4B6127B0500B44DFEB20CF24C54838ABBE0FF15318F14899DD59A9B792D7B9A609DF91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4cdafc43a34f6bba948d3df0dd6b405e0a536168ca6d4991192787c06e5a474e
                        • Instruction ID: 3e6e7c2cd571a304d84d9cd382356b930320eeae93af4a131ee59455555a0457
                        • Opcode Fuzzy Hash: 4cdafc43a34f6bba948d3df0dd6b405e0a536168ca6d4991192787c06e5a474e
                        • Instruction Fuzzy Hash: 6971F7B1801B48CFE761CF78C94578ABBF0BB05324F148A5ED4A99B3D1D3B96648CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 414d79b5f1c1cff376574cec94b6b6bc1fa8ee77bef934ef1840f8c7efccb908
                        • Instruction ID: 4b0108116fa80a7359b73108ad4903b00db2496df1a513e6bc2c4201a453136e
                        • Opcode Fuzzy Hash: 414d79b5f1c1cff376574cec94b6b6bc1fa8ee77bef934ef1840f8c7efccb908
                        • Instruction Fuzzy Hash: DC418F213092414BDF0C8E1958912FABBD0EBA5210B5885EFF4C7DB302E6E99C0E9792
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9ea1200c054fea38aee7ac9da3a1ac60d0f04c8ed2d49ca0de94e64abd5b9fc9
                        • Instruction ID: c0959f969f64cf2a7d8e6b04312d2623e37abaaad6ebce261ba5358abcc8b87a
                        • Opcode Fuzzy Hash: 9ea1200c054fea38aee7ac9da3a1ac60d0f04c8ed2d49ca0de94e64abd5b9fc9
                        • Instruction Fuzzy Hash: C33185353096414BDB2CCE1D54A16FABBD1EFD9710B5405EFE4C2CB306E6A19A0AD3D1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6afe253b12aaa36d717f23001545720c63f362d899c67ef4601615383a87c1ca
                        • Instruction ID: b6a414a97689e09828fc7d1720219637508182113ae8007bf090aa1ea01340b5
                        • Opcode Fuzzy Hash: 6afe253b12aaa36d717f23001545720c63f362d899c67ef4601615383a87c1ca
                        • Instruction Fuzzy Hash: 9C21B436760A464B9B4CCB2DEC7667532D1E789301788D27DEA5BCB3D1D7388526C350
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5b64694bd0bd86c9862a2dea96c8742bde909f85350a1bf6dc3dc7d4522650f2
                        • Instruction ID: f1b2d4efdafbeadd46167e9ceaca00555425c2673d8f08e17136ea06d9388f9c
                        • Opcode Fuzzy Hash: 5b64694bd0bd86c9862a2dea96c8742bde909f85350a1bf6dc3dc7d4522650f2
                        • Instruction Fuzzy Hash: 124105B0901745EED704CF69C10878AFBF0BF19318F20825ED4589B781D3BAA658CBD5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ac147965d66c62bac3ed93aa4071217dce98f22ca9bb5c542212825fd03847d3
                        • Instruction ID: e6b1a3cd6cd0912796238f52681e4332f0eaea4e1a5614bf67b2bde486d118e7
                        • Opcode Fuzzy Hash: ac147965d66c62bac3ed93aa4071217dce98f22ca9bb5c542212825fd03847d3
                        • Instruction Fuzzy Hash: 612149B0804748DFD711CF58C94478ABBF4FB19324F11869ED855AB791D3B5AA48CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5101c79d3743cbd67b8cd067ad56e5887bbcb1f186c2a39a1c7576eb54154aec
                        • Instruction ID: 9b221a5f3b96f84f1046ebedf87dc096a3d8dbb6f317c571e007e168aa1a9f44
                        • Opcode Fuzzy Hash: 5101c79d3743cbd67b8cd067ad56e5887bbcb1f186c2a39a1c7576eb54154aec
                        • Instruction Fuzzy Hash: 25215BB0804748DFD710CF58C90478ABBF4FB09324F11869ED8559B791D3B5AA48CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 568934e9cd4b8a789b0dda2af28bdcfee0ea9a560d3a656c98d54472299bcb85
                        • Instruction ID: 3f377e06cce73c0653e18ec16353542de01e1278170c8deb2f75fe1c11a09937
                        • Opcode Fuzzy Hash: 568934e9cd4b8a789b0dda2af28bdcfee0ea9a560d3a656c98d54472299bcb85
                        • Instruction Fuzzy Hash: 5A11EDB5905348DFDB40CF58C544749BBF4FB08328F2082AEE8189B381D3769A06CF80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7256d12ef092ee44ad0c7fe8bab721573f741716e9995ed85113c18b9f43381b
                        • Instruction ID: 47bdde214123cc9734df30b94e0ccb549da7877a8b284b9f1c11bcbbe698a02f
                        • Opcode Fuzzy Hash: 7256d12ef092ee44ad0c7fe8bab721573f741716e9995ed85113c18b9f43381b
                        • Instruction Fuzzy Hash: 95F03032661324DFCB26C748C405A5973E8EB49B59F115096F611D7250CBB0DE44D7D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 52a31a1b2c87d20f6f1ccd6e3f5e56cdbfee1b29986efbea090f4dac1cf3a30c
                        • Instruction ID: 460753f371a83088e2df055b2f25f02d1bccfcd3f468b739903825441daca6b1
                        • Opcode Fuzzy Hash: 52a31a1b2c87d20f6f1ccd6e3f5e56cdbfee1b29986efbea090f4dac1cf3a30c
                        • Instruction Fuzzy Hash: 5EE08C32921228EBCB14DB98C90498AF3ECEB44B00F154896F501D3204C670DF05E7D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ac3d887da81fdedc6452c1d6739ee335ce7b001dbe01c7d1735001e7da883b1b
                        • Instruction ID: ca319bbba09d17283884057d0e3d673d69000ea16b4e7a93c024371302ff5b5a
                        • Opcode Fuzzy Hash: ac3d887da81fdedc6452c1d6739ee335ce7b001dbe01c7d1735001e7da883b1b
                        • Instruction Fuzzy Hash: 2BC08C34011A50CBCE298912A6713A93354E3A17D2FA0048EC9120BA42DE1E9D86F602
                        APIs
                        • RegOpenKeyExW.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 00B63BF0
                        • RegQueryValueExW.ADVAPI32(00000000,ProductType,00000000,00000000,?), ref: 00B63C2B
                        • RegQueryValueExW.ADVAPI32(00000000,ProductSuite,00000000,00000000,?,?), ref: 00B63CA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B63E7E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: QueryValue$CloseOpen
                        • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
                        • API String ID: 1586453840-3149529848
                        • Opcode ID: 374c226cda459a892094ba7275f18576b2870add462406b424cb9b0d3d4f186f
                        • Instruction ID: 45dc496ac1eb68b3556321118838ab57090f5a7ee26fbd584af04dda648ed612
                        • Opcode Fuzzy Hash: 374c226cda459a892094ba7275f18576b2870add462406b424cb9b0d3d4f186f
                        • Instruction Fuzzy Hash: 2A71C8707003488ADF209B35CD817AA76E9EB51B14F5040F9ED0AE7691FB3DCE498B60
                        APIs
                        • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00B6386E
                        • RegQueryValueExW.ADVAPI32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00B638B5
                        • RegQueryValueExW.ADVAPI32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00B638D4
                        • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00B63903
                        • RegQueryValueExW.ADVAPI32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00B63978
                        • RegQueryValueExW.ADVAPI32(00000000,ReleaseId,00000000,00000000,?,?), ref: 00B639EB
                        • RegQueryValueExW.ADVAPI32(00000000,CSDVersion,00000000,00000000,?,?), ref: 00B63A3D
                        • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00B63AD3
                        • GetProcAddress.KERNEL32(00000000), ref: 00B63ADA
                        • GetCurrentProcess.KERNEL32(?), ref: 00B63B11
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B63B52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: QueryValue$AddressCloseCurrentHandleModuleOpenProcProcess
                        • String ID: CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32
                        • API String ID: 3667490055-3583743485
                        • Opcode ID: 9e690d37cdad2f4e1296fd9769aaf49a3a5debce1e33f1b7449a11e2b3eb334a
                        • Instruction ID: 869b48dc23429ee46b2f5e00a74162b6139d989eec83c783e9fe63e4a61c36a0
                        • Opcode Fuzzy Hash: 9e690d37cdad2f4e1296fd9769aaf49a3a5debce1e33f1b7449a11e2b3eb334a
                        • Instruction Fuzzy Hash: 6F916FB19017589EDB20CF10CC45BA9B7F5EB45B11F0002E6E909A7290EB769B94CF60
                        Strings
                        • txt, xrefs: 00B999C3
                        • ps1, xrefs: 00B99996, 00B999A8, 00B999B2
                        • Unable to retrieve exit code from process., xrefs: 00B99C6F
                        • Unable to get a temp file for script output, temp path: , xrefs: 00B999FD
                        • Unable to retrieve PowerShell output from file: , xrefs: 00B99C4C
                        • powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new, xrefs: 00B99A4D
                        • Unable to create process: , xrefs: 00B99AF2
                        • Unable to find file , xrefs: 00B99923
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID: Unable to create process: $Unable to find file $Unable to get a temp file for script output, temp path: $Unable to retrieve PowerShell output from file: $Unable to retrieve exit code from process.$powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new$ps1$txt
                        • API String ID: 0-4129021124
                        • Opcode ID: 61bde506dd982df484f0b8a66da7961c134383821611fd935a9118f69d9ce4d3
                        • Instruction ID: 46d9e4f22e7ac30a42182f547f839e8e9740710d317f297766a4d5626a419513
                        • Opcode Fuzzy Hash: 61bde506dd982df484f0b8a66da7961c134383821611fd935a9118f69d9ce4d3
                        • Instruction Fuzzy Hash: C5C1BC70D01649ABDF10DBA8CD45BAEBBF8FF19310F1082A9F515AB291DB749A01CB91
                        APIs
                        • lstrcmpW.KERNEL32(?,#32770), ref: 00A48DF7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: lstrcmp
                        • String ID: #32770
                        • API String ID: 1534048567-463685578
                        • Opcode ID: bf1ba7835bb9fcb15fc267a51b6580754002118485bdf04367b6a97d97e1831e
                        • Instruction ID: e5b66707dae6a2e6714f1523cf29cdd6398c834dae9f6ae63755e8f1161d75d1
                        • Opcode Fuzzy Hash: bf1ba7835bb9fcb15fc267a51b6580754002118485bdf04367b6a97d97e1831e
                        • Instruction Fuzzy Hash: B4027E74A00309EFDB14CFA8D948BAEBBF5FF89714F144559F805AB290DB79A944CB20
                        APIs
                        • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,2BB8795F,000000B4,?), ref: 00A3EF30
                        • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A3EF36
                        • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?,?,?,?,?,?,?,?,?,?,?,2BB8795F,00C47765), ref: 00A3EF6C
                        • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A3EF72
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$Windows.Foundation.Uri$combase.dll
                        • API String ID: 2574300362-3956872289
                        • Opcode ID: 5745c8f5e9e15bb111750f20ab762c3cafc1d5c63b1b6258dae84d6ea5bfd5ec
                        • Instruction ID: c2f9bd45e6302e08277e57371aea90d4f7fe0cb554e51d05af565fdf828f7c64
                        • Opcode Fuzzy Hash: 5745c8f5e9e15bb111750f20ab762c3cafc1d5c63b1b6258dae84d6ea5bfd5ec
                        • Instruction Fuzzy Hash: 2F027B71D10209EFDB14DFA8D945BAEBBB4FF08714F204229F915A7390EB74AA44CB90
                        APIs
                        • GetDlgItem.USER32(00000007,000001F6), ref: 00B6A49E
                        • GetDlgItem.USER32(00000007,000001F8), ref: 00B6A4AB
                        • GetDlgItem.USER32(00000007,000001F7), ref: 00B6A4ED
                        • SetWindowTextW.USER32(00000000,?), ref: 00B6A4FC
                        • ShowWindow.USER32(?,00000005), ref: 00B6A562
                        • GetDlgItem.USER32(00000007,000001F7), ref: 00B6A584
                        • SetWindowTextW.USER32(00000000,?), ref: 00B6A593
                        • ShowWindow.USER32(?,00000000), ref: 00B6A5F8
                        • ShowWindow.USER32(?,00000000), ref: 00B6A5FF
                        • SetWindowPos.USER32(00000007,00000000,00000000,00000000,?,?,00000616), ref: 00B6A648
                        • GetDlgItem.USER32(?,00000000), ref: 00B6A67A
                        • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014,?,00000000,?,?,00000616), ref: 00B6A6D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Item$Show$Text
                        • String ID: Details <<$Details >>
                        • API String ID: 2476474966-3763984547
                        • Opcode ID: 1bff7e32babab027c3d12649d5047997eb9dce8578a3a9abb993fdce1810b332
                        • Instruction ID: 7379adbd7f37a3e9cfb79d3512d9be405efe141b1b7ad4e64d2600096012095c
                        • Opcode Fuzzy Hash: 1bff7e32babab027c3d12649d5047997eb9dce8578a3a9abb993fdce1810b332
                        • Instruction Fuzzy Hash: DB91AC71D00209ABDF049F68DD85BAEBBB5FF58310F148259F801B7690DB34A990DFA1
                        APIs
                        • GetCurrentProcess.KERNEL32(?,2BB8795F,?), ref: 00B7C299
                        • IsWow64Process.KERNEL32(00000000), ref: 00B7C2A0
                          • Part of subcall function 00B5DE10: _wcsrchr.LIBVCRUNTIME ref: 00B5DE49
                        • _wcsrchr.LIBVCRUNTIME ref: 00B7C321
                        • _wcsrchr.LIBVCRUNTIME ref: 00B7C3B7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: _wcsrchr$Process$CurrentWow64
                        • String ID: "%s" $ /fvomus //$ /i //$ /p //$ EXE_CMD_LINE="%s "$ TRANSFORMS=":%d"$%s AI_SETUPEXEPATH="%s" SETUPEXEDIR="%s"$.x64
                        • API String ID: 657290924-2074823060
                        • Opcode ID: fa83cce3af9bc2860f92b7f244cfb8fcb3c6644b6148b85a475340496a1f75ab
                        • Instruction ID: 60b7187addb5ac97f5ea0ef384706c656c15ec481f39734ed4fb8287e9223eae
                        • Opcode Fuzzy Hash: fa83cce3af9bc2860f92b7f244cfb8fcb3c6644b6148b85a475340496a1f75ab
                        • Instruction Fuzzy Hash: 6BF1C131A006459FDB04DF68C955BAEBBF4FF05311F1482ADE829AB292DB74ED04CB91
                        APIs
                        • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,00000043), ref: 00A6E738
                        • GetProcAddress.KERNEL32(00000000,InitializeEmbeddedUI), ref: 00A6E751
                        • GetProcAddress.KERNEL32(00000043,ShutdownEmbeddedUI), ref: 00A6E75D
                        • GetProcAddress.KERNEL32(00000043,EmbeddedUIHandler), ref: 00A6E76A
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressProc$Heap$AllocateLibraryLoadProcess
                        • String ID: build $21.0.1$2178626c$EmbeddedUIHandler$INAN$InitializeEmbeddedUI$SELECT `Data` FROM `Binary` WHERE `Name` = 'InstallerAnalytics.dll'$ShutdownEmbeddedUI
                        • API String ID: 230625546-3827178392
                        • Opcode ID: 7194cf477b22b51cf111f14487d30303cd7da8c5904611c69dc75bb3df2d46b5
                        • Instruction ID: b51359c17311003868a2c3348caff831c94935af18aaf71e61f323d21b5279ba
                        • Opcode Fuzzy Hash: 7194cf477b22b51cf111f14487d30303cd7da8c5904611c69dc75bb3df2d46b5
                        • Instruction Fuzzy Hash: E0D1A075E002099FDB04DFA8CD45BEEBBB4FF18310F144669E915AB391EB74AA44CB90
                        APIs
                        • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,2BB8795F,00000000,?,?,?,?,?,?,?,?,?,?,?,2BB8795F), ref: 00A3F83B
                        • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A3F841
                        • LoadLibraryW.KERNEL32(?,.dll,-00000001,00000000,00CCF96C,00000000,00000000,00000000), ref: 00A3F9DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LibraryLoad$AddressProc
                        • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                        • API String ID: 1469910268-2454113998
                        • Opcode ID: 4e3d4afcfa27c546e9eddaaa9f3b4beb775c65c320ea30c05a3918597b84e40f
                        • Instruction ID: f0693d6c438a8de22ee26d02dab32bdcc6070f0403f5a68ed841ccd5aea83b54
                        • Opcode Fuzzy Hash: 4e3d4afcfa27c546e9eddaaa9f3b4beb775c65c320ea30c05a3918597b84e40f
                        • Instruction Fuzzy Hash: 26B15B71D10209EFDB14DFA8D895BAEFBB5FF58310F248529F815A72A0DB709944CB90
                        APIs
                        • RegOpenKeyExW.ADVAPI32(80000002,Software\JavaSoft\Java Development Kit\,00000000,?,?,2BB8795F,?,?), ref: 00B60313
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,?,?,?,?), ref: 00B60497
                        • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?,?,?,?), ref: 00B604F3
                        • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?), ref: 00B60543
                        • RegCloseKey.ADVAPI32(?), ref: 00B60583
                        • RegCloseKey.ADVAPI32(?,?), ref: 00B6088B
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • RegCloseKey.ADVAPI32(?,?,?,?), ref: 00B608C8
                        • RegCloseKey.ADVAPI32(?), ref: 00B60953
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Close$OpenQueryValue$FindResource
                        • String ID: JavaHome$Software\JavaSoft\Java Development Kit\$Software\JavaSoft\Java Runtime Environment\
                        • API String ID: 2031014976-1079072530
                        • Opcode ID: 42767f1c004f480bd36d4623f329588262a9a4a4dbbee61563b64eb1ce639dd1
                        • Instruction ID: f02a12112656b745990aaa34df3c52a09157b63b8299669a38eba13a9133944b
                        • Opcode Fuzzy Hash: 42767f1c004f480bd36d4623f329588262a9a4a4dbbee61563b64eb1ce639dd1
                        • Instruction Fuzzy Hash: 7B0284719112699FDF20EB29CD48B9EB7F5EF54304F1042D9E809A7291DB78AE84CF50
                        APIs
                          • Part of subcall function 00B897D0: GetSystemDefaultLangID.KERNEL32(2BB8795F,0000004C,?,00000048,?), ref: 00B89806
                        • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,?,00000000), ref: 00B6CD83
                        • GetProcAddress.KERNEL32(00000000), ref: 00B6CD8A
                        • GetCurrentProcess.KERNEL32(?,?,?,?,?,00000000), ref: 00B6CDC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressCurrentDefaultHandleLangModuleProcProcessSystem
                        • String ID: IsWow64Process2$No acceptable version found.$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$kernel32
                        • API String ID: 323535258-4160927586
                        • Opcode ID: e4cbd588acfc6e0431654df701c4057585f6361db3f1a5243a12fbf600a101fb
                        • Instruction ID: e572ad3344a8b0c9a1629d1febfcbbea2c93ea7cb426dc8e972eb2cf4b50b029
                        • Opcode Fuzzy Hash: e4cbd588acfc6e0431654df701c4057585f6361db3f1a5243a12fbf600a101fb
                        • Instruction Fuzzy Hash: 6AF1D570E00604DFCB20DFA8C984BAEBBF1FF45314F1482A9E455AB291DB79AD46CB50
                        APIs
                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00A685CB
                        • SendMessageW.USER32(00000000,00000439,00000000,0000002C), ref: 00A685DF
                        • SendMessageW.USER32(00000000,00000421,00000003,?), ref: 00A685F4
                        • SendMessageW.USER32(00000000,00000418,00000000,0000012C), ref: 00A68609
                        • SendMessageW.USER32(?,000000D6,-00000001,00000000), ref: 00A68620
                          • Part of subcall function 00A48400: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A48436
                        • GetWindowRect.USER32(?,?), ref: 00A68652
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A686B4
                        • SendMessageW.USER32(00000000,00000411,00000001,0000002C), ref: 00A686C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$Window$LongRect
                        • String ID: ,$tooltips_class32
                        • API String ID: 3777635722-3856767331
                        • Opcode ID: 83ca72faa38c9d85cc96922929ad97d91124acd2df76fd2aa56f7a8ff4c02a2c
                        • Instruction ID: 1a61ed24cf3b2b9dccc638091130d7547cb312eea26715bc2f801e1e5e614f69
                        • Opcode Fuzzy Hash: 83ca72faa38c9d85cc96922929ad97d91124acd2df76fd2aa56f7a8ff4c02a2c
                        • Instruction Fuzzy Hash: 63914271A00318AFDB14CFA4CD95BAEBBF9FF08301F14452AF956EA290DB74A904CB50
                        APIs
                          • Part of subcall function 00B61850: LoadLibraryW.KERNEL32(ComCtl32.dll,2BB8795F,?,?,00000000), ref: 00B6188E
                          • Part of subcall function 00B61850: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00B618B1
                          • Part of subcall function 00B61850: FreeLibrary.KERNEL32(00000000), ref: 00B6192F
                        • GetDlgItem.USER32(?,000001F4), ref: 00B6A181
                        • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 00B6A192
                        • MulDiv.KERNEL32(00000009,00000000), ref: 00B6A1AA
                        • GetDlgItem.USER32(?,000001F6), ref: 00B6A1E4
                        • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 00B6A204
                        • GetDlgItem.USER32(?,000001F8), ref: 00B6A20E
                        • GetWindowRect.USER32(?,?), ref: 00B6A21F
                        • GetWindowRect.USER32(?,?), ref: 00B6A232
                        • GetWindowRect.USER32(00000000,?), ref: 00B6A242
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ItemRectWindow$LibraryMessageSend$AddressFreeLoadProc
                        • String ID: Courier New
                        • API String ID: 2386506630-2572734833
                        • Opcode ID: 66ea72d523916720d943cbaf15e49318721c80a7662efdb7fd135cf48dab55bb
                        • Instruction ID: 9932a42f720300e421b2dc69c7c5b961f2a7d91f673448eeb75c7811e9d5e251
                        • Opcode Fuzzy Hash: 66ea72d523916720d943cbaf15e49318721c80a7662efdb7fd135cf48dab55bb
                        • Instruction Fuzzy Hash: 53419271B803087FEB149F25CC42FAE76E9EF49B05F010529FB09BA2C1DAB5AC408B55
                        APIs
                        • InitializeCriticalSection.KERNEL32(00D5D6E0,2BB8795F,?,00000010), ref: 00B92BDC
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • EnterCriticalSection.KERNEL32(00000010,2BB8795F,?,00000010), ref: 00B92BE9
                        • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B92C1B
                        • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B92C24
                        • WriteFile.KERNEL32(00000000,00B88897,D6E0B9EC,00C94BED,00000000,00CCF93C,00000001,?,?,000000FF,00000000), ref: 00B92CA6
                        • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B92CAF
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B92CE5
                        • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B92CEE
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,00CD28AC,00000002,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B92D4F
                        • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B92D58
                        • LeaveCriticalSection.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B92D88
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$BuffersFlushWrite$CriticalSection$AllocateEnterFindHeapInitializeLeaveResource
                        • String ID:
                        • API String ID: 201293332-0
                        • Opcode ID: f6da5ca04781aa28e67a737a4f9ef0edc4f020f922d67859e567cfe42a89bcea
                        • Instruction ID: 8524c21d5a8a589e0542a7622a6541e66dbbbdd5d14a6bd4f7f2044f7e7d1057
                        • Opcode Fuzzy Hash: f6da5ca04781aa28e67a737a4f9ef0edc4f020f922d67859e567cfe42a89bcea
                        • Instruction Fuzzy Hash: FB619B71901644EFEB00DF68CD49BAEBBB4FF15314F1481A8F855A72A2DB70AD14DBA0
                        APIs
                          • Part of subcall function 00B19F70: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B19FB1
                        • GetLastError.KERNEL32(2BB8795F,?,?,?,00C94FFD,000000FF,?,00B76122,?), ref: 00B9415D
                        • GetProcAddress.KERNEL32(00000000,GetPackagePath), ref: 00B942ED
                        • GetProcAddress.KERNEL32(00000000,GetPackagePath), ref: 00B94346
                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,00C94FFD,000000FF,?,00B76122,?), ref: 00B94434
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressProc$DirectoryErrorFreeLastLibrarySystem
                        • String ID: GetPackagePath$Kernel32.dll$neutral$x64$x86
                        • API String ID: 2155880084-4043905686
                        • Opcode ID: 1a23e003fe1654a2bb0824330d0794e1b610bb57c5063d633f0d1cf8320a6991
                        • Instruction ID: e275d6c6e01a531c50ed70539ffcbfa87a7a0493e5e6b77ac1bab7edf65ce194
                        • Opcode Fuzzy Hash: 1a23e003fe1654a2bb0824330d0794e1b610bb57c5063d633f0d1cf8320a6991
                        • Instruction Fuzzy Hash: E6C16870A002199FCF04CFA8C984B9EBBF1FF59314F1481A9E815AB391EB719946CB91
                        APIs
                        • EnterCriticalSection.KERNEL32(00D629CC,2BB8795F,00000000,?,?,?,?,?,?,00A4638E,00C4930D,000000FF), ref: 00A46B9D
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00A46C18
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00A46CBE
                        • LeaveCriticalSection.KERNEL32(00D629CC), ref: 00A46D13
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CriticalCursorLoadSection$EnterLeave
                        • String ID: 0$AtlAxWin140$AtlAxWinLic140$WM_ATLGETCONTROL$WM_ATLGETHOST
                        • API String ID: 3727441302-283551416
                        • Opcode ID: 0f6c4f9b5f2f7828d2f64369eec28c8be2b2604b336a9cf6ffe1e3c3937e5ab2
                        • Instruction ID: e6264e18def9d6b7364788546e3a44139fdeda9662559c10064d9abe945d555d
                        • Opcode Fuzzy Hash: 0f6c4f9b5f2f7828d2f64369eec28c8be2b2604b336a9cf6ffe1e3c3937e5ab2
                        • Instruction Fuzzy Hash: 625101B5D50719ABCB00DFA4D944BEEBFB8FB48715F14412BE804A7390D7B55A048FA1
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B6982F
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B69840
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B69852
                        • GetWindowLongW.USER32(?,000000EC), ref: 00B69865
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B69874
                        • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00B69888
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B69897
                        • GetWindowRect.USER32(?,?), ref: 00B698D6
                        • GetDlgItem.USER32(?,?), ref: 00B69912
                        • GetWindowRect.USER32(?,?), ref: 00B69938
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Long$MessageRectSend$Item
                        • String ID:
                        • API String ID: 661679956-0
                        • Opcode ID: 1b8d36a4c49c1aa56e477db96a04f4e20eb813fa8fe7b1581136f744e046fb1c
                        • Instruction ID: 9b00786d1f92de8ba34cc6b5963af84d3ff8119e62aecfd6feb5f8cd979fbd66
                        • Opcode Fuzzy Hash: 1b8d36a4c49c1aa56e477db96a04f4e20eb813fa8fe7b1581136f744e046fb1c
                        • Instruction Fuzzy Hash: 76418E715043069FD720DF69DC84B2BB7E8FF99721F104A1EF995D7291DB30A8848B62
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: __aulldiv
                        • String ID: :$f$f$f$p$p$p
                        • API String ID: 3732870572-1434680307
                        • Opcode ID: b04f93f3d4d5a82928cfb366f134e6fb183da4aa5a393462a07fece3aed1a8e0
                        • Instruction ID: cbb5d61c8a6bb2a7b10a6a91ead0cfbdebc7e9e8c7c294a476e090d9de330896
                        • Opcode Fuzzy Hash: b04f93f3d4d5a82928cfb366f134e6fb183da4aa5a393462a07fece3aed1a8e0
                        • Instruction Fuzzy Hash: 09029D79A00128DBDF34DF69F4446EDB7B2FB41B14FA44119E4297BA84D7308E8ACB64
                        APIs
                        • VariantClear.OLEAUT32(?), ref: 00A44ED5
                        • SysAllocString.OLEAUT32(?), ref: 00A44EE9
                        • VariantInit.OLEAUT32(?), ref: 00A44F24
                        • VariantClear.OLEAUT32(?), ref: 00A44F7C
                        • VariantClear.OLEAUT32(?), ref: 00A44F86
                        • VariantClear.OLEAUT32(?), ref: 00A44F90
                        • VariantClear.OLEAUT32(?), ref: 00A44F9D
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Strings
                        • <body><h3 style="color:green;">Error loading resource:</h3><p style="white-space:nowrap">"%s"</p></body>, xrefs: 00A4501B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Variant$Clear$AllocAllocateHeapInitString
                        • String ID: <body><h3 style="color:green;">Error loading resource:</h3><p style="white-space:nowrap">"%s"</p></body>
                        • API String ID: 1547307772-1571955069
                        • Opcode ID: 4c6fa0dc40b40d2b2f92acf7102888572d18e8f846950a0febba131fc6e330b2
                        • Instruction ID: 2e46db092f9a1205547f25d3848b90c2f9332a878d197706dbf0bf61d5ffdf4c
                        • Opcode Fuzzy Hash: 4c6fa0dc40b40d2b2f92acf7102888572d18e8f846950a0febba131fc6e330b2
                        • Instruction Fuzzy Hash: 9D917D75D00648DFCB00DFA8C944BEEBBB8FF89324F148259E415E7291DB74AA44CBA0
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,ps1,ps1,00000003,?,00B76948), ref: 00B997D1
                        • WriteFile.KERNEL32(00000000,0000FEFF,00000002,?,00000000), ref: 00B99815
                        • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 00B99832
                        • CloseHandle.KERNEL32(00000000), ref: 00B9984C
                        • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 00B9988B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$CloseHandleWrite$CreateFindHeapProcessResource
                        • String ID: Unable to get temp file $Unable to save script file $ps1
                        • API String ID: 3201387394-4253966538
                        • Opcode ID: d460b640066cc428ad136933c3277febfac7bd3d56d8dedeb0442d67e97fed9b
                        • Instruction ID: 3a8b59de3a939649d5faf7e125f0f64de9c302bd1d3e65ed620f46e031d2e6f2
                        • Opcode Fuzzy Hash: d460b640066cc428ad136933c3277febfac7bd3d56d8dedeb0442d67e97fed9b
                        • Instruction Fuzzy Hash: 0951B370A01249AFDF10DFA8CD45BAEBBB8EF05314F1441ACE511AB2C2D7749D05CBA1
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D538
                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D542
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D551
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00A3D56E
                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D578
                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D585
                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00A3D58F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLastProcess$CloseCodeCreateExitHandleHeapObjectSingleWait
                        • String ID: "%s" %s
                        • API String ID: 3234789809-1070868581
                        • Opcode ID: be145b7c0461f224a7c77e768961c77f339176601029ad83783331073b897168
                        • Instruction ID: 649f532b2d882aa05d0a8015cdfd35ccc634bd587409dd96e8c1d0d01947d7c2
                        • Opcode Fuzzy Hash: be145b7c0461f224a7c77e768961c77f339176601029ad83783331073b897168
                        • Instruction Fuzzy Hash: B351C471A00205DFDB20CF65EC04BAEBBB9FF85729F244629F425A7290D774AD45CBA0
                        APIs
                        • GetSystemDefaultLangID.KERNEL32 ref: 00B8894C
                        • GetUserDefaultLangID.KERNEL32 ref: 00B88959
                        • LoadLibraryW.KERNEL32(kernel32.dll), ref: 00B8896B
                        • GetProcAddress.KERNEL32(00000000,GetSystemDefaultUILanguage), ref: 00B8897F
                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00B88994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressDefaultLangProc$LibraryLoadSystemUser
                        • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll
                        • API String ID: 667524283-3528650308
                        • Opcode ID: 709fd8972adbc6de1ca2abd16e027fb5d793d09ddfa3f79292aa160b807db0a0
                        • Instruction ID: 78ce54fa58fe582e31e92857261a574dc84597b526343e6ce9cd73ea0910fda2
                        • Opcode Fuzzy Hash: 709fd8972adbc6de1ca2abd16e027fb5d793d09ddfa3f79292aa160b807db0a0
                        • Instruction Fuzzy Hash: FF419E706043419FCB54EF28E85067EB7E1EF99354F95186EE889D32A0EB30D944CB52
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00C226A7
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00C226AF
                        • _ValidateLocalCookies.LIBCMT ref: 00C22738
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00C22763
                        • _ValidateLocalCookies.LIBCMT ref: 00C227B8
                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00C227CE
                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00C227E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record___vcrt_initialize_locks___vcrt_uninitialize_locks
                        • String ID: csm
                        • API String ID: 1385549066-1018135373
                        • Opcode ID: eafe6e11fed13ae304361b09e6a9a704c2b4cb35a3dc7569fc80f0a5e9e1d992
                        • Instruction ID: 94b9a0e08e407b296d1867ed7c088cbf7e1178334e6b594fb8c3fd60c8a83cb5
                        • Opcode Fuzzy Hash: eafe6e11fed13ae304361b09e6a9a704c2b4cb35a3dc7569fc80f0a5e9e1d992
                        • Instruction Fuzzy Hash: 1D412234A00228ABCF00EF68E884A9EBBB0EF45714F108095FC246B792C7759B49DB91
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • CreateThread.KERNEL32(00000000,00000000,00A791F0,00CD4900,00000000,2BB8795F), ref: 00A7915F
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00A79178
                        • CloseHandle.KERNEL32(00000000), ref: 00A7918E
                        • CoInitializeEx.COMBASE(00000000,00000000), ref: 00A79249
                        • GetProcessHeap.KERNEL32(?,00000000), ref: 00A7934B
                        • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A79351
                        • GetProcessHeap.KERNEL32(?,00000000), ref: 00A793CA
                        • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A793D0
                        • CoUninitialize.COMBASE ref: 00A79527
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$Process$Free$CloseCreateHandleInitializeObjectSingleThreadUninitializeWait
                        • String ID:
                        • API String ID: 661592132-0
                        • Opcode ID: 3b09cbe403de0ff9fc496e2de6f1c46ee369c57f280b1ccf95368c47a659bd49
                        • Instruction ID: 26952d5e3bebada8caa5f0b88e0b89c9fa250f6fed6caf8fe8d574cdeb1b30b5
                        • Opcode Fuzzy Hash: 3b09cbe403de0ff9fc496e2de6f1c46ee369c57f280b1ccf95368c47a659bd49
                        • Instruction Fuzzy Hash: A6026D70D00219DFDB14CFA8C945BEEBBB8FF45304F20816EE419AB291DB749A49DB90
                        APIs
                        • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,2BB8795F,00000000,00000000,?), ref: 00B685EB
                        • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?,?,00000000,00000000), ref: 00B6877D
                        • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?,?,00000000,00000000), ref: 00B68817
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000000,00000000), ref: 00B68839
                        • Wow64RevertWow64FsRedirection.KERNEL32(00000000,?,?,00000000), ref: 00B68865
                        • DeleteFileW.KERNEL32(?,2BB8795F,00000000,00000000,00C45D70,000000FF,?,80070057,80004005,?), ref: 00B6891D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Wow64$File$Redirection$CopyDeleteDisableFolderNamePathRevertTemp
                        • String ID: shim_clone
                        • API String ID: 3507832535-3944563459
                        • Opcode ID: 3e9e2d3fcb589d11fb30df7762520768ae10f797b5d0a8555a483ed36e51b7e7
                        • Instruction ID: 77eed742b5edb766aa1aa9a18368b45d2573b462caa42fa6f6e1605a7b643a53
                        • Opcode Fuzzy Hash: 3e9e2d3fcb589d11fb30df7762520768ae10f797b5d0a8555a483ed36e51b7e7
                        • Instruction Fuzzy Hash: AAA1F370A002589FDB24DB24CC45BBAB7F5EF45310F5442EDE90AA7292EF38AE44CB55
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00D5D69C,00000000,2BB8795F,00000000,00C86663,000000FF,?,2BB8795F), ref: 00A329A3
                        • GetLastError.KERNEL32(?,2BB8795F), ref: 00A329AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CountCriticalErrorInitializeLastSectionSpin
                        • String ID: VolumeCostAvailable$VolumeCostDifference$VolumeCostRequired$VolumeCostSize$VolumeCostVolume
                        • API String ID: 439134102-34576578
                        • Opcode ID: ca5f97e5fdc012ec189bc38950b0f9562f68cb56a6a56f33e7fc64e712b0b888
                        • Instruction ID: d87b28a6cb5ed5c1656e65d326c8f10680836435cf55039ecf30211a6929716f
                        • Opcode Fuzzy Hash: ca5f97e5fdc012ec189bc38950b0f9562f68cb56a6a56f33e7fc64e712b0b888
                        • Instruction Fuzzy Hash: CE51D0B19003099BDB20DF94DC057AEBBF4FB08715F100229E818E7390E775AA089BA1
                        APIs
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,?,?,00D5D6E0), ref: 00BA6DB0
                        • LoadLibraryW.KERNEL32(Shell32.dll,?,?,00D5D6E0), ref: 00BA6DC3
                        • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00BA6DD3
                        • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 00BA6E5C
                        • SHGetMalloc.SHELL32(?), ref: 00BA6E9E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
                        • String ID: SHGetSpecialFolderPathW$Shell32.dll
                        • API String ID: 2352187698-2988203397
                        • Opcode ID: 9db115675bb813250c3d8a6eed72fd90e7af992eb0d8b5f8e908207adc3ca61a
                        • Instruction ID: a2ba8211c0da0e3b90915ce242c4eccf2f122717cd1a24715d2d05795b5d23cc
                        • Opcode Fuzzy Hash: 9db115675bb813250c3d8a6eed72fd90e7af992eb0d8b5f8e908207adc3ca61a
                        • Instruction Fuzzy Hash: A231F4B66007019BDB249F34DC05BABBBF5EF95711F08C86CE885C7290FB7198858B91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d1d80c8b6b592142cb24d243ef4fc139ccdd5a7e2c875ab9f637de3969719f74
                        • Instruction ID: 1d158219c48305bfbaee5e7182c1bdec9a3cf46f09c333f43d6d7d0c168bbfd5
                        • Opcode Fuzzy Hash: d1d80c8b6b592142cb24d243ef4fc139ccdd5a7e2c875ab9f637de3969719f74
                        • Instruction Fuzzy Hash: C9A1D171600704ABDF10EF64DC89BAABBE4EF58721F1041BAF915EB291DB75D800CBA1
                        APIs
                        • SysFreeString.OLEAUT32(?), ref: 00A41164
                        • SysFreeString.OLEAUT32(00000000), ref: 00A411D9
                        • GetProcessHeap.KERNEL32(-000000F3,?,?), ref: 00A41249
                        • HeapFree.KERNEL32(00000000,-000000F3,?,?), ref: 00A4124F
                        • GetProcessHeap.KERNEL32(-000000F3,00000000,00000000,00000000,00000000,00000000,2BB8795F,?,00000001,?), ref: 00A4127C
                        • HeapFree.KERNEL32(00000000,-000000F3,00000000,00000000,00000000,00000000,00000000,2BB8795F,?,00000001,?), ref: 00A41282
                        • SysFreeString.OLEAUT32(00000000), ref: 00A4129A
                        • SysFreeString.OLEAUT32(?), ref: 00A4133B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Free$HeapString$Process
                        • String ID:
                        • API String ID: 1565486995-0
                        • Opcode ID: 709e1618aed29a8407f09f20fa0c3c7e15f8b5812bd9dc64e555598aec2d508f
                        • Instruction ID: c875c358471f6a8ceab52853c7ee6143174431199e4c66c3a66d272a35e13516
                        • Opcode Fuzzy Hash: 709e1618aed29a8407f09f20fa0c3c7e15f8b5812bd9dc64e555598aec2d508f
                        • Instruction Fuzzy Hash: 02A16974D00219DFDB10DFA8C945BEEBBB8EF45310F244669E410A72C1DBB8AE44DBA1
                        APIs
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00AAEFD7
                        • GetWindow.USER32(00000000,00000004), ref: 00AAEFFA
                        • GetWindowRect.USER32(00000000,?), ref: 00AAF00B
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00AAF01E
                        • MonitorFromWindow.USER32(00000000,00000002), ref: 00AAF036
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00AAF04C
                        • GetWindowRect.USER32(00000000,?), ref: 00AAF072
                        • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 00AAF12F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$LongMonitorRect$FromInfo
                        • String ID:
                        • API String ID: 2882702216-0
                        • Opcode ID: 9c5dae79ed0e66fb562699d58993746f691ce588838998c8dba7c804e0fb4fe0
                        • Instruction ID: bc9aa0e08846fc13d136f4e4b4a742912a27ed7b9f12d31fa2b4627c69b86c7c
                        • Opcode Fuzzy Hash: 9c5dae79ed0e66fb562699d58993746f691ce588838998c8dba7c804e0fb4fe0
                        • Instruction Fuzzy Hash: 59516272D002199FDB24CFA8CD49A9EBBB5FF49721F244229E815F7295EB30AD04CB50
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00A511EA
                        • GetWindow.USER32(?,00000005), ref: 00A511F7
                        • GetWindow.USER32(00000000,00000002), ref: 00A51332
                          • Part of subcall function 00A51040: GetWindowRect.USER32(?,?), ref: 00A5106C
                          • Part of subcall function 00A51040: GetWindowRect.USER32(?,?), ref: 00A5107C
                        • GetWindowRect.USER32(?,?), ref: 00A5128B
                        • GetWindowRect.USER32(00000000,?), ref: 00A5129B
                        • GetWindowRect.USER32(00000000,?), ref: 00A512B5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Rect
                        • String ID:
                        • API String ID: 3200805268-0
                        • Opcode ID: 9d2c778b53dbed5e3a7f43dc63d8405142271f1cbef27ace053b7ed6e3e5254e
                        • Instruction ID: 9315ebcf7985d70c927996c0b9b2c9f385960e02e43e13965f68e138d9e5dcf4
                        • Opcode Fuzzy Hash: 9d2c778b53dbed5e3a7f43dc63d8405142271f1cbef27ace053b7ed6e3e5254e
                        • Instruction Fuzzy Hash: E6419A305047019BC321DB29C990ABBF7FABF96705F504A2DF89597961EB30E988CB52
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,00C1E61D,?,?,?), ref: 00C1E497
                        • HeapAlloc.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E49E
                          • Part of subcall function 00C1E569: IsProcessorFeaturePresent.KERNEL32(0000000C,00C1E485,00000000,?,00C1E61D,?,?,?), ref: 00C1E56B
                        • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,00C1E61D,?,?,?), ref: 00C1E4AE
                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00C1E61D,?,?,?), ref: 00C1E4D5
                        • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,00C1E61D,?,?,?), ref: 00C1E4E9
                        • InterlockedPopEntrySList.KERNEL32(00000000,?,00C1E61D,?,?,?), ref: 00C1E4FC
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00C1E61D,?,?,?), ref: 00C1E50F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                        • String ID:
                        • API String ID: 2460949444-0
                        • Opcode ID: d13bbb1ec162878d3dd71e5d9048b1993b9cc6411ea1cbb7582fdd1dad1cbf98
                        • Instruction ID: 0edf28e76c2945d6eb373e06f17156fdf70fda2be8de544ce19b24793ccd7de1
                        • Opcode Fuzzy Hash: d13bbb1ec162878d3dd71e5d9048b1993b9cc6411ea1cbb7582fdd1dad1cbf98
                        • Instruction Fuzzy Hash: B9110471600325ABD33117A4AD48FEF3359EF4B799F104521FE11E7251EB24CD4466B0
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • DeleteFileW.KERNEL32(?,?,?,?,00000000,?,?,?,?), ref: 00B94782
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        • ResetEvent.KERNEL32(00000000,2BB8795F,?,?,00000000,00C9510D,000000FF,?,80004005), ref: 00B9481F
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00C9510D,000000FF,?,80004005), ref: 00B9483F
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,00000000,00C9510D,000000FF,?,80004005), ref: 00B9484A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: HeapObjectSingleWait$AllocateDeleteEventFileFindProcessResetResource
                        • String ID: TEST$tin9999.tmp
                        • API String ID: 1604106433-3424081289
                        • Opcode ID: f4826c6d79e6abfac9c6f754dfc29ab8f1d8663e7ab918c66c0cdcda6441b959
                        • Instruction ID: 066696493b23700577aeedba0576505db3f2429f75765d3d05bd12969fdabedd
                        • Opcode Fuzzy Hash: f4826c6d79e6abfac9c6f754dfc29ab8f1d8663e7ab918c66c0cdcda6441b959
                        • Instruction Fuzzy Hash: 71C1CF71900249DFDF20DF68CD55BEEB7E8FF05320F1082A9E81A9B291DB749A05CB91
                        APIs
                        • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00B8753E
                        • SetFilePointer.KERNEL32(?,7FFFFFFF,00000000,00000000,?), ref: 00B8759D
                        • SetEndOfFile.KERNEL32(?), ref: 00B875A6
                        • CloseHandle.KERNEL32(?), ref: 00B875BF
                        Strings
                        • %sholder%d.aiph, xrefs: 00B8751A
                        • Not enough disk space to extract file:, xrefs: 00B8743A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandlePointer
                        • String ID: %sholder%d.aiph$Not enough disk space to extract file:
                        • API String ID: 22866420-929304071
                        • Opcode ID: a89e4c21cacace82af71817f2feb6dc4194f693eac6762a942951688b311009e
                        • Instruction ID: f5884b00d65c898c9fec2f72c772ee8014a5776345336e3ab1591b282a5c1be2
                        • Opcode Fuzzy Hash: a89e4c21cacace82af71817f2feb6dc4194f693eac6762a942951688b311009e
                        • Instruction Fuzzy Hash: 7B819F75A402099FDB10EF68CC45B9EBBE4FF54324F284699ED25A73A1DB31E904CB90
                        APIs
                        • CoCreateInstance.COMBASE(00CD1C8C,00000000,00000001,00CD2314,?), ref: 00A48530
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateInstance
                        • String ID: :${
                        • API String ID: 542301482-3766677574
                        • Opcode ID: ef02f9c23fe7aa10206a7925fc9efcf518ed5eb14bbba0212bd2055a302e4f5e
                        • Instruction ID: bfdf0b77c0212b72bc06ee317e82a6887ede18eb5f05519f2822c25652fc75fc
                        • Opcode Fuzzy Hash: ef02f9c23fe7aa10206a7925fc9efcf518ed5eb14bbba0212bd2055a302e4f5e
                        • Instruction Fuzzy Hash: BC61B278A003159BDF249F58E844BBDB7F5AF89B10F24406AE901EB390EB79DD40CB61
                        APIs
                        • RemoveDirectoryW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,00C86F0D,000000FF,?,00B5E406,?), ref: 00B5E193
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • RemoveDirectoryW.KERNEL32(?,2BB8795F,?,?,?,?,00C86F0D,000000FF,?,00B5E406,?,00000000), ref: 00B5E1C2
                        • GetLastError.KERNEL32(?,2BB8795F,?,?,?,?,00C86F0D,000000FF,?,00B5E406,?,00000000), ref: 00B5E1D2
                        • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,00000000,00C86F0D,000000FF,?,80004005,2BB8795F,?), ref: 00B5E2A3
                        • GetLastError.KERNEL32(?,?,?,00000000,00C86F0D,000000FF,?,80004005,2BB8795F,?,?,?,?,00C86F0D,000000FF), ref: 00B5E2E2
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DirectoryErrorLastRemove$DeleteFileFindHeapProcessResource
                        • String ID: \\?\
                        • API String ID: 728736790-4282027825
                        • Opcode ID: 4039a948b5717de1bb2824c6b33788e68c416b891d6109a57409a47670a1f09c
                        • Instruction ID: 8756dd26d7096df74acae1139d0d16cf439e13757b0b8bda9c48dfd914670727
                        • Opcode Fuzzy Hash: 4039a948b5717de1bb2824c6b33788e68c416b891d6109a57409a47670a1f09c
                        • Instruction Fuzzy Hash: 4851CD719006149FEB14DFA8C949BAEB7E8FF05322F1046A9FD65E7290DB35DE088B50
                        APIs
                        • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000,?,2BB87961), ref: 00A4E343
                        • CloseHandle.KERNEL32(00000000), ref: 00A4E3A0
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00A4E407
                        • CloseHandle.KERNEL32(00000000,753CE610), ref: 00A4E42D
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireCloseFileHandleRelease$ConditionCreateVariableWakeWrite
                        • String ID: aix$html
                        • API String ID: 3683816281-2369804267
                        • Opcode ID: 639efe0a2a98022d36806588dfa0e32a5b9061ad187255ac9681af179e5d8beb
                        • Instruction ID: f1e0114cb7514e26fd73157390ede1534bd4719c3da48079bee38608f72ee4e1
                        • Opcode Fuzzy Hash: 639efe0a2a98022d36806588dfa0e32a5b9061ad187255ac9681af179e5d8beb
                        • Instruction Fuzzy Hash: B2618BB0900748DFDB20CF98D949BAEBBB4BB45308F104259E411AB391DBF56A49DFA1
                        APIs
                        • SendMessageW.USER32(?,0000043A,00000000,00000074), ref: 00A670B5
                        • lstrcpynW.KERNEL32(?,?,00000020), ref: 00A6712B
                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 00A67168
                        • SendMessageW.USER32(?,00000444,00000000,00000074), ref: 00A6719A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$lstrcpyn
                        • String ID: ?$t
                        • API String ID: 3928028829-1995845436
                        • Opcode ID: b2718c57190a6cce6b8f966d8a8822d9ae011fe494222b3cb251114ba02ad604
                        • Instruction ID: 2b3a9fddbaeb5d2b96977c070b8066e3cd7a0ae82f7a72640ca0511967149085
                        • Opcode Fuzzy Hash: b2718c57190a6cce6b8f966d8a8822d9ae011fe494222b3cb251114ba02ad604
                        • Instruction Fuzzy Hash: 88516EB1508340AFE721DF60DC49B9BBBE8FB49705F00491EF699D6292D774E508CB62
                        APIs
                        • Wow64DisableWow64FsRedirection.KERNEL32(00000000,2BB8795F,00000010), ref: 00B5FA87
                        • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,2BB8795F,00C8AA8D), ref: 00B5FAFF
                        • GetLastError.KERNEL32 ref: 00B5FB10
                        • WaitForSingleObject.KERNEL32(00C8AA8D,000000FF), ref: 00B5FB2C
                        • GetExitCodeProcess.KERNEL32(00C8AA8D,00000000), ref: 00B5FB3D
                        • CloseHandle.KERNEL32(00C8AA8D), ref: 00B5FB47
                        • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00B5FB62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Wow64$ProcessRedirection$CloseCodeCreateDisableErrorExitHandleLastObjectRevertSingleWait
                        • String ID:
                        • API String ID: 1153077990-0
                        • Opcode ID: 56eff42aa08b07137b988de172d29483572410cf45fd6fb86cce7288d8b22934
                        • Instruction ID: 2e40ceadf0d84ed988ea7e8bc3dc967b6950fc63872217b1b44fb2041471fa71
                        • Opcode Fuzzy Hash: 56eff42aa08b07137b988de172d29483572410cf45fd6fb86cce7288d8b22934
                        • Instruction Fuzzy Hash: 16415E71E04389ABDB10CFA4CD08BAEFBF9EF4A315F1446A9E825A7190D7749E44CB50
                        APIs
                        • LoadLibraryW.KERNEL32(Shlwapi.dll,?,?,?,?,00B74041,?,2BB8795F,?,?), ref: 00B689DB
                        • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00B689F1
                        • FreeLibrary.KERNEL32(00000000), ref: 00B68A2A
                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,00B74041,?,2BB8795F,?,?), ref: 00B68A46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Library$Free$AddressLoadProc
                        • String ID: DllGetVersion$Shlwapi.dll
                        • API String ID: 1386263645-2240825258
                        • Opcode ID: 06b9ee3317e17e9d5d69095ace3799e642fdc0216fae1c3d884e6ba8578704a3
                        • Instruction ID: e3406aa867547b29bc88c0707a2767f3fe7dd551e3f95c4aef76e6aba90095a4
                        • Opcode Fuzzy Hash: 06b9ee3317e17e9d5d69095ace3799e642fdc0216fae1c3d884e6ba8578704a3
                        • Instruction Fuzzy Hash: 9821A4766043015BC700EF69E84166FB7E4FFDA711F80066EF89AD3241EB35984497A2
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,00C3840F,00C3490E,0000000C,?,00000000,00000000,?,00C38679,00000021,FlsSetValue,00CCCE8C,00CCCE94,?), ref: 00C383C3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 4307c547bfaaf12bb75cb40d357066b6188ef560e43f5c575f0dbbaf16152601
                        • Instruction ID: 0a6288c47dfe0b7ba3b8cb4bade6816f0cfce7c78c0154d551cf0a91e2d73fa4
                        • Opcode Fuzzy Hash: 4307c547bfaaf12bb75cb40d357066b6188ef560e43f5c575f0dbbaf16152601
                        • Instruction Fuzzy Hash: C621D571A11314ABC7619B21DC45B5F3768EB41B60F151114FD26E73E1DB74EE08CAE1
                        APIs
                        • PathIsUNCW.SHLWAPI(?,2BB8795F,00000000,?,00000000,?,?,?,00C8A895,000000FF,?,00B874D1,?,?,?,?), ref: 00B5EA8B
                        • CreateDirectoryW.KERNEL32(00C8A895,00000000,?,00000000,00CE0AD8,00000001), ref: 00B5EB4A
                        • GetLastError.KERNEL32 ref: 00B5EB58
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLastPath
                        • String ID:
                        • API String ID: 953296794-0
                        • Opcode ID: 37c67c8ec1345a5a46f037a0fc3625bd45c583ed383325462a0b7475a6a84b89
                        • Instruction ID: 90df515834e2c9c6dd49f2e59fce4e164f2c2dcf5530799c32f74446b8a4007c
                        • Opcode Fuzzy Hash: 37c67c8ec1345a5a46f037a0fc3625bd45c583ed383325462a0b7475a6a84b89
                        • Instruction Fuzzy Hash: C481B4719006099FDB14DFA8C885B9DBBF4FF15325F1446A9E825A72D0DB71DA08CB50
                        APIs
                        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00B699C2
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B699C8
                        • GetDlgItem.USER32(?,?), ref: 00B69A3A
                        • GetWindowRect.USER32(00000000,?), ref: 00B69A52
                        • SetWindowPos.USER32(00000014,00000000,?,00000002,00000002,?,00000014,?,00000002,00000002,?,?,?,000000F0,?,00000000), ref: 00B69ADF
                        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00B69B13
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$MessageSend$ItemLongRect
                        • String ID:
                        • API String ID: 3432912040-0
                        • Opcode ID: e98840eafa220a150728a908fd3a4091a261d9cb86c77fa8ae64e732e8251298
                        • Instruction ID: 32a89a5406bea79f87146b8d6e6976e9801cd47191c552e71e6f5235c150ee94
                        • Opcode Fuzzy Hash: e98840eafa220a150728a908fd3a4091a261d9cb86c77fa8ae64e732e8251298
                        • Instruction Fuzzy Hash: C1517730204301DFD724CF28D989B2ABBE5FF88715F144A5DF9899B2A5DB31E844CB52
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00A712FA
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00A7131C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00A71344
                        • __Getctype.LIBCPMT ref: 00A71425
                        • std::_Facet_Register.LIBCPMT ref: 00A71487
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00A714B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                        • String ID:
                        • API String ID: 1102183713-0
                        • Opcode ID: 095a2700ec7b6234456c55f600373742f4c6fc0b5ae6c55891211642ce4de959
                        • Instruction ID: e6a9a2da4ea381e5e91bb4bd5b3d41c9d364107d3c2a8ef57308b5d6eeb7b2af
                        • Opcode Fuzzy Hash: 095a2700ec7b6234456c55f600373742f4c6fc0b5ae6c55891211642ce4de959
                        • Instruction Fuzzy Hash: 7B619EB0C00749CFDB11CF68C981BAEB7F4BB15314F14C259E849AB391EB74AA84CB91
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00A710ED
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00A7110F
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00A71137
                        • __Getcoll.LIBCPMT ref: 00A71201
                        • std::_Facet_Register.LIBCPMT ref: 00A71246
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00A7127E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                        • String ID:
                        • API String ID: 1184649410-0
                        • Opcode ID: 738a8d57adbc5d9b83baac74a3768e6d42e4897b9eb5069df984839701ffce8a
                        • Instruction ID: b1a627d54384418e206e5526f3ef5aae892e316ac464e3c64d30cddb052ba606
                        • Opcode Fuzzy Hash: 738a8d57adbc5d9b83baac74a3768e6d42e4897b9eb5069df984839701ffce8a
                        • Instruction Fuzzy Hash: 16518BB1D01249EFDB01DF98D984BADBBF0FF41310F208159E809AB381DB746A45DB91
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,00000080,00000001,Close,50000001,?,00000128,?,00000032,0000000E,00000082,000001F5,?,50000000,?,00000026), ref: 00B69E3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: Close$Copy$Details >>$Send Error Report
                        • API String ID: 4139908857-113472931
                        • Opcode ID: 82f7ba4ebf0840e8a14b5b4c4437866a104103e78b68afa3ca764e77a7064d5b
                        • Instruction ID: ffd41c1543a58f37682ce328d1f244d1aaeeb416ff8d340ed9b5a1062a6eac56
                        • Opcode Fuzzy Hash: 82f7ba4ebf0840e8a14b5b4c4437866a104103e78b68afa3ca764e77a7064d5b
                        • Instruction Fuzzy Hash: D6C1AD70A40245AFEB24CF64CC55BAEB7B9FF04710F144269F915BB2D0EBB5A905CB90
                        APIs
                        • GetLastError.KERNEL32(?,?,00C2056A,00C20536,?,?,00A6E56D,00B5CDF0,?,00000008), ref: 00C20581
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00C2058F
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C205A8
                        • SetLastError.KERNEL32(00000000,00C2056A,00C20536,?,?,00A6E56D,00B5CDF0,?,00000008), ref: 00C205FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 84249c3b0007833ceae1d238e0840022de78ab1bfc84becc0256fd92802fdf72
                        • Instruction ID: dc4ac340e184bd9b21c2ebd6a3bff0f79ce32324598461d6fb98f4209ed09775
                        • Opcode Fuzzy Hash: 84249c3b0007833ceae1d238e0840022de78ab1bfc84becc0256fd92802fdf72
                        • Instruction Fuzzy Hash: 2C01F7722497316EEB6427B8BC8965B2788EB02775730033BF830A19F3EF194D047568
                        APIs
                        • _wcsrchr.LIBVCRUNTIME ref: 00BA4064
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • DeleteFileW.KERNEL32(?), ref: 00BA410A
                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00BA423F
                          • Part of subcall function 00B60990: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,2BB8795F,00000001,75A8EB20,00000000), ref: 00B609DF
                          • Part of subcall function 00B60990: ReadFile.KERNEL32(00000000,?,000003FF,?,00000000,?,80000000,00000003,00000000,00000003,00000080,00000000,2BB8795F,00000001,75A8EB20,00000000), ref: 00B60A15
                          • Part of subcall function 00B61B90: LoadStringW.USER32(000000A1,?,00000514,2BB8795F), ref: 00B61AF6
                        • _wcsrchr.LIBVCRUNTIME ref: 00BA4179
                        Strings
                        • --verbose --log-file="%s" --remove-pack-file "%s" "%s", xrefs: 00BA40BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: File$Delete_wcsrchr$CreateHeapLoadProcessReadString
                        • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"
                        • API String ID: 2917987377-3685554107
                        • Opcode ID: 0f609af02ec15e3f8140dde5ec3ae41bf9642dc526f7776165a9da8ea69c8b9e
                        • Instruction ID: 6001fd65e821426c71c4adcd9d2db09f20976661039b006f0795996c4e965300
                        • Opcode Fuzzy Hash: 0f609af02ec15e3f8140dde5ec3ae41bf9642dc526f7776165a9da8ea69c8b9e
                        • Instruction Fuzzy Hash: 6D91D131A006099FDB00DFA8C845B9EFBF4EF56324F1482A9E815EB292DB75DD04CB91
                        APIs
                        • GetLastError.KERNEL32 ref: 00B5FD19
                          • Part of subcall function 00B5DAC0: _wcsrchr.LIBVCRUNTIME ref: 00B5DAF9
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00B5FD35
                        • GetExitCodeProcess.KERNEL32(00000000,00C8AB17), ref: 00B5FD46
                        • CloseHandle.KERNEL32(00000000), ref: 00B5FD54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CloseCodeErrorExitHandleLastObjectProcessSingleWait_wcsrchr
                        • String ID: open
                        • API String ID: 1209170042-2758837156
                        • Opcode ID: 50741f83da423dc9f729bcf5ba19c75c07bd3f17f05b430ca951a1024e0086ab
                        • Instruction ID: 40f5c0badb55d827dcd9be37ab99eb85e6168ebf7bcd6ba898aca979369e999d
                        • Opcode Fuzzy Hash: 50741f83da423dc9f729bcf5ba19c75c07bd3f17f05b430ca951a1024e0086ab
                        • Instruction Fuzzy Hash: 8E615A71A0064A9BDB10CF69C8447AEFBF4FF45325F1482A9E825A73D1DB749944CF90
                        APIs
                        • SetLastError.KERNEL32(0000000E,2BB8795F), ref: 00A4A1DF
                        • GetCurrentThreadId.KERNEL32 ref: 00A4A223
                        • EnterCriticalSection.KERNEL32(00D629CC), ref: 00A4A243
                        • LeaveCriticalSection.KERNEL32(00D629CC), ref: 00A4A267
                          • Part of subcall function 00C1E5D5: GetProcessHeap.KERNEL32(00000008,00000008,00000000,00B8915E,?,?), ref: 00C1E5DA
                          • Part of subcall function 00C1E5D5: HeapAlloc.KERNEL32(00000000,?,?), ref: 00C1E5E1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CriticalHeapSection$AllocCurrentEnterErrorLastLeaveProcessThread
                        • String ID: AXWIN UI Window
                        • API String ID: 2176831970-1592869507
                        • Opcode ID: aa41db49f2442f3c53a1653a1a0681258b29514a437ead1fc36421b171deed16
                        • Instruction ID: 79716dbcf823789750108706c0ead040d563132195378de16be201ffa952c249
                        • Opcode Fuzzy Hash: aa41db49f2442f3c53a1653a1a0681258b29514a437ead1fc36421b171deed16
                        • Instruction Fuzzy Hash: FC51E176640305AFDB20CF68DC05BABBBE8FB94721F00411AF904E7390D7B1A804DB61
                        APIs
                        • GetProcAddress.KERNEL32(SetWindowTheme), ref: 00B3BACD
                        • SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00B3BB0F
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                          • Part of subcall function 00B19F70: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B19FB1
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireRelease$AddressConditionDirectoryMessageProcSendSystemVariableWake
                        • String ID: SetWindowTheme$UxTheme.dll$explorer
                        • API String ID: 1065053019-3123591815
                        • Opcode ID: c12e5474ddb0d127c8e75ac8477ac79d5c01afcacffcdcac37fd502d7f55d20b
                        • Instruction ID: c2f264daf2021db4572de56a46df5a2a6bc102d9d7473b8d7a3d2435b1aea7ee
                        • Opcode Fuzzy Hash: c12e5474ddb0d127c8e75ac8477ac79d5c01afcacffcdcac37fd502d7f55d20b
                        • Instruction Fuzzy Hash: 28218071A40B05ABC720DF59DC42FAD77A4EB01760F210625E921E77D0DBB06988DBB1
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 00A70657
                        • OpenProcessToken.ADVAPI32(00000000,00000028,00000000), ref: 00A70664
                        • GetLastError.KERNEL32 ref: 00A706A2
                        • CloseHandle.KERNEL32(00000000), ref: 00A706D9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Process$CloseCurrentErrorHandleLastOpenToken
                        • String ID: SeShutdownPrivilege
                        • API String ID: 2767541406-3733053543
                        • Opcode ID: bb577d30b42063a6e5dbac28e344cc2c6f53e545b0c24249ea5f248dd2660ab9
                        • Instruction ID: 08b419b1c1b0a50be9c7ca35429fd88808445341f5c2ffe3b6d98ffde9062930
                        • Opcode Fuzzy Hash: bb577d30b42063a6e5dbac28e344cc2c6f53e545b0c24249ea5f248dd2660ab9
                        • Instruction Fuzzy Hash: 672128B1A40308AFEB10DFA0DD59FEEBBB8FB09715F104119E915F6290DBB5A904CB24
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,2BB8795F,?,?,00000000,00CA92A9,000000FF,?,00C2A09C,?,?,00C2A070,?), ref: 00C2A141
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C2A153
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00CA92A9,000000FF,?,00C2A09C,?,?,00C2A070,?), ref: 00C2A175
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 75428d3dd90e8991a0db19ca4a360745d8c38940eba6f6e7562680ddb8224611
                        • Instruction ID: b7ce40106a18059d29c98f52b76640d2be559b183e84deb8534f214cb156cf6c
                        • Opcode Fuzzy Hash: 75428d3dd90e8991a0db19ca4a360745d8c38940eba6f6e7562680ddb8224611
                        • Instruction Fuzzy Hash: 0F01A771940629EFCB018B94DC09FAFBBB8FB05B25F004626F822E26D0DB759D00CA50
                        APIs
                        • GetProcessHeap.KERNEL32(?,00000000,?,?,2BB8795F), ref: 00A52EEC
                        • HeapFree.KERNEL32(00000000,?,00000000,?,?,2BB8795F), ref: 00A52EF2
                        • GetProcessHeap.KERNEL32(?,00000000), ref: 00A53077
                        • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A5307D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID: #
                        • API String ID: 3859560861-1885708031
                        • Opcode ID: 4c3badf2b16a4565ca0ed53645d56a8d9e10b46dfab5b8d71e5503bfab31ca67
                        • Instruction ID: 9bebed824946b2fc536cb283d1db0bee3c6ab27412c1b14ba398f56ce759b0b6
                        • Opcode Fuzzy Hash: 4c3badf2b16a4565ca0ed53645d56a8d9e10b46dfab5b8d71e5503bfab31ca67
                        • Instruction Fuzzy Hash: ADD17872D00219DBDF04CFA8D9457EEFBB0FF94315F244269E815A7290DBB55A08DBA0
                        APIs
                        • CoInitializeEx.COMBASE(00000000,00000000), ref: 00A79249
                        • GetProcessHeap.KERNEL32(?,00000000), ref: 00A7934B
                        • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A79351
                        • GetProcessHeap.KERNEL32(?,00000000), ref: 00A793CA
                        • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A793D0
                        • CoUninitialize.COMBASE ref: 00A79527
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess$InitializeUninitialize
                        • String ID:
                        • API String ID: 4239879612-0
                        • Opcode ID: 83f9cf155db4c65f40298f4d65fd7088ed0d6ca4d9b0d8febd5f9affb233dab4
                        • Instruction ID: 1624fe171c99fd87241184ecefe76ad03927efdeb5f80b86dd521f655240c7ec
                        • Opcode Fuzzy Hash: 83f9cf155db4c65f40298f4d65fd7088ed0d6ca4d9b0d8febd5f9affb233dab4
                        • Instruction Fuzzy Hash: E4B14A70D00218DFDB10CFA8CD45BEEBBB8BF45304F20819EE419AB291DB749A49CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 14b4005b5ddb8bded35d84b953f5dfce540fe3a3628f21cc92715aea24a0c356
                        • Instruction ID: 0343d0ab5ffc44a854d1ea571439b2682c0514973c395ea7ef77acb5363b9a01
                        • Opcode Fuzzy Hash: 14b4005b5ddb8bded35d84b953f5dfce540fe3a3628f21cc92715aea24a0c356
                        • Instruction Fuzzy Hash: CA812871904349DFDF11CFA8C98479EBBF5FF49324F2482A9E914AB291DB749940CBA0
                        APIs
                        • SendMessageW.USER32(?,00000318,00000000,00000004), ref: 00A69C17
                        • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00A69C3F
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A69C57
                        • SendMessageW.USER32(?,0000130A,00000000,?), ref: 00A69C88
                        • SendMessageW.USER32(00000000,00000136,?,?), ref: 00A69D75
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 90edf934cb2df564101ea4c50fc2319f64c98361af27fbb53af5c4d4b74aefd1
                        • Instruction ID: f22b998953648566c53eb26612e95a976d9f98653932393a5b48a5ef9e6d2dd7
                        • Opcode Fuzzy Hash: 90edf934cb2df564101ea4c50fc2319f64c98361af27fbb53af5c4d4b74aefd1
                        • Instruction Fuzzy Hash: 7361E572900718AFDB219FE4DC49BAEBBB9FF48725F14011AFA15EB291C7706911CB60
                        APIs
                        • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,2BB8795F,?,00000000,74DF34C0,?,?,?,00000000,00C984FD,000000FF,?,00B86290), ref: 00BA4560
                        • CreateThread.KERNEL32(00000000,00000000,00BA48D0,?,00000000,00000000), ref: 00BA4596
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00BA46A6
                        • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 00BA46B1
                        • CloseHandle.KERNEL32(00000000), ref: 00BA46D1
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateThread$AllocateCloseCodeEventExitHandleHeapObjectSingleWait
                        • String ID:
                        • API String ID: 978852114-0
                        • Opcode ID: 05f4f3ae39cc3065b73739676e05099fa3b4988828567869f1a4cd7a5b3bab4e
                        • Instruction ID: 4a6907940e187c9a113121c7cfd2d1b6e270ab3795b0410cf1a5cf541755dc80
                        • Opcode Fuzzy Hash: 05f4f3ae39cc3065b73739676e05099fa3b4988828567869f1a4cd7a5b3bab4e
                        • Instruction Fuzzy Hash: A7516A74A04309DFCB10CF68D984BAEBBF4FF5A314F2586A9E816A7751D770A804CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: FTP Server$GET$HTTP/1.0$Local Network Server
                        • API String ID: 1452528299-797884378
                        • Opcode ID: 30b32fd799a30903ee4740ec327ac0a90648edd44ce0e15151016fe3aa7214ae
                        • Instruction ID: c1fb51a9b9b2fb802493982400c8733287a18dd15550681eabc755affd6c0fda
                        • Opcode Fuzzy Hash: 30b32fd799a30903ee4740ec327ac0a90648edd44ce0e15151016fe3aa7214ae
                        • Instruction Fuzzy Hash: D141C2719006199BDB10EFA8DC49BAEBBF8EF05720F104179F911EB291DB749A049BA1
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B578BD
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B578E0
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B57908
                        • std::_Facet_Register.LIBCPMT ref: 00B5797D
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B579A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID:
                        • API String ID: 459529453-0
                        • Opcode ID: 91dacff4fc5b8c94c22c7111530e2f4a5500383ff62c9624bdf013da748ee78b
                        • Instruction ID: e54cb0af33a9e0fb9b550fcd71b2ad6260e634b432bd53308910a75ca95a4acd
                        • Opcode Fuzzy Hash: 91dacff4fc5b8c94c22c7111530e2f4a5500383ff62c9624bdf013da748ee78b
                        • Instruction Fuzzy Hash: 4641F071944215EFDB11CF58E884BAEBBB4EF40320F2442D9E854A7391CB30AE44CBE0
                        APIs
                        • LocalFree.KERNEL32(?,?,?), ref: 00B5A319
                        • LocalFree.KERNEL32(?,?,?), ref: 00B5A329
                        • GetLastError.KERNEL32 ref: 00B5A367
                        • LocalAlloc.KERNEL32(00000040,00000014), ref: 00B5A3A8
                        • GetLastError.KERNEL32 ref: 00B5A3C2
                        • LocalFree.KERNEL32(?), ref: 00B5A3D3
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Local$Free$ErrorLast$AllocAllocateHeap
                        • String ID:
                        • API String ID: 1027944315-0
                        • Opcode ID: 730607b10184d803692072f720bcddd70d3f7e6e5a83468b88c583f8b3957558
                        • Instruction ID: 2c3c269d4384a08e4c27d9d33b890a15ba698b91410965589f0c7d6b17816022
                        • Opcode Fuzzy Hash: 730607b10184d803692072f720bcddd70d3f7e6e5a83468b88c583f8b3957558
                        • Instruction Fuzzy Hash: 253158702007059FE720DF65DC44B5BB7E8FF4471AF004AAEE986E2650E774E90D8BA2
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A40BDA
                        • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00A40BE0
                        • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 00A40C03
                        • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00C47B46,000000FF), ref: 00A40C2B
                        • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,00C47B46,000000FF), ref: 00A40C31
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess$FormatMessage
                        • String ID:
                        • API String ID: 1606019998-0
                        • Opcode ID: 72917c435d33618653f27923b5189804e0e153c4e089624b20fb666d349c8d6b
                        • Instruction ID: 56d499b460486e2a50fbf9176e61091a63c82b6c61d97e8b26f2a55c305671dc
                        • Opcode Fuzzy Hash: 72917c435d33618653f27923b5189804e0e153c4e089624b20fb666d349c8d6b
                        • Instruction Fuzzy Hash: 1B1146B5A44319ABEB00DF94CC46FAFB7BCFB04B14F100515F514A72C1DBB559049B91
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00A5AB8B
                        • SendMessageW.USER32(?,?,?,0000102B), ref: 00A5ABE8
                        • SendMessageW.USER32(?,?,?,0000102B), ref: 00A5AC37
                        • SendMessageW.USER32(?,00001043,00000000,00000000), ref: 00A5AC48
                        • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00A5AC55
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: 5ce3be1858214bdfc6b8339c91160bafcb6f90f5c4582aad4e18171667191936
                        • Instruction ID: f96e0026fbcc057a34a174c72fb83b75d115b9ea2d5fa190c296df6f3a144ffc
                        • Opcode Fuzzy Hash: 5ce3be1858214bdfc6b8339c91160bafcb6f90f5c4582aad4e18171667191936
                        • Instruction Fuzzy Hash: D6216D31918346AAE320DF00CD40B1ABBF1BFEE758F202B0EF5D0211A4E7F191848E86
                        APIs
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                          • Part of subcall function 00B3B5D0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,000000EF,?,00A5A158,00000000,80004005), ref: 00B3B638
                          • Part of subcall function 00B3B5D0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B3B668
                        • SendMessageW.USER32(?,00001036,00000004,00000004), ref: 00A612ED
                        • SendMessageW.USER32(?,00001036,00000400,00000400), ref: 00A61304
                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00A61360
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$AllocateHeapWindow
                        • String ID: QuickSelectionList
                        • API String ID: 3168177373-3633591268
                        • Opcode ID: 16f9eb2072874748610be89bdacce4daf829441ee1f369c1c936903bcbcbe637
                        • Instruction ID: 1c8ab91e0e60fb4078c6fb0207e137f68e32c222879cbd8208e03e10f993c54b
                        • Opcode Fuzzy Hash: 16f9eb2072874748610be89bdacce4daf829441ee1f369c1c936903bcbcbe637
                        • Instruction Fuzzy Hash: 3471AB71A00604AFDB14DF68C885BAAFBF4FF89324F14466DE566A7390DB74A904CB60
                        APIs
                        • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00A69AB2
                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00A69ABA
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                          • Part of subcall function 00A6B6C0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A6B70F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$AllocateHeap
                        • String ID: SysTabControl32$TabHost
                        • API String ID: 4003639188-2872506973
                        • Opcode ID: d5487cc60a0657594606dbbde19f6c0685f53012320514b28e81fa7b58be508d
                        • Instruction ID: 58e72e0a19459460069e41b42dee43c34bce0dee524cd1ad44bb3afeca6d680f
                        • Opcode Fuzzy Hash: d5487cc60a0657594606dbbde19f6c0685f53012320514b28e81fa7b58be508d
                        • Instruction Fuzzy Hash: 51518D75A00605AFDB10DF68C844BAEBBF8FF49710F14426AF915AB390DB35AD00CBA5
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF,2BB8795F), ref: 00BA3634
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,00D5D6E0,00B93680,?), ref: 00B45F78
                          • Part of subcall function 00B45F60: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00B45FAA
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapObjectSingleWait
                        • String ID: *.*$.jar$.pack
                        • API String ID: 2019434529-3892993289
                        • Opcode ID: e4a23ce660e3231b998ab2d26fb2e28f1721522cc32f568a4d9ac57ff7f525df
                        • Instruction ID: 55c44e460b5c9ce51c526be1a814da5541ba2e6c0699ba4ea9603206b1b47b4f
                        • Opcode Fuzzy Hash: e4a23ce660e3231b998ab2d26fb2e28f1721522cc32f568a4d9ac57ff7f525df
                        • Instruction Fuzzy Hash: 01514FB0A0465A9BDB10DFA9C948BAEF7F4FF05714F1442A9F425A7291DB34DE04CB90
                        APIs
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B9157A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DiskFreeSpace
                        • String ID: \$\$\
                        • API String ID: 1705453755-3791832595
                        • Opcode ID: 4e9553028b3cfac980e165f26abba6d46044c5007635dede303be73bc27b4b8e
                        • Instruction ID: 19267ca744f35260618536f4e7abe98297beb6a77d3dba5f4de1097ff56590e6
                        • Opcode Fuzzy Hash: 4e9553028b3cfac980e165f26abba6d46044c5007635dede303be73bc27b4b8e
                        • Instruction Fuzzy Hash: 6941A761D1425287CF30DF2884416ABB7F4FFE5354F178EBEE89A97140E7309984A386
                        APIs
                        • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,00000000,00C86F0D,000000FF,?,80004005,2BB8795F,?), ref: 00B5E2A3
                          • Part of subcall function 00A3A2F0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,80070057,8007000E,80004005,00A52BE4,00000000,?,?,?,*.*), ref: 00A3A313
                        • DeleteFileW.KERNEL32(?,2BB8795F,?,74DF3340,?,00000000,00C86F0D,000000FF,?,00B5E046), ref: 00B5E2D2
                        • GetLastError.KERNEL32(?,?,?,00000000,00C86F0D,000000FF,?,80004005,2BB8795F,?,?,?,?,00C86F0D,000000FF), ref: 00B5E2E2
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DeleteFile$ErrorFindHeapLastProcessResource
                        • String ID: \\?\
                        • API String ID: 2079828947-4282027825
                        • Opcode ID: 395f4144901ab60b1ebb6f22e5af93a26d4cc9099dea59e86d76516dff7429ce
                        • Instruction ID: 69a4b2df67a375d25d6922b7599f92071e0d1457ea8ebb28b4713d1ba54738bf
                        • Opcode Fuzzy Hash: 395f4144901ab60b1ebb6f22e5af93a26d4cc9099dea59e86d76516dff7429ce
                        • Instruction Fuzzy Hash: E6218071900614DFDB14DFA8C948BAEB7E8FF05322F144699EC61D72A4DB36D9088B50
                        APIs
                        • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00A40FA2
                        • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A40FA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: RoOriginateLanguageException$combase.dll
                        • API String ID: 2574300362-3996158991
                        • Opcode ID: e33c940acae6c124be4e089923e74c7f71da7b8969f1cdb8d870b3039d56ff8e
                        • Instruction ID: 311cc3768f9b14bbb7f6fddd17283e7503fa7ae2acb4fe82a45c59f7231d0b34
                        • Opcode Fuzzy Hash: e33c940acae6c124be4e089923e74c7f71da7b8969f1cdb8d870b3039d56ff8e
                        • Instruction Fuzzy Hash: EF318D7090434ADFDB20DFA8C942BEEBBF4FB44314F100629E824A72D0DBB55A84DB91
                        APIs
                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00B94C2A,?,2BB8795F,?,?,?,?,00C95275,000000FF), ref: 00B96C7D
                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00B94C2A,?,2BB8795F,?,?,?,?,00C95275,000000FF,?), ref: 00B96C9E
                        • GetLastError.KERNEL32(?,2BB8795F,?,?,?,?,00C95275,000000FF,?,00B9452D,?,?,00000000,?,?), ref: 00B96CFE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateEvent$ErrorLast
                        • String ID: AdvancedInstaller
                        • API String ID: 1131763895-1372594473
                        • Opcode ID: 3a3f72f5f2910a1ec6eccaa66bc09d9c9dc83db7f77c1a3dfa18c4c3d1934f6f
                        • Instruction ID: 4dba3cd0cf6af7b897ad2d032de68a10484aff035d9bea159bf1a07214afae1e
                        • Opcode Fuzzy Hash: 3a3f72f5f2910a1ec6eccaa66bc09d9c9dc83db7f77c1a3dfa18c4c3d1934f6f
                        • Instruction Fuzzy Hash: A3115B71740702BBD720CB21CD89F1ABBE4FF84715F204429F5159B690D771B851CBA0
                        APIs
                          • Part of subcall function 00C1EE76: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EE81
                          • Part of subcall function 00C1EE76: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3ADE6,00D5CBBC,2BB8795F,?,?,00C4629D,000000FF,?,00B9F0FC,2BB8795F,?,?), ref: 00C1EEBB
                        • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00B670EE
                        • GetProcAddress.KERNEL32(00000000), ref: 00B670F5
                          • Part of subcall function 00C1EE25: AcquireSRWLockExclusive.KERNEL32(00D5BFA8,?,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE2F
                          • Part of subcall function 00C1EE25: ReleaseSRWLockExclusive.KERNEL32(00D5BFA8,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE62
                          • Part of subcall function 00C1EE25: WakeAllConditionVariable.KERNEL32(00D5BFA4,?,00A3AE57,00D5CBBC,00CA94C0), ref: 00C1EE6D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireRelease$AddressConditionLibraryLoadProcVariableWake
                        • String ID: Dbghelp.dll$SymFromAddr
                        • API String ID: 1702099962-642441706
                        • Opcode ID: 65a988e96222eae8a1f749b9b423c8c900b38f2d110112e7842668bb127c29c2
                        • Instruction ID: 8618f042b91b03c6e9ae8e958938881a9788ca204286c02bc22dd40b18db0e2c
                        • Opcode Fuzzy Hash: 65a988e96222eae8a1f749b9b423c8c900b38f2d110112e7842668bb127c29c2
                        • Instruction Fuzzy Hash: 6C014CB1A44744EFC710DF58DD46B49B7A4E70BB24F100669EC15D77D0DF786A089B21
                        APIs
                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,00C2364D,00000000,00000001,00D5C33C,?,?,?,00C237F0,00000004,InitializeCriticalSectionEx,00CC9F70,InitializeCriticalSectionEx), ref: 00C236A9
                        • GetLastError.KERNEL32(?,00C2364D,00000000,00000001,00D5C33C,?,?,?,00C237F0,00000004,InitializeCriticalSectionEx,00CC9F70,InitializeCriticalSectionEx,00000000,?,00C2399D), ref: 00C236B3
                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00C227D3), ref: 00C236DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: 6639c2381a84db907ab3810d4fcb8575ae42786582d7e09ae9ec01954cac8d51
                        • Instruction ID: 8e85d3159fc3eeb79203a68ec1077888902805f466ac763426332ded07808c6f
                        • Opcode Fuzzy Hash: 6639c2381a84db907ab3810d4fcb8575ae42786582d7e09ae9ec01954cac8d51
                        • Instruction Fuzzy Hash: BDE01270644244B7DB101B51FC06F1E3A58AB01B44F140024FA1DE55E1D766EA549684
                        APIs
                        • SysAllocStringLen.OLEAUT32(00000000,?), ref: 00A465AA
                        • SysFreeString.OLEAUT32(00000000), ref: 00A465F6
                        • SysFreeString.OLEAUT32(00000000), ref: 00A46618
                        • SysFreeString.OLEAUT32(00000000), ref: 00A46773
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: String$Free$Alloc
                        • String ID:
                        • API String ID: 986138563-0
                        • Opcode ID: e5f0477008fbf71b0db5508d25896446c822a10ec2adc6cfdc02c140e7f5ec09
                        • Instruction ID: bef51ae4ea97972575ccbed5be4e0d3c42fcb6365b8522457cb73dd852ff5a52
                        • Opcode Fuzzy Hash: e5f0477008fbf71b0db5508d25896446c822a10ec2adc6cfdc02c140e7f5ec09
                        • Instruction Fuzzy Hash: 4BA18075A0020A9FDB14DFA8CD44FAEB7B8EF85714F104519E915E7380EB74AA05CB62
                        APIs
                        • SendMessageW.USER32(00000001,0000110A,00000004,?), ref: 00A63863
                        • SendMessageW.USER32(00000001,0000110A,00000001,00000000), ref: 00A63897
                        • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00A63A10
                        • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00A63A36
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 1f10e9158be60dc789d5f2f568e61c42d36ef52db51535a13feab6149cb893fa
                        • Instruction ID: 1e942553d41d7700245d1c09024eb1e876b6c8cbe29f29de745405c92d963c8f
                        • Opcode Fuzzy Hash: 1f10e9158be60dc789d5f2f568e61c42d36ef52db51535a13feab6149cb893fa
                        • Instruction Fuzzy Hash: 72A14D72A00208DFCF15CF68D895BEEB7B5BF48310F144569E856AB291DB70EA46CF50
                        APIs
                        • VariantClear.OLEAUT32(?), ref: 00A4F088
                        • SysAllocString.OLEAUT32(00000000), ref: 00A4F09B
                        • VariantClear.OLEAUT32(00000000), ref: 00A4F0BD
                        • VariantClear.OLEAUT32(?), ref: 00A4F0EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ClearVariant$AllocString
                        • String ID:
                        • API String ID: 2502263055-0
                        • Opcode ID: ee9a0903318548aba5b4c0153aa087a937c9d1b4402d0d655592b3fb1511b770
                        • Instruction ID: 82bb2c6b9ea760f162fb65ad27003d0f3bfbf893f01a648ab6f2747297a71663
                        • Opcode Fuzzy Hash: ee9a0903318548aba5b4c0153aa087a937c9d1b4402d0d655592b3fb1511b770
                        • Instruction Fuzzy Hash: 7B5182B5A002589FDB20CF68CD40B9AB7B4FF88714F1085A9E919EB241E775E984CF94
                        APIs
                        • GetShortPathNameW.KERNEL32(2BB8795F,00000000,00000000), ref: 00B75980
                        • GetShortPathNameW.KERNEL32(?,80004005,?), ref: 00B759EE
                        • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,00000000,00000000,?), ref: 00B75A3E
                        • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,00000000,00000000), ref: 00B75A74
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ByteCharMultiNamePathShortWide
                        • String ID:
                        • API String ID: 3379522384-0
                        • Opcode ID: 66f50fb263d825d5d420ba01df81bfabdd70f4f38405eec06da1a79d8ccdb152
                        • Instruction ID: f2582fb7b7eb99edbfbed106de61466fb2e0d6c1f1dfec2d2e30597b0bc0e63f
                        • Opcode Fuzzy Hash: 66f50fb263d825d5d420ba01df81bfabdd70f4f38405eec06da1a79d8ccdb152
                        • Instruction Fuzzy Hash: 79517C71600A06AFD724DF58CC89F6EF7F5EF85720F20866DE5299B291DBB1A8008B50
                        APIs
                        • SendMessageW.USER32(?,00001036,00010000,00000000), ref: 00B3B82B
                        • GetWindowRect.USER32(00000000), ref: 00B3B884
                          • Part of subcall function 00AF05E0: GetWindowRect.USER32(?,?), ref: 00AF0672
                          • Part of subcall function 00AF05E0: GetWindowRect.USER32(?,?), ref: 00AF068A
                        • SendMessageW.USER32(?,00001026,00000000,000000FF), ref: 00B3B991
                        • SendMessageW.USER32(?,0000108A,00000000,00000011), ref: 00B3B9A4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageRectSendWindow
                        • String ID:
                        • API String ID: 2814762282-0
                        • Opcode ID: 95ebb91bb38563ba86b3dc0a078743a19388c2dfeafab21dc070e7770c999539
                        • Instruction ID: 5ff594f98d9b47c6e5a0aa6b119c3683623ff5e8dc0a3035a2fb6e8d229c0f1c
                        • Opcode Fuzzy Hash: 95ebb91bb38563ba86b3dc0a078743a19388c2dfeafab21dc070e7770c999539
                        • Instruction Fuzzy Hash: B7512671D00718ABDB10DFA9CD45BAEFBF8FF59710F10421AE915A7291DB706981CB60
                        APIs
                        • RegCloseKey.ADVAPI32(00000000,2BB8795F), ref: 00B90936
                        • _wcsrchr.LIBVCRUNTIME ref: 00B90960
                        • RegQueryValueExW.ADVAPI32(00000000,00CE7EB0,00000000,00000000,00000000,00000000,00CE7EB0,00000001,?,00000000,00000000), ref: 00B909E3
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00B90A2F
                          • Part of subcall function 00B907E0: RegOpenKeyExW.ADVAPI32(00000000,2BB8795F,00000000,00020019,00000002,2BB8795F,00000001,00000010,00000002,00B8FB0C,2BB8795F,00000000,00000000), ref: 00B9087C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Close$OpenQueryValue_wcsrchr
                        • String ID:
                        • API String ID: 213811329-0
                        • Opcode ID: c3039fed50ce1d123c9b60c8eb0f58d7f499ae912648791bd96c46c978d8c55c
                        • Instruction ID: f89a63329ac356b7036661b67c12b83c6be2afd09f4effa07a3ae6f8e8443691
                        • Opcode Fuzzy Hash: c3039fed50ce1d123c9b60c8eb0f58d7f499ae912648791bd96c46c978d8c55c
                        • Instruction Fuzzy Hash: E351CD719053499FEB10DF68C944BAEBBB5EB40320F1482AAEC24A73D1D775AA04CB90
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00AF0672
                        • GetWindowRect.USER32(?,?), ref: 00AF068A
                        • GetWindowRect.USER32(?,?), ref: 00AF06F6
                        • GetWindowLongW.USER32(?,000000EC), ref: 00AF071A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Window$Rect$Long
                        • String ID:
                        • API String ID: 3486571012-0
                        • Opcode ID: c4fe3445b553ee36e4dc850981329d39f81b05729f3d23e8a371a690ee7c093a
                        • Instruction ID: 179bb5aa04acabb78779c960e5ee89e683cdf231526b7c09d53ab2ef62530c11
                        • Opcode Fuzzy Hash: c4fe3445b553ee36e4dc850981329d39f81b05729f3d23e8a371a690ee7c093a
                        • Instruction Fuzzy Hash: 0A41BB32A083099FC740CF65D980E6BB7E8FF99715F04462EF989E7251E770E9508B62
                        APIs
                        • FindResourceW.KERNEL32(00000000,?,00000017,2BB8795F,?,00D5D514,?,?,?,?,00000000,Function_0024632D,000000FF,?,?,00D5D514), ref: 00AEBB09
                        • LoadResource.KERNEL32(00000000,00000000,?,00D5D514,?,?,?,?,00000000,Function_0024632D,000000FF,?,?,00D5D514,?), ref: 00AEBB18
                        • LockResource.KERNEL32(00000000,?,00D5D514,?,?,?,?,00000000,Function_0024632D,000000FF,?,?,00D5D514,?), ref: 00AEBB23
                        • SizeofResource.KERNEL32(00000000,?,?,00D5D514,?,?,?,?,00000000,Function_0024632D,000000FF,?,?,00D5D514,?), ref: 00AEBB34
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID:
                        • API String ID: 3473537107-0
                        • Opcode ID: 59ec9b8359774534899f282e890c79e07b3f7d41cd31604c7d81319fa2cc643a
                        • Instruction ID: f7ed5a1eac80fc515906cae3d143dea0fd4dc92ac07ebba275067a5763694560
                        • Opcode Fuzzy Hash: 59ec9b8359774534899f282e890c79e07b3f7d41cd31604c7d81319fa2cc643a
                        • Instruction Fuzzy Hash: 4A31D1B1D157459BD7209F75DD45B6FBBB8EF44720F004229E865E3281EB309A04C6A1
                        APIs
                        • ResetEvent.KERNEL32(?,?,?,00B97BA2,?,?,?,?,?,00000003,00000000,2BB8795F,00000000), ref: 00B987F2
                        • GetLastError.KERNEL32(?,?,?,00B97BA2,?,?,?,?,?,00000003,00000000,2BB8795F,00000000), ref: 00B9881F
                        • WaitForSingleObject.KERNEL32(?,0000000A,?,?,?,00B97BA2,?,?,?,?,?,00000003,00000000,2BB8795F,00000000), ref: 00B98855
                        • SetEvent.KERNEL32(?,?,?,?,00B97BA2,?,?,?,?,?,00000003,00000000,2BB8795F,00000000), ref: 00B98878
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Event$ErrorLastObjectResetSingleWait
                        • String ID:
                        • API String ID: 708712559-0
                        • Opcode ID: 5ed42c79ff00ba0c01b4389a9a8767cd82da59c91bba0637a276a64b51d64244
                        • Instruction ID: 73d30d68cdd03196d8d7b6bf0d457529f4b256721198045ab296e7d2eaae568b
                        • Opcode Fuzzy Hash: 5ed42c79ff00ba0c01b4389a9a8767cd82da59c91bba0637a276a64b51d64244
                        • Instruction Fuzzy Hash: 69114C316047408EEB719B25E988B5B7BE1FB62724F4448BEE08687972CB60EC85C760
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00C1C72A
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00C1C735
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00C1C7A3
                          • Part of subcall function 00C1C885: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00C1C89D
                        • std::locale::_Setgloballocale.LIBCPMT ref: 00C1C750
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                        • String ID:
                        • API String ID: 677527491-0
                        • Opcode ID: 5e6d2700ce4420bd4d1a78458b415b9ac7358c6773d66ae8893da14958e6e7fa
                        • Instruction ID: 119f63288bb3e066dd85b0f1a8141b237427252225ab73223103715a17efc916
                        • Opcode Fuzzy Hash: 5e6d2700ce4420bd4d1a78458b415b9ac7358c6773d66ae8893da14958e6e7fa
                        • Instruction Fuzzy Hash: 7101BC75A412119BDB06EB30D885ABD7B62FFC6710B18404AF811973C2CF74AE82EBD0
                        APIs
                        • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00A66DF1
                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00A66DF9
                          • Part of subcall function 00A3AA00: RtlAllocateHeap.NTDLL(?,00000000,?,2BB8795F,00000000,00C45D20,000000FF,?,?,00D52BCC,?,00B9F158,80004005,2BB8795F,?,?), ref: 00A3AA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$AllocateHeap
                        • String ID: RichEdit20W
                        • API String ID: 4003639188-4173859555
                        • Opcode ID: c5b425306f5d68d3a76972b0e7eeab58b920556c13267bd3580f9f6d9d4267e7
                        • Instruction ID: 9370e85ce7104457703c607bc7114f180d8883dbaab80ec5b9013b70b77779e4
                        • Opcode Fuzzy Hash: c5b425306f5d68d3a76972b0e7eeab58b920556c13267bd3580f9f6d9d4267e7
                        • Instruction Fuzzy Hash: C6B15771A01619AFDB14CFA8C984BEEBBF5FF48310F144169E945AB291DB71AD00CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: AddressAllocateFolderHeapLibraryLoadLocationProcSpecial
                        • String ID: ADVINST_LOGS$Everyone
                        • API String ID: 1617241543-3921853867
                        • Opcode ID: 863b4e5b1b83e754b18775859bc64754b58f6585b7d49c6655558efc66cc53cc
                        • Instruction ID: 5e3ed164903b0e472266463538d626931be0e1187781f3b0bd67174673b03ac5
                        • Opcode Fuzzy Hash: 863b4e5b1b83e754b18775859bc64754b58f6585b7d49c6655558efc66cc53cc
                        • Instruction Fuzzy Hash: FB91CF71901209DFDF00DFA8C949BAEFBF4EF15714F2442A8E856AB291DB355E04CBA1
                        APIs
                        • Concurrency::cancel_current_task.LIBCPMT ref: 00B57C62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task
                        • String ID: false$true
                        • API String ID: 118556049-2658103896
                        • Opcode ID: 1ee39130d6d311517cdb942d3f890653dbd4ca6b736a7068f59347aba73a4ccc
                        • Instruction ID: 64802c22141a7b3f0ce8ca303e2e735673abffe56f5ce28d7cdf709c2bcef4b6
                        • Opcode Fuzzy Hash: 1ee39130d6d311517cdb942d3f890653dbd4ca6b736a7068f59347aba73a4ccc
                        • Instruction Fuzzy Hash: 7871A1B1D04748DBDB10DF94C941BDEBBF8FF05710F14826AE815AB281EB75AA48CB91
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • CloseHandle.KERNEL32(?,2BB8795F,000000C9,00000000), ref: 00B92953
                        • DeleteCriticalSection.KERNEL32(?,2BB8795F,000000C9,00000000), ref: 00B929E1
                        Strings
                        • << Advanced Installer (x86) Log >>, xrefs: 00B928BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CloseCriticalDeleteHandleHeapProcessSection
                        • String ID: << Advanced Installer (x86) Log >>
                        • API String ID: 1977327082-396061572
                        • Opcode ID: 45e4d4d8b07252dd46fecdee56dc0f123e8bc0c89a71e5d60454cc034ed851f7
                        • Instruction ID: 149bbb41780ad33c78552c916326e71cd99970cdf18a17f9a7089dec5bb01d79
                        • Opcode Fuzzy Hash: 45e4d4d8b07252dd46fecdee56dc0f123e8bc0c89a71e5d60454cc034ed851f7
                        • Instruction Fuzzy Hash: B261CB70A01785EFDB10DF68C948B4ABBF0FF49315F1482A9E845DB791DB749A08CBA1
                        APIs
                        • PathIsUNCW.SHLWAPI(?,2BB8795F), ref: 00B4F581
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Path
                        • String ID: \\?\$\\?\UNC\
                        • API String ID: 2875597873-3019864461
                        • Opcode ID: ddf32f23b3bb69b6a72ef7d50e5cb8ae638453c4b9dc6876d03d1366df1cbb17
                        • Instruction ID: 1af7278e7caf23c1394c62c74ee48ca6fcbcd698842b36c0d2047ad03524da1a
                        • Opcode Fuzzy Hash: ddf32f23b3bb69b6a72ef7d50e5cb8ae638453c4b9dc6876d03d1366df1cbb17
                        • Instruction Fuzzy Hash: AB51DFB0D002059BDB14DF68D985BBEB7F5FF54304F10866DE841A7290EB70AA48CBE0
                        APIs
                          • Part of subcall function 00A3AD40: GetProcessHeap.KERNEL32 ref: 00A3AD95
                        • GetLastError.KERNEL32(?,00000000,FTP Server,0000000A), ref: 00B98984
                        • WaitForSingleObject.KERNEL32(?,0000000A,?,00000000,FTP Server,0000000A), ref: 00B989BD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: ErrorHeapLastObjectProcessSingleWait
                        • String ID: REST %u
                        • API String ID: 1530046183-3183379045
                        • Opcode ID: b464b8c283683387028ffe2f95ac5b500e9533247c04f86aae9bd31ade7281e2
                        • Instruction ID: d28be8ba380f402d71fef0ec083dceeb8878c97fea56b7f19490f6d4a433b7b2
                        • Opcode Fuzzy Hash: b464b8c283683387028ffe2f95ac5b500e9533247c04f86aae9bd31ade7281e2
                        • Instruction Fuzzy Hash: EC51CE31600604DFDB20DF68CC85B6AB7E5FF42324F1486BAE4669B6A1DB74EC45CB41
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,2BB8795F,?,?,00D5D6E0), ref: 00B93BCF
                        • CreateDirectoryW.KERNEL32(?,00000000,?,00D5D6E0), ref: 00B93C30
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: CreateDirectoryPathTemp
                        • String ID: ADVINST_LOGS
                        • API String ID: 2885754953-2492584244
                        • Opcode ID: 0b4270f8f1b24ab9f9e9152e8677a0140b61d9abc13fdd74b43926fedd325640
                        • Instruction ID: 468c1a034c5342d270a57fcd0265bf910a9a9567214221ae2e3766fa91c165a1
                        • Opcode Fuzzy Hash: 0b4270f8f1b24ab9f9e9152e8677a0140b61d9abc13fdd74b43926fedd325640
                        • Instruction Fuzzy Hash: 3551B175900619CACF209F28C8487BAB7F4FF15B14F2446BED859A7291EB355EC1CB90
                        APIs
                          • Part of subcall function 00B68590: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,2BB8795F,00000000,00000000,?), ref: 00B685EB
                        • GetLastError.KERNEL32(?,?), ref: 00B68B5E
                        • DeleteFileW.KERNEL32(?), ref: 00B68B71
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: DeleteErrorFileFolderLastPath
                        • String ID: Shlwapi.dll
                        • API String ID: 3097891619-1687636465
                        • Opcode ID: 2a43f8c3da332f311b5dd82d7c350aaffba17e0d3320901885799d121231a072
                        • Instruction ID: c8bb7ddf36d97c0b4011c5f95e88e59e7818dc015ac4533b7511fae23438bc4f
                        • Opcode Fuzzy Hash: 2a43f8c3da332f311b5dd82d7c350aaffba17e0d3320901885799d121231a072
                        • Instruction Fuzzy Hash: B13132B19003099FDB15DFA5C844BEEBBF8EF49711F18466AE905A3280DB359A44CBA1
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00A78BBB
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A78C1E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3988782225-1405518554
                        • Opcode ID: 0e868621669c51b64596b7cb7134571b3a8e1101266ac4d7490918da167aaf3f
                        • Instruction ID: e478b9e7cf278e006118f8921d5314f9db43c6f8eebcc082cb66ed47cbf2a049
                        • Opcode Fuzzy Hash: 0e868621669c51b64596b7cb7134571b3a8e1101266ac4d7490918da167aaf3f
                        • Instruction Fuzzy Hash: 0C212170A05780DFD720CF68C84478BBFE4AF05700F14869EE489C7B81D7B9AA08D7A1
                        APIs
                          • Part of subcall function 00B3BA00: GetProcAddress.KERNEL32(SetWindowTheme), ref: 00B3BACD
                          • Part of subcall function 00B3BA00: SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00B3BB0F
                        • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00B3B550
                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00B3B558
                          • Part of subcall function 00A48400: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A48436
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: MessageSend$AddressLongProcWindow
                        • String ID: SysListView32
                        • API String ID: 3249030398-78025650
                        • Opcode ID: 1c27fb06fe1aa944173e7fd6b9d703d22aee3dea2497d5769ec35421b392d9f4
                        • Instruction ID: 1ea80a921e38748cdab8bcaf8f56b98a96bf56ad257fc198f2f99ec54ae74db8
                        • Opcode Fuzzy Hash: 1c27fb06fe1aa944173e7fd6b9d703d22aee3dea2497d5769ec35421b392d9f4
                        • Instruction Fuzzy Hash: F3117931300354BBD6209B258C05F6BFBA9FFC9761F154219FA05AB2A0CBB1A900DAA1
                        APIs
                        • GetProcessHeap.KERNEL32(?,?,?,00000000), ref: 00A889FC
                        • HeapFree.KERNEL32(00000000,?,?,?,00000000), ref: 00A88A02
                        • GetProcessHeap.KERNEL32(?,?), ref: 00A88A5C
                        • HeapFree.KERNEL32(00000000,?,?), ref: 00A88A62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID:
                        • API String ID: 3859560861-0
                        • Opcode ID: d2bbc698187438d71999d55131b8b93e7a51669d5fe66fea7fb4f93a1527dad2
                        • Instruction ID: f76306ed9ad21e1be3de75246f50440bdccc16b6206820834e37b6b2ac4578ed
                        • Opcode Fuzzy Hash: d2bbc698187438d71999d55131b8b93e7a51669d5fe66fea7fb4f93a1527dad2
                        • Instruction Fuzzy Hash: 50A1A971D00258DBCB18EFA8C944BEEFBB4BF01324F55425AE811672D1DF78AA45CBA1
                        APIs
                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?), ref: 00A875DC
                        • HeapFree.KERNEL32(00000000,?,?,?,00000000,?,?), ref: 00A875E2
                        • GetProcessHeap.KERNEL32(?,?,?,?), ref: 00A8763C
                        • HeapFree.KERNEL32(00000000,?,?,?,?), ref: 00A87642
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID:
                        • API String ID: 3859560861-0
                        • Opcode ID: 7ff38d6c64e8bb9eb10a8aa7837f238964c3afd56f7c0ca79ca0a72eb6b6c966
                        • Instruction ID: ec2bbd380f0411ae41b723fd79ebfaa02a1a689a87e573396aeeae5a5e88fc3b
                        • Opcode Fuzzy Hash: 7ff38d6c64e8bb9eb10a8aa7837f238964c3afd56f7c0ca79ca0a72eb6b6c966
                        • Instruction Fuzzy Hash: 0361DC70D09218DFCB19EFA8C944BEEFBB4BF10314F244269E41167291EB30AA45DB90
                        APIs
                        • GetProcessHeap.KERNEL32(?,?,2BB8795F,?,?,?,00C4760D,000000FF), ref: 00A3EAA7
                        • HeapFree.KERNEL32(00000000,?,?,2BB8795F,?,?,?,00C4760D,000000FF), ref: 00A3EAAD
                          • Part of subcall function 00A40A20: GetProcessHeap.KERNEL32(00000000,-0000001B,00000001,?,?,00A40B4B,00000000,?,00000001,?), ref: 00A40A43
                          • Part of subcall function 00A40A20: HeapAlloc.KERNEL32(00000000,00000000,-0000001B,00000001,?,?,00A40B4B,00000000,?,00000001,?), ref: 00A40A49
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,2BB8795F), ref: 00A3EB36
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?,0000FDE9,00000000,?,?,00000000,00000000,2BB8795F), ref: 00A3EB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.1671872319.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A30000, based on PE: true
                        • Associated: 00000000.00000002.1671845353.0000000000A30000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672088072.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672151552.0000000000D58000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672172176.0000000000D5A000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672201184.0000000000D5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1672235514.0000000000D66000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a30000_game.jbxd
                        Similarity
                        • API ID: Heap$ByteCharMultiProcessWide$AllocFree
                        • String ID:
                        • API String ID: 1621643742-0
                        • Opcode ID: 06bded41b9d2d18f7790d86f4d1a6bef9143927d8b1beaefb25e12a4d2f81ecb
                        • Instruction ID: 890accd727e9f9018c07c5c704999fd782d2551a633c437d555a65a618951d2f
                        • Opcode Fuzzy Hash: 06bded41b9d2d18f7790d86f4d1a6bef9143927d8b1beaefb25e12a4d2f81ecb
                        • Instruction Fuzzy Hash: 66418EB1A04209AFDB15DFA9D801BAEBBF8FB45720F10476EE524A73C0D7B55A049B90