Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jlK7Q70gbN.exe

Overview

General Information

Sample name:jlK7Q70gbN.exe
renamed because original name is a hash value
Original sample name:39e87c245f3df670592eac79160e0de43421742c0e0ab1cfb1452790f07747c9.exe
Analysis ID:1528470
MD5:fa7b382660c277341e573e54ea81ac1f
SHA1:b84161e5c80dadd9efd6a8307e5d6cdd607b8bc8
SHA256:39e87c245f3df670592eac79160e0de43421742c0e0ab1cfb1452790f07747c9
Infos:

Detection

Score:8
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • jlK7Q70gbN.exe (PID: 6972 cmdline: "C:\Users\user\Desktop\jlK7Q70gbN.exe" MD5: FA7B382660C277341E573E54EA81AC1F)
    • jlK7Q70gbN.exe (PID: 6180 cmdline: "C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe" -burn.clean.room="C:\Users\user\Desktop\jlK7Q70gbN.exe" -burn.filehandle.attached=528 -burn.filehandle.self=540 MD5: F51103F1E13618AE83B88837789FE62C)
      • EMA3D.exe (PID: 4564 cmdline: "C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe" -q -burn.elevated BurnPipe.{01823A2F-6092-4017-B70C-7D2B2DE988B6} {636B081A-FA87-43E7-BB2F-5B923C0323C7} 6180 MD5: F51103F1E13618AE83B88837789FE62C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006E9FA4 DecryptFileW,0_2_006E9FA4
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006E9D87 DecryptFileW,DecryptFileW,0_2_006E9D87
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070FD8F CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,ReadFile,GetLastError,CryptDestroyHash,CryptReleaseContext,GetLastError,CryptGetHashParam,GetLastError,SetFilePointerEx,GetLastError,0_2_0070FD8F
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A29D87 DecryptFileW,DecryptFileW,3_2_00A29D87
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4FD8F CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,ReadFile,GetLastError,CryptDestroyHash,CryptReleaseContext,GetLastError,CryptGetHashParam,GetLastError,SetFilePointerEx,GetLastError,3_2_00A4FD8F
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A29FA4 DecryptFileW,3_2_00A29FA4
Source: jlK7Q70gbN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: jlK7Q70gbN.exeStatic PE information: certificate valid
Source: jlK7Q70gbN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\burn.pdb/ source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\core\BootstrapperCore.pdb source: BootstrapperCore.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\mbahost.pdb source: mbahost.dll.2.dr
Source: Binary string: ./Installer/UI/obj/Release/ema3d.UI.Boot.pdb8 source: ema3d.UI.Boot.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: Microsoft.Deployment.WindowsInstaller.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\WixStdBA.pdb source: mbapreq.dll.2.dr
Source: Binary string: ./Installer/UI/obj/Release/ema3d.UI.Boot.pdb source: ema3d.UI.Boot.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\burn.pdb source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007146C4 FindFirstFileW,FindClose,0_2_007146C4
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00707767 FindFirstFileExW,0_2_00707767
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006E9A30 FindFirstFileW,lstrlenW,FindNextFileW,FindClose,0_2_006E9A30
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D3D4E GetFileAttributesW,GetLastError,GetLastError,SetFileAttributesW,GetLastError,GetTempPathW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,DeleteFileW,GetTempFileNameW,MoveFileExW,MoveFileExW,MoveFileExW,FindNextFileW,GetLastError,GetLastError,GetLastError,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,0_2_006D3D4E
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A546C4 FindFirstFileW,FindClose,3_2_00A546C4
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A47767 FindFirstFileExW,3_2_00A47767
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A29A30 FindFirstFileW,lstrlenW,FindNextFileW,FindClose,3_2_00A29A30
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A13D4E GetFileAttributesW,GetLastError,GetLastError,SetFileAttributesW,GetLastError,GetTempPathW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,DeleteFileW,GetTempFileNameW,MoveFileExW,MoveFileExW,MoveFileExW,FindNextFileW,GetLastError,GetLastError,GetLastError,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,3_2_00A13D4E
Source: jlK7Q70gbN.exe, EMA3D.exeString found in binary or memory: http://appsyndication.org/2006/appsyn
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationc:
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: jlK7Q70gbN.exe, 00000000.00000003.2042647450.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2043591191.0000000002E3B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042973845.0000000002E1A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2043286088.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042310528.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000002.3297850430.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044058097.0000000002E4D000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042377711.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044698951.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044580204.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2041684832.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000002.3299565162.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2045538277.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048888766.000000000376B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2046899780.000000000371B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2047556826.000000000373A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2049646636.0000000003790000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2049229983.000000000377D000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048511892.000000000375B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048235598.000000000374A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2046950182.000000000372C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ema3d.com
Source: jlK7Q70gbN.exe, 00000002.00000003.2052420419.000000000131F000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2052117809.000000000131F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ema3d.com$E
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://ocsp.comodoca.com0
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://ocsp.digicert.com0K
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://ocsp.digicert.com0N
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://ocsp.digicert.com0O
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: http://ocsp.sectigo.com0
Source: EMA3D.exe, 00000003.00000002.3298190467.0000000000B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsoft.ce6
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: http://wixtoolset.org
Source: BootstrapperCore.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
Source: BootstrapperCore.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.drString found in binary or memory: http://wixtoolset.org/news/
Source: Microsoft.Deployment.WindowsInstaller.dll.2.drString found in binary or memory: http://wixtoolset.org/releases/
Source: BootstrapperCore.dll.2.drString found in binary or memory: http://wixtoolset.org/releases/SCreating
Source: mbapreq.thm.2.drString found in binary or memory: http://wixtoolset.org/schemas/thmutil/2010
Source: ema3d.UI.Boot.dll.2.drString found in binary or memory: http://www.ansys.com/privacy
Source: jlK7Q70gbN.exe, 00000000.00000002.3297556859.000000000085B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS
Source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drString found in binary or memory: https://sectigo.com/CPS0
Source: jlK7Q70gbN.exe, 00000002.00000003.2079705659.0000000008E31000.00000004.00000020.00020000.00000000.sdmp, ema3d.UI.Boot.dll.2.drString found in binary or memory: https://www.ansys.com.mcas.ms/legal/terms-and
Source: ema3d.UI.Boot.dll.2.drString found in binary or memory: https://www.ansys.com.mcas.ms/legal/terms-and-conditions/ansys-hybrid-compute-environment-security
Source: BootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FC0410_2_006FC041
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007001C60_2_007001C6
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070F1B20_2_0070F1B2
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D62CC0_2_006D62CC
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007004810_2_00700481
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070A5100_2_0070A510
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007025E10_2_007025E1
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007028150_2_00702815
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FF8E30_2_006FF8E3
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070A9A80_2_0070A9A8
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070DB2E0_2_0070DB2E
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0070DC520_2_0070DC52
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FFC550_2_006FFC55
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FFEFF0_2_006FFEFF
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006F3F960_2_006F3F96
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3C0413_2_00A3C041
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4F1B23_2_00A4F1B2
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A401C63_2_00A401C6
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A162CC3_2_00A162CC
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A404813_2_00A40481
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A425E13_2_00A425E1
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4A5103_2_00A4A510
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3F8E33_2_00A3F8E3
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A428153_2_00A42815
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4A9A83_2_00A4A9A8
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4DB2E3_2_00A4DB2E
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A4DC523_2_00A4DC52
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3FC553_2_00A3FC55
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3FEFF3_2_00A3FEFF
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A33F963_2_00A33F96
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: String function: 00A12022 appears 53 times
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: String function: 00A138BA appears 500 times
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: String function: 00A5055B appears 681 times
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: String function: 00A50A42 appears 34 times
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: String function: 00A535AF appears 79 times
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: String function: 00710A42 appears 34 times
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: String function: 006D38BA appears 499 times
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: String function: 0071055B appears 681 times
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: String function: 006D2022 appears 53 times
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: String function: 007135AF appears 81 times
Source: jlK7Q70gbN.exe, 00000000.00000000.2041163595.000000000073E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEMA3D.exe< vs jlK7Q70gbN.exe
Source: jlK7Q70gbN.exe, 00000002.00000000.2045485722.000000000083E000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameEMA3D.exe< vs jlK7Q70gbN.exe
Source: jlK7Q70gbN.exeBinary or memory string: OriginalFilenameEMA3D.exe< vs jlK7Q70gbN.exe
Source: jlK7Q70gbN.exe.0.drBinary or memory string: OriginalFilenameEMA3D.exe< vs jlK7Q70gbN.exe
Source: jlK7Q70gbN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: classification engineClassification label: clean8.evad.winEXE@5/36@0/0
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D2078 FormatMessageW,GetLastError,LocalFree,0_2_006D2078
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D4639 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,AdjustTokenPrivileges,GetLastError,Sleep,InitiateSystemShutdownExW,GetLastError,CloseHandle,0_2_006D4639
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A14639 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,AdjustTokenPrivileges,GetLastError,Sleep,InitiateSystemShutdownExW,GetLastError,CloseHandle,3_2_00A14639
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0071330F GetModuleHandleA,GetLastError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CoCreateInstance,ExitProcess,0_2_0071330F
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006F6913 ChangeServiceConfigW,GetLastError,0_2_006F6913
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeMutant created: NULL
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\Jump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: cabinet.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: msi.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: version.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: wininet.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: clbcatq.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: msasn1.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: crypt32.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: feclient.dll0_2_006D1070
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCommand line argument: cabinet.dll0_2_006D1070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: _`AB3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: cabinet.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: msi.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: version.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: wininet.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: comres.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: clbcatq.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: msasn1.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: crypt32.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: feclient.dll3_2_00A11070
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCommand line argument: cabinet.dll3_2_00A11070
Source: jlK7Q70gbN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: jlK7Q70gbN.exeString found in binary or memory: Failed to re-launch bundle process after RunOnce: %ls
Source: EMA3D.exeString found in binary or memory: Failed to re-launch bundle process after RunOnce: %ls
Source: jlK7Q70gbN.exeString found in binary or memory: Failed to re-launch bundle process after RunOnce: %ls
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeFile read: C:\Users\user\Desktop\jlK7Q70gbN.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\jlK7Q70gbN.exe "C:\Users\user\Desktop\jlK7Q70gbN.exe"
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe "C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe" -burn.clean.room="C:\Users\user\Desktop\jlK7Q70gbN.exe" -burn.filehandle.attached=528 -burn.filehandle.self=540
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe "C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe" -q -burn.elevated BurnPipe.{01823A2F-6092-4017-B70C-7D2B2DE988B6} {636B081A-FA87-43E7-BB2F-5B923C0323C7} 6180
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe "C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe" -burn.clean.room="C:\Users\user\Desktop\jlK7Q70gbN.exe" -burn.filehandle.attached=528 -burn.filehandle.self=540 Jump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe "C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe" -q -burn.elevated BurnPipe.{01823A2F-6092-4017-B70C-7D2B2DE988B6} {636B081A-FA87-43E7-BB2F-5B923C0323C7} 6180Jump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: feclient.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: msctfui.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: srclient.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F11-9C73-11D3-B32E-00C04F990BB4}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: jlK7Q70gbN.exeStatic PE information: certificate valid
Source: jlK7Q70gbN.exeStatic file information: File size 1204392 > 1048576
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: jlK7Q70gbN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: jlK7Q70gbN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\burn.pdb/ source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\core\BootstrapperCore.pdb source: BootstrapperCore.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\mbahost.pdb source: mbahost.dll.2.dr
Source: Binary string: ./Installer/UI/obj/Release/ema3d.UI.Boot.pdb8 source: ema3d.UI.Boot.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: Microsoft.Deployment.WindowsInstaller.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\WixStdBA.pdb source: mbapreq.dll.2.dr
Source: Binary string: ./Installer/UI/obj/Release/ema3d.UI.Boot.pdb source: ema3d.UI.Boot.dll.2.dr
Source: Binary string: C:\agent\_work\79\s\build\ship\x86\burn.pdb source: jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr
Source: jlK7Q70gbN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: jlK7Q70gbN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: jlK7Q70gbN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: jlK7Q70gbN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: jlK7Q70gbN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: jlK7Q70gbN.exeStatic PE information: section name: .wixburn
Source: jlK7Q70gbN.exe.0.drStatic PE information: section name: .wixburn
Source: EMA3D.exe.2.drStatic PE information: section name: .wixburn
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE826 push ecx; ret 0_2_006FE839
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3E826 push ecx; ret 3_2_00A3E839
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbahost.dllJump to dropped file
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\BootstrapperCore.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbapreq.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\ema3d.UI.Boot.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbahost.dllJump to dropped file
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\BootstrapperCore.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbapreq.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeFile created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\ema3d.UI.Boot.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeMemory allocated: 33F0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeMemory allocated: 4770000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeMemory allocated: 6770000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeDropped PE file which has not been started: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeDropped PE file which has not been started: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbahost.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeDropped PE file which has not been started: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbapreq.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeDropped PE file which has not been started: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\ema3d.UI.Boot.dllJump to dropped file
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeDropped PE file which has not been started: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\BootstrapperCore.dllJump to dropped file
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeEvaded block: after key decision
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeAPI coverage: 9.5 %
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe TID: 5448Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe TID: 5448Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007101F0 GetLocalTime followed by cmp: cmp dword ptr [ebp+08h], 05h and CTI: je 0071028Bh0_2_007101F0
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007101F0 GetLocalTime followed by cmp: cmp dword ptr [ebp+08h], 01h and CTI: je 00710284h0_2_007101F0
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A501F0 GetLocalTime followed by cmp: cmp dword ptr [ebp+08h], 05h and CTI: je 00A5028Bh3_2_00A501F0
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A501F0 GetLocalTime followed by cmp: cmp dword ptr [ebp+08h], 01h and CTI: je 00A50284h3_2_00A501F0
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007146C4 FindFirstFileW,FindClose,0_2_007146C4
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00707767 FindFirstFileExW,0_2_00707767
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006E9A30 FindFirstFileW,lstrlenW,FindNextFileW,FindClose,0_2_006E9A30
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D3D4E GetFileAttributesW,GetLastError,GetLastError,SetFileAttributesW,GetLastError,GetTempPathW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,DeleteFileW,GetTempFileNameW,MoveFileExW,MoveFileExW,MoveFileExW,FindNextFileW,GetLastError,GetLastError,GetLastError,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,0_2_006D3D4E
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A546C4 FindFirstFileW,FindClose,3_2_00A546C4
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A47767 FindFirstFileExW,3_2_00A47767
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A29A30 FindFirstFileW,lstrlenW,FindNextFileW,FindClose,3_2_00A29A30
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A13D4E GetFileAttributesW,GetLastError,GetLastError,SetFileAttributesW,GetLastError,GetTempPathW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,DeleteFileW,GetTempFileNameW,MoveFileExW,MoveFileExW,MoveFileExW,FindNextFileW,GetLastError,GetLastError,GetLastError,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,3_2_00A13D4E
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_0071994A VirtualQuery,GetSystemInfo,0_2_0071994A
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE594 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006FE594
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00704413 mov eax, dword ptr fs:[00000030h]0_2_00704413
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00708491 mov eax, dword ptr fs:[00000030h]0_2_00708491
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A48491 mov eax, dword ptr fs:[00000030h]3_2_00A48491
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A44413 mov eax, dword ptr fs:[00000030h]3_2_00A44413
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D39DF GetProcessHeap,RtlAllocateHeap,0_2_006D39DF
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE0C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_006FE0C8
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE594 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006FE594
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE727 SetUnhandledExceptionFilter,0_2_006FE727
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007037AA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007037AA
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3E0C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00A3E0C8
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3E594 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A3E594
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A437AA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A437AA
Source: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exeCode function: 3_2_00A3E727 SetUnhandledExceptionFilter,3_2_00A3E727
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe "C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe" -burn.clean.room="C:\Users\user\Desktop\jlK7Q70gbN.exe" -burn.filehandle.attached=528 -burn.filehandle.self=540 Jump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeProcess created: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe "C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe" -q -burn.elevated BurnPipe.{01823A2F-6092-4017-B70C-7D2B2DE988B6} {636B081A-FA87-43E7-BB2F-5B923C0323C7} 6180Jump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_007119F8 InitializeSecurityDescriptor,GetLastError,CreateWellKnownSid,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,SetEntriesInAclA,SetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorGroup,GetLastError,SetSecurityDescriptorDacl,GetLastError,CoInitializeSecurity,LocalFree,0_2_007119F8
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00713D0B AllocateAndInitializeSid,CheckTokenMembership,0_2_00713D0B
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006FE957 cpuid 0_2_006FE957
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\BootstrapperCore.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\ema3d.UI.Boot.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006E4E67 ConvertStringSecurityDescriptorToSecurityDescriptorW,GetLastError,CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,CloseHandle,LocalFree,0_2_006E4E67
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D605F GetSystemTime,GetDateFormatW,GetLastError,GetLastError,GetDateFormatW,GetLastError,0_2_006D605F
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D6203 GetUserNameW,GetLastError,0_2_006D6203
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_00718A8F GetTimeZoneInformation,SystemTimeToTzSpecificLocalTime,0_2_00718A8F
Source: C:\Users\user\Desktop\jlK7Q70gbN.exeCode function: 0_2_006D51D2 GetModuleHandleW,CoInitializeEx,GetVersionExW,GetLastError,CoUninitialize,0_2_006D51D2
Source: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Command and Scripting Interpreter
1
Windows Service
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping12
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Service Execution
1
DLL Side-Loading
1
Windows Service
1
Disable or Modify Tools
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)12
Process Injection
32
Virtualization/Sandbox Evasion
Security Account Manager32
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Access Token Manipulation
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
Process Injection
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1528470 Sample: jlK7Q70gbN.exe Startdate: 07/10/2024 Architecture: WINDOWS Score: 8 6 jlK7Q70gbN.exe 3 2->6         started        file3 14 C:\Windows\Temp\...\jlK7Q70gbN.exe, PE32 6->14 dropped 9 jlK7Q70gbN.exe 67 6->9         started        process4 file5 16 C:\Windows\Temp\...MA3D.exe, PE32 9->16 dropped 18 C:\Windows\Temp\...\mbapreq.dll, PE32 9->18 dropped 20 C:\Windows\Temp\...\mbahost.dll, PE32 9->20 dropped 22 3 other files (none is malicious) 9->22 dropped 12 EMA3D.exe 9->12         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\BootstrapperCore.dll0%ReversingLabs
C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbahost.dll0%ReversingLabs
C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.ba\mbapreq.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tjlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPSjlK7Q70gbN.exe, 00000000.00000002.3297556859.000000000085B000.00000004.00000010.00020000.00000000.sdmpfalse
    unknown
    http://wixtoolset.org/releases/Microsoft.Deployment.WindowsInstaller.dll.2.drfalse
      unknown
      https://sectigo.com/CPS0jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
      • URL Reputation: safe
      unknown
      http://appsyndication.org/2006/appsynapplicationc:jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.drfalse
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yjlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
        • URL Reputation: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com0jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
        • URL Reputation: safe
        unknown
        http://wixtoolset.orgBootstrapperCore.dll.2.dr, mbahost.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr, mbapreq.dll.2.drfalse
          unknown
          http://wixtoolset.org/schemas/thmutil/2010mbapreq.thm.2.drfalse
            unknown
            https://www.ansys.com.mcas.ms/legal/terms-andjlK7Q70gbN.exe, 00000002.00000003.2079705659.0000000008E31000.00000004.00000020.00020000.00000000.sdmp, ema3d.UI.Boot.dll.2.drfalse
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
              • URL Reputation: safe
              unknown
              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vBootstrapperCore.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.drfalse
                unknown
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
                • URL Reputation: safe
                unknown
                http://ema3d.com$EjlK7Q70gbN.exe, 00000002.00000003.2052420419.000000000131F000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2052117809.000000000131F000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.microsoft.ce6EMA3D.exe, 00000003.00000002.3298190467.0000000000B38000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#jlK7Q70gbN.exe, EMA3D.exe.2.dr, jlK7Q70gbN.exe.0.dr, ema3d.UI.Boot.dll.2.drfalse
                    • URL Reputation: safe
                    unknown
                    http://wixtoolset.org/news/BootstrapperCore.dll.2.dr, Microsoft.Deployment.WindowsInstaller.dll.2.drfalse
                      unknown
                      http://ema3d.comjlK7Q70gbN.exe, 00000000.00000003.2042647450.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2043591191.0000000002E3B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042973845.0000000002E1A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2043286088.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042310528.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000002.3297850430.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044058097.0000000002E4D000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2042377711.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044698951.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2044580204.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2041684832.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000002.3299565162.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000000.00000003.2045538277.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048888766.000000000376B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2046899780.000000000371B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2047556826.000000000373A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2049646636.0000000003790000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2049229983.000000000377D000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048511892.000000000375B000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2048235598.000000000374A000.00000004.00000800.00020000.00000000.sdmp, jlK7Q70gbN.exe, 00000002.00000003.2046950182.000000000372C000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://wixtoolset.org/releases/SCreatingBootstrapperCore.dll.2.drfalse
                          unknown
                          http://www.ansys.com/privacyema3d.UI.Boot.dll.2.drfalse
                            unknown
                            http://appsyndication.org/2006/appsynjlK7Q70gbN.exe, EMA3D.exefalse
                              unknown
                              https://www.ansys.com.mcas.ms/legal/terms-and-conditions/ansys-hybrid-compute-environment-securityema3d.UI.Boot.dll.2.drfalse
                                unknown
                                No contacted IP infos
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1528470
                                Start date and time:2024-10-07 23:29:22 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 38s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:jlK7Q70gbN.exe
                                renamed because original name is a hash value
                                Original Sample Name:39e87c245f3df670592eac79160e0de43421742c0e0ab1cfb1452790f07747c9.exe
                                Detection:CLEAN
                                Classification:clean8.evad.winEXE@5/36@0/0
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 102
                                • Number of non-executed functions: 294
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: jlK7Q70gbN.exe
                                No simulations
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4632
                                Entropy (8bit):5.180810347850249
                                Encrypted:false
                                SSDEEP:48:HFYZRM8NtnN/nNAt+NttNadN4t4N3N6nNMESc+VbCs/R2iwlsAliAlkzykykykyw:GZTNN6/DodU9dW3On
                                MD5:58656A479C02A5087CB9BE077572A888
                                SHA1:739E4950D8E9645858306E5F15B374A71ABE4977
                                SHA-256:1F51C8292D2B3C0CDC98A4F09C42E37544C2B32059AB5720635A85F2722B2519
                                SHA-512:896F5A4F13AEEC3589E24A3F46A53F59A452CF8A6CB4D361626F05A2ACB0F94722038CCED48D9A305EE38E32C213E2D48D5ECBEAC97A6FF8F846056D0877B9E9
                                Malicious:false
                                Reputation:low
                                Preview:[1824:10E4][2024-10-07T17:30:12]i001: Burn v3.14.0.3910, Windows v10.0 (Build 19045: Service Pack 0), path: C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe..[1824:10E4][2024-10-07T17:30:12]i000: Initializing numeric variable 'InstallMpi' to value '0'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing numeric variable 'InstallDISCO' to value '0'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing string variable 'InstallFolder' to value '[ProgramFiles64Folder]EMA'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing string variable 'DiscoFolder' to value '[ProgramFiles64Folder]Ansys Inc'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing string variable 'STKDirectory' to value '[ProgramFiles64Folder]'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing string variable 'License' to value '[ProgramFiles64Folder]EMA\Shared\License\'..[1824:10E4][2024-10-07T17:30:12]i000: Initializing numeric variable 'CreateShortcut' to value '1'..[1824:10E4][2024-10-07T17:30:12]
                                Process:C:\Users\user\Desktop\jlK7Q70gbN.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1048328
                                Entropy (8bit):7.595028138776364
                                Encrypted:false
                                SSDEEP:24576:5VnVr6ecc38BetTec6cXC6v8WlYKeuIsPUSy+4NY0yk7b7z:p67KTec/yclYK1rf4NxRX
                                MD5:F51103F1E13618AE83B88837789FE62C
                                SHA1:D5F2AF880AEB85B3B8933F8969D2A886A4B32574
                                SHA-256:893CDA166AF5049C8C8A9C116BE2D75FA6122B6E90A13B8DF8F84FC355CE9A8D
                                SHA-512:2B8B3FB4EF655BB9E7256716022E032BB8EA495198F8C125E4CFA2E1CEBD4398D2826FF6ACA57A032F2C8627E6D70C11E47746696F6F5ABD8FE12357E4EB0B7B
                                Malicious:false
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B...#..#..#...E..#...E...#...K..#...K..#...K..#...E..#...E..#...E..#..#..."...J...#...JQ.#..#9.#...J..#..Rich.#..........PE..L...A.g^.....................T....................@..........................@.......h....@.................................t.......................(....&.......=...z..T....................{.......z..@...........................................text............................... ..`.rdata..............................@..@.data...............................@....wixburn8...........................@..@.rsrc...............................@..@.reloc...=.......>..................@..B........................................................................................................................................................................................................................................................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2025
                                Entropy (8bit):6.231406644010833
                                Encrypted:false
                                SSDEEP:48:cxX7DTAT8tMBCus9T3FVWmHdniarRFeOrw8Nhv2VyfN3mKNWFP44SBWWW1GyfiPq:8L4T2RJhfHP8+VYuTmQUc2mE
                                MD5:1D4B831F77EFEC96FFBC70BC4B59B8B5
                                SHA1:1B3ED82655AEC8A52DAEC60F8674BC7E07F8CFEB
                                SHA-256:1B93556F07C35AC0564D57E0743CCBA231950962C6506C8D4A74A31CD66FD04C
                                SHA-512:C6CCB188281F161DEBF02DCDDE24B77D8D14943DEED8852E77E5AFB18F3F62683AB1AE06DCEB1E09D53804A76DF6400A360712D8E7E228B7F971054BB4FB2496
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="zh-tw" Language="1028" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] ....</String>.. <String Id="Title">[WixBundleName] ...... Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">.......?</String>.. <String Id="HelpHeader">......</String>.. <String Id="HelpText">/passive | /quiet - ...... UI ............ UI ... ........... UI ........../norestart - ................UI ............./log log.txt - ............ %TEMP% ......</String>.. <Stri
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2458
                                Entropy (8bit):5.36165936198009
                                Encrypted:false
                                SSDEEP:48:cxX7DTZT8u9cktosM6re4mSTcIIyfI7sh/DMNwIHWAoN3mepNRfKPnWZ0hqAQZfC:8LxTK23f33AwIViRrRynRuZfiMS
                                MD5:CC8C6D04DC707B38E0F0C08BA16FE49B
                                SHA1:95EA7F570677AEA52393D02FDB21CEBB218A7343
                                SHA-256:DC445E2457ED31ABF536871F90FF7CC96800A40B6BC033F37D45E3156A3B4FA9
                                SHA-512:A4B19EBC8BB0D88ABA7D3D5783E28F8B6E0960582A540059BC71076B1203BF43BCA15EA726272D15395C7B4E431046ADA1CBB9D55072BBC5DBE7729C4599F0E0
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="cs-cz" Language="1029" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Instalace produktu [WixBundleName]</String>.. <String Id="Title">Pro instalaci produktu [WixBundleName] je vy.adov.no rozhran. Microsoft .NET Framework.</String>.. <String Id="ConfirmCancelMessage">Opravdu chcete akci zru.it?</String>.. <String Id="HelpHeader">N.pov.da k instalaci</String>.. <String Id="HelpText">/passive | /quiet - Zobraz. minim.ln. u.ivatelsk. rozhran. bez jak.chkoli.. v.zev, nebo nezobraz. ..dn. u.ivatelsk. rozhran. ani ..dn. v.zvy. Ve v.choz.m.. nastaven. se jak u.ivatelsk. rozhran., tak i v.echny v.zvy zobrazuj....../norestart - Potla.. jak.koli p
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2286
                                Entropy (8bit):5.061915970731254
                                Encrypted:false
                                SSDEEP:48:cxX7DCrT81tbzjamsjFq7LhzqGgdRDJNbqoN3mpN+ELPnfyOwYxPyzraXnAF:8LaTOkaEOiGd/BwF
                                MD5:7C6E4CE87870B3B5E71D3EF4555500F8
                                SHA1:E831E8978A48BEAFA04AAD52A564B7EADED4311D
                                SHA-256:CAC263E0E90A4087446A290055257B1C39F17E11F065598CB2286DF4332C7696
                                SHA-512:2A02415A3E5F073F4530FD87C97B685D95B8C0E1B15EFD185CC5CB046FCF1D0DCE28DB9889AD52588B96FE01841A7A61F6B7D6D2F669EAB10A8926C46B8E93D1
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="da-dk" Language="1030" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Installation af [WixBundleName]</String>.. <String Id="Title">Microsoft .NET Framework skal v.re installeret i forbindelse med Installationen af [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Er du sikker p., at du vil annullere?</String>.. <String Id="HelpHeader">Hj.lp til installation</String>.. <String Id="HelpText">/passive | /quiet - viser en minimal brugergr.nseflade uden prompter eller.. viser ingen brugergr.nseflade og ingen prompter... Brugergr.nsefladen og alle prompter vises som standard...../norestart - skjuler fors.g p. genstart. Der vises som standard en.. foresp.rgse
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2442
                                Entropy (8bit):5.094465051245675
                                Encrypted:false
                                SSDEEP:48:cxX7DASTcCwit/soJy9hkVByUZN+29N3mfN65PS9CvZwZi7uuASD:8LxT8itGeVB97+gyC9BdaSD
                                MD5:C8E7E0B4E63B3076047B7F49C76D56E1
                                SHA1:4E44E656A0D552B2FFD65911CB45245364E5DBF3
                                SHA-256:631D46CB048FB6CF0B9A1362F8E5A1854C46E9525A0260C7841A04B2316C8295
                                SHA-512:FD7E8896F9414F0DB7A88F926F55EE24E0591DA676F330200BC6BB829EB32648D90D3094E0011BFE36C7BA8BE41DFD74B12D444AFEA0D2866801258DA4FA16E8
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="de-de" Language="1031" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <UI Control="InstallButton" Width="180" />.. .. <String Id="Caption">[WixBundleName]-Setup</String>.. <String Id="Title">F.r das [WixBundleName]-Setup ist Microsoft .NET Framework erforderlich.</String>.. <String Id="ConfirmCancelMessage">Sind Sie sicher, dass Sie den Vorgang abbrechen m.chten?</String>.. <String Id="HelpHeader">Setup-Hilfe</String>.. <String Id="HelpText">/passive | /quiet - zeigt eine minimale Benutzeroberfl.che ohne.. Eingabeaufforderungen oder keine Benutzeroberfl.che und keine.. Eingabeaufforderungen an. Standardm..ig werden die Benutzeroberfl.che und.. alle Eingabeaufforderungen angezeigt...../no
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):3400
                                Entropy (8bit):5.279888750092028
                                Encrypted:false
                                SSDEEP:48:cxX7D8jVT8dUk9Ug/usOo2pNSBIbESvR2drdESPzghC76DeN2hL0eLoN3mOLSNIx:8L45TCyop5riGzH7xgJit8IqSsBwqk
                                MD5:074D5921AF07E6126049CB45814246ED
                                SHA1:91D4BDDA8D2B703879CFE2C28550E0A46074FA57
                                SHA-256:B8E90E20EDF110AAAAEA54FBC8533872831777BE5589E380CFDD17E1F93147B5
                                SHA-512:28DAC36516BCC76BCC598C6E7ABDE359695F85AB7A830D6ADBC844EB240D9FA372CB5A5CE4DBE21E250408C6B246D371D3CDD656D2178FB0EC22DAC7D39CBD9F
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="el-gr" Language="1032" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">........... ... [WixBundleName]</String>.. <String Id="Title">... ... ........... ... [WixBundleName] .......... .. Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">..... ....... ... ...... .. ..... .......;</String>.. <String Id="HelpHeader">....... ... ... ...........</String>.. <String Id="HelpText">/passive | /quiet - ......... ........ ........... ... ............. .......... ...... ..... ........ . ... ..
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2235
                                Entropy (8bit):5.142592159444541
                                Encrypted:false
                                SSDEEP:48:cxX7DE+T8Z+bm5snwETMAoQEATN27uNBDReq4N3mJeNHNP64NsFKJJem4vyAs:8LZTDkZ7+2IBCht6J8neHs
                                MD5:E338408F1101499EB22507A3451F7B06
                                SHA1:83B42F9D7307265A108FC339D0460D36B66A8B94
                                SHA-256:B7D9528F29761C82C3D926EFE5E0D5036A0E0D83EB4CCA7282846C86A9D6F9F3
                                SHA-512:F7BE923DC2856E0941D0669E2DE5A5C307C98DC7EBA0A1B68728EB29C95B4625145C2AD3AC6F6B6D82F062887EA349E2187F1F91785DDE5A5083BC1150E56326
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="fi-fi" Language="1035" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] -asennus</String>.. <String Id="Title">Microsoft .NET Framework tarvitaan [WixBundleName] -asennusta varten</String>.. <String Id="ConfirmCancelMessage">Haluatko varmasti peruuttaa?</String>.. <String Id="HelpHeader">Asennusohjelman ohje</String>.. <String Id="HelpText">/passive | /quiet - n.ytt.. mahdollisimman v.h.n k.ytt.liittym.st.; ei.. kehotteita tai ei k.ytt.liittym.. ja kehotteita. Oletusarvoisesti.. k.ytt.liittym. ja kaikki kehotteet n.ytet..n...../norestart - est.. uudelleenk.ynnistysyritykset. Oletusarvoisesti.. k.ytt.liittym. kysyy ennen uudelleenk.yn
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2306
                                Entropy (8bit):5.076293283609686
                                Encrypted:false
                                SSDEEP:48:cxX7DyBT81BbKBswAL1xV1wjRcDSNwDXoN3mSZfNhkLPkQpznsdMEodAY:8LwTK5KHsijmEXY
                                MD5:AA32A059AADD42431F7837CB1BE7257F
                                SHA1:4CD21661E341080FB8C2DEFD9F32F134561FC3BA
                                SHA-256:88E7DDACD6B714D94D5322876BD50051479B7A0C686DC2E9EB06B3B7A0BC06C9
                                SHA-512:78E201F369E65535E25722DFC0EFE99EDF641F7C14EFF1526DC1CC047FF11640079F1E3D25C9072CF25F4804195891BE006FC5ED313063AFCB91FB5700120B88
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="fr-fr" Language="1036" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Installation de [WixBundleName]</String>.. <String Id="Title">Microsoft .NET Framework requis pour l'installation de [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">.tes-vous s.r de vouloir annuler.?</String>.. <String Id="HelpHeader">Aide de l'installation</String>.. <String Id="HelpText">/passive | /quiet - affiche une interface minimale sans invites ou n'affiche.. aucune interface ni aucune invite. Par d.faut, l'interface et toutes les.. invites sont affich.es...../norestart - annule toute tentative de red.marrage. Par d.faut, l'interface.. affiche une invite avant de red.marrer..
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2392
                                Entropy (8bit):5.293225307744296
                                Encrypted:false
                                SSDEEP:48:cxX7DwzT8cSwvs48mF7GD/g1v0wH7N3wwJxL99oN3m/ZNRUYPBZRT1XESW3o/ULG:8LQT2wpFGbgT3wMN2QRj/y/LKr
                                MD5:17FB605A2F02DA203DF06F714D1CC6DE
                                SHA1:3A71D13D4CCA06116B111625C90DD1C451EA9228
                                SHA-256:55CF62D54EFB79801A9D94B24B3C9BA221C2465417A068950D40A67C52BA66EF
                                SHA-512:D05008D37143A1CC031F4B6268490A5A10FBB686C86984D20DB94843BDC4624EF9651D158DCB5B660FC239C3C3E8D087EB5D23FFFB8C4681910CBC376148F0F0
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="hu-hu" Language="1038" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] telep.t.</String>.. <String Id="Title">A(z) [WixBundleName] telep.t.s.hez Microsoft .NET-keretrendszer sz.ks.ges</String>.. <String Id="ConfirmCancelMessage">Biztosan megszak.tja?</String>.. <String Id="HelpHeader">A telep.t. s.g.ja</String>.. <String Id="HelpText">/passive | /quiet - Minim.lis felhaszn.l.i fel.let megjelen.t.se k.rd.sek.. n.lk.l, illetve felhaszn.l.i fel.let .s k.rd.sek megjelen.t.se n.lk.li.. telep.t.s. Alapesetben a felhaszn.l.i fel.let .s minden k.rd.s megjelenik...../norestart - Az .jraind.t.si k.r.sek elrejt.se. Alapeset
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2304
                                Entropy (8bit):4.985260685429469
                                Encrypted:false
                                SSDEEP:48:cxX7DQyT81ebRcesyB+lY25ukVpkXJM2DJNXhpXZoN3mMhNTM+POYO/n1YxXlcI5:8LFTzLtkfwWKXHZi37MIDp
                                MD5:50261379B89457B1980FF19CFABE6A08
                                SHA1:F80B1F416539D33206CE3C24BA3B14B799A84813
                                SHA-256:A40C94EB33F8841C79E9F6958433AFFD517F97B4570F731666AF572E63178BB7
                                SHA-512:BBD9794181EEC95D6BE7A1B7BA83FD61AF2B2DF61D9DA8DDA2788B61BEC53C30FCEFE5222EDF134166532B36D3AB6CE8996F2D670DC6907C1864AF881A21EA40
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="it-it" Language="1040" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Installazione di [WixBundleName]</String>.. <String Id="Title">Microsoft .NET Framework necessario per l'installazione di [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Annullare?</String>.. <String Id="HelpHeader">Guida dell'installazione</String>.. <String Id="HelpText">/passive | /quiet - visualizza l'interfaccia utente minima senza istruzioni.. oppure non visualizza n. l'interfaccia utente n. le istruzioni. Per.. impostazione predefinita vengono visualizzate interfaccia utente e.. istruzioni...../norestart - elimina eventuali tentativi di riavvio. Per impostazione.. predefinita l'int
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2545
                                Entropy (8bit):5.923292576429967
                                Encrypted:false
                                SSDEEP:48:cxX7DpcYT86WyscLpTIFw6tnOUjsj/D3NIgHcQN3mKN/WPOhT0SXsDay+z8QZEcE:8L1TccOFw6tnOUjsjpICnlOO934apWz
                                MD5:DB0F5BAB42403FD67C0A18E35E6880EC
                                SHA1:C0A18C8C5BCD7B88C384B5304B56EEB85A0DA3DC
                                SHA-256:CCDCDB111EFA152C5F9FF4930033698B843390A549699AE802098D87431F16FE
                                SHA-512:589522BD4A26BF54CCF3564E392E41BBBA4E7B3FD1ED74E7F4F6AD6F2E65CDE11FFF32D0C5F3BCD09052FE5110FDC361D1926E220FD0BAD2D38CAC21BBE93211
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="ja-jp" Language="1041" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] ......</String>.. <String Id="Title">[WixBundleName] ........ Microsoft .NET Framework .....</String>.. <String Id="ConfirmCancelMessage">.......?</String>.. <String Id="HelpHeader">..........</String>.. <String Id="HelpText">/passive | /quiet - ... UI ....................UI.. .............. .....UI ....................../norestart - ........................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2236
                                Entropy (8bit):5.97627825234954
                                Encrypted:false
                                SSDEEP:48:cxX7D3sT8ZeusKOwOWGyKCstFmhENI2Y+kN3mp4iNmi6IPa0dDaoIunvZqIHU5UH:8LQTXvRFhIzl44wmgko04U5TY
                                MD5:442F8463EF5CA42B99B2EFACA696BD01
                                SHA1:67496DB91CBAA85AC0727B12FC2D35E990537DAC
                                SHA-256:D22F6ADA97DBFFC1E7548E52163807F982B30B11A2A5109E71F42985102CCCBD
                                SHA-512:A350EAF9E7AEAFAB1163D7C0B8D014AFE07EE98BAE3915CBDD3C26282E345A0838E853C89BAE8943474758DCBCFD0BB0724A0C75CBF969F321FAB4944E8704FD
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="ko-kr" Language="1042" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] ..</String>.. <String Id="Title">[WixBundleName] ... ... Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">........?</String>.. <String Id="HelpHeader">.. ...</String>.. <String Id="HelpText">/passive | /quiet - ... .. .. UI. ..... UI. .... .... .... ..... ..... UI . .. .... ........../norestart - .. ..... ... ...... ..... UI. .. .... .. .... ......../log log.txt - .
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2312
                                Entropy (8bit):4.965432037520827
                                Encrypted:false
                                SSDEEP:48:cxX7DK1T8u7hbU7Asd7MqpSwzCcHGFN9OsNN3mvoNBC7hPFtO7+xw7t0Yza2Al:8LcTtpGLFSwJHmPnnKhEBtsl
                                MD5:67F28BCDB3BA6774CD66AA198B06FF38
                                SHA1:85D843B7248A5E1173FF9BD59CB73BB505F69B66
                                SHA-256:226B778604236931B4AE45F6F272586C884A11517444A34BF45CD5CAE49BE62E
                                SHA-512:7BC7D3E6E19ECF865B2CABFC46C75D516561D5A8A81A8ED55B4EDBA41A13A7110F474473740200AFB035B9597A2511D08C2A2E7A9ADE2C2AB4D3F168944B8328
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="nl-nl" Language="1043" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Installatie</String>.. <String Id="Title">Microsoft .NET Framework is vereist voor installatie [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Weet u zeker dat u de installatie wilt annuleren?</String>.. <String Id="HelpHeader">Help bij Setup</String>.. <String Id="HelpText">/passive | /quiet - geeft een minimale gebruikersinterface weer zonder prompts.. of geeft geen gebruikersinterface en geen prompts weer. Gebruikersinterface.. en alle prompts worden standaard weergegeven...../norestart - pogingen tot opnieuw opstarten onderdrukken... Gebruikersinterface vraagt standaard al
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2171
                                Entropy (8bit):5.089922193759582
                                Encrypted:false
                                SSDEEP:48:cxX7DTeT8uUbnFdsLnFHv+Gpm1qL5DQNDDaoN3mpZfN15dPnfuOOg5wZ5uAq8fAS:8L+Tec1x8Siule4S
                                MD5:5454F724C9CDAB8172678A1CC7057220
                                SHA1:241A57018ACE1210881583A9CF646E7D2E51412F
                                SHA-256:41545AC1247B61C3C3E2A7E4659D9FAD2BCCA8347C69F2EB7B9D0CF5FC31E113
                                SHA-512:40E311EADA299996E32A7D35223CA678A03C869D63C023D59BC97A7B2049B0252AA9D0A7EC8558D5ACB73BD14C7BFA913097E65ABEE7455658DB7E35BBDA8AE1
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="nb-no" Language="1044" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Installasjonsprogram</String>.. <String Id="Title">Microsoft .NET Framework kreves for [WixBundleName]-installasjon</String>.. <String Id="ConfirmCancelMessage">Er du sikker p. at du vil avbryte?</String>.. <String Id="HelpHeader">Installasjonshjelp</String>.. <String Id="HelpText">/passive | /quiet - viser minimalt brukergrensesnitt uten ledetekster, eller.. ikke noe brukergrensesnitt og ingen ledetekster. Som standard vises.. brukergrensesnitt og alle ledetekster...../norestart - undertrykker alle fors.k p. omstart. Som standard sp.r.. brukergrensesnittet f.r omstart.../log log.txt
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2368
                                Entropy (8bit):5.270514043715206
                                Encrypted:false
                                SSDEEP:48:cxX7Du4OT82gXusarwkfpYrKD8DTNkbNuoN3mjbsNniIPh8ynN1NYd4iYuffAL:8LKTsXgpYr2IyoiiOffpT3L
                                MD5:96ACAAA5AEF7798E9048BAFF4C3FA8D3
                                SHA1:E76629973F6C1CFC06F60BA64FE9F237B2DB9698
                                SHA-256:F4AA983E39FB29C95E3306082F034B3A43E1D26489C997B8E6697B6A3B2F9F3C
                                SHA-512:964F73E572BDCB1AD946C770E6A2FB4A1CE54AF4B5BB072F64256083BA27A223F4DAD4A95B9D2A646180806D1F977726147970B06AAC35EED75AEC6CA89ED337
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="pl-pl" Language="1045" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Instalator programu [WixBundleName]</String>.. <String Id="Title">Do zainstalowania programu [WixBundleName] jest wymagany program Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">Czy na pewno chcesz anulowa.?</String>.. <String Id="HelpHeader">Pomoc instalatora</String>.. <String Id="HelpText">/passive | /quiet - wy.wietla minimalny interfejs u.ytkownika bez monit.w.. lub nie wy.wietla interfejsu u.ytkownika ani monit.w. Domy.lnie jest.. wy.wietlany interfejs u.ytkownika i wszystkie monity...../norestart - pomija wszelkie pr.by ponownego uruchomienia. Domy.lnie.. interf
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2147
                                Entropy (8bit):5.130635342194656
                                Encrypted:false
                                SSDEEP:48:cxX7DuoT85b0s/4TDoYDj4NF5j2hN3mMNYskPDXKIMaKcP9A5g:8L1TmBHjs59M8r6
                                MD5:BD39ADB6B872163FD2D570028E9F3213
                                SHA1:688B8A109688D3EA483548F29DE2E57A8A56C868
                                SHA-256:ECB5C22E6C2423CAF07AEBE69F4FAF22450164EEE9587B64EF45A2D7F658CA15
                                SHA-512:F2826BE203E767D09FF0D7677E1CF5B13113B773D529166DAE02A1F5DB2DC58E0856A34901DF70011EBABB6E964FAB7ACF38590E650BD629D4E4DC4CB36C8D45
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="pt-br" Language="1046" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Instala..o</String>.. <String Id="Title">Microsoft .NET Framework . necess.rio para instala..o do [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Tem certeza de que deseja cancelar?</String>.. <String Id="HelpHeader">Ajuda da Instala..o</String>.. <String Id="HelpText">/passive | /quiet - exibe UI m.nima sem avisos ou exibe sem UI e.. sem avisos. Por padr.o a UI e todos avisos s.o exibidos...../norestart - suprime qualquer tentativa de reinicializa..o. Por padr.o a UI.. ir. solicitar antes de reiniciar.../log log.txt - logs para um arquivo espec.fico. Por padr.
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2880
                                Entropy (8bit):5.408094213063887
                                Encrypted:false
                                SSDEEP:48:cxX7DkTT8fjtEeusogrohY2Ar7DHNnjTh53oN3miRMNKrdPin+/uYcbSkuEIcOvG:8LYT8EeHMMJRNi1Ruwi3OwL
                                MD5:DAF167AF4031EF47E562056A7D51AA73
                                SHA1:0156B230CADD6169AC2820865E3C031ED79785EF
                                SHA-256:C91C9E87AB4A6DB078F1991F4A2CDC726B58A40E47BCE49D39168A8F8F151C3B
                                SHA-512:5E87EE3838E3595ADBD7EABA6E3E33CDFEA5E15ED716FBCCDBD55235B3E53E1E41EA5A907F425E96C35167543C7F75AC5214B5AEE177D299FC2464A68B22851E
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="ru-ru" Language="1049" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">......... [WixBundleName]</String>.. <String Id="Title">... ......... [WixBundleName] ......... Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">.. ............. ...... ........ ........?</String>.. <String Id="HelpHeader">....... .. .........</String>.. <String Id="HelpText">/passive | /quiet - ........... ............ .. ... ........ ... ...... ... .. .. . ............ .. ......... ............ .. . ... ......
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2334
                                Entropy (8bit):5.397882326481071
                                Encrypted:false
                                SSDEEP:48:cxX7D+cT8muPusz2qs1u+Vh1TqDINHZJoN3m8fN0vPp3OAwa2ywSODAm:8L1TuPdKNzfifFmcatm
                                MD5:016C278E515F87F589AD22C856B201F7
                                SHA1:F20C7DB38B3161B143DEC4E578CE71D7F585F436
                                SHA-256:4A7FDF4A9033FE05C31F565ED3AE5B8C67D324B7AEADB737CE95DBB416D46868
                                SHA-512:310C85B27E1ECF4C6729E88051037150CFBA0234A0138666C26662B3D665FF38B74E95ABCADDEEF6CBEBB23E3357FAC487E6EE5EB8FE158C269D77672191B042
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="sk-sk" Language="1051" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] . in.tal.cia</String>.. <String Id="Title">Na in.tal.ciu aplik.cie [WixBundleName] sa vy.aduje s..as. Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">Naozaj chcete zru.i. oper.ciu?</String>.. <String Id="HelpHeader">Pomocn.k pre in.tal.ciu</String>.. <String Id="HelpText">/passive | /quiet . zobraz. minim.lne pou..vate.sk. rozhranie bez v.ziev alebo.. nezobraz. .iadne pou..vate.sk. rozhranie ani v.zvy. Predvolene sa.. zobrazuje pou..vate.sk. rozhranie aj v.etky v.zvy...../norestart . zru.. v.etky pokusy o re.tart. Pou..vate
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2132
                                Entropy (8bit):5.1255014007111495
                                Encrypted:false
                                SSDEEP:48:cxX7DviT8NFLbu9sM2vECjf26axBZYXcqADCNKTbkoN3maT6NWOjEXPauOOKYnhf:8LmTAcRnQXFPK0iHMsfb2Ws3M
                                MD5:D95E81164C57B6FD75E7C3022454192E
                                SHA1:5D5ACBC56E7078AF4D04C45B78C0FF090C02EE6A
                                SHA-256:6DD61CC6B87B53EAF28430068A2A459730FD4B2BCF876CCDF040212D04C4FE7D
                                SHA-512:9E4BA81A145574818DD6A1F1D0EC38EA1629C7771919C35923F440E31EA9912E1630D94FCDB82B71104EBD61D0321DCDF935BA20D69988EE6E9B22259186AF0C
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="sv-se" Language="1053" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName]-installation</String>.. <String Id="Title">Microsoft .NET Framework kr.vs f.r installation av [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Vill du avbryta?</String>.. <String Id="HelpHeader">Installationshj.lp</String>.. <String Id="HelpText">/passive | /quiet - visar ett minimalt anv.ndargr.nssnitt utan prompter,.. alternativt inget anv.ndargr.nssnitt och inga prompter. Som standard visas.. anv.ndargr.nssnitt och samtliga prompter...../norestart - hejdar omstart. Som standard visar anv.ndargr.nssnittet en.. prompt f.re omstart.../log log.txt - skapar logg till
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2303
                                Entropy (8bit):5.2754753523795275
                                Encrypted:false
                                SSDEEP:48:cxX7DNcYT8anOSMsHEqGpcBztpvrJlrs2ZmNI2+Yo6irN3m22NFcPc+4Trzrdgc7:8LZHTE7APaTI9sq6yEbgg
                                MD5:01B200E06BA600A4EF00C00F7AAC5CE4
                                SHA1:22234426C42637E069A46217019551E4434A4AB6
                                SHA-256:06BFB6DFBC38105C699DEA226A029DF3EF673C33E4B8928DC4EC7FB8F761487D
                                SHA-512:8BDCF7533A6BCFA231B42A7EF845A70C7535FBF607D62FF6404928D5941BA6AFBF139450A1A1B58C65FACF88DC0785AEC4ABEFBCC803466A58B1930F7C468CDD
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="tr-tr" Language="1055" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Kurulumu</String>.. <String Id="Title">[WixBundleName] kurulumu i.in Microsoft .NET Framework gerekir</String>.. <String Id="ConfirmCancelMessage">.ptal etmek istedi.inizden emin misiniz?</String>.. <String Id="HelpHeader">Kurulum Yard.m.</String>.. <String Id="HelpText">/passive | /quiet - komut istemi olmayan olabildi.ince k...k bir UI.. g.r.nt.ler veya komut istemi ve UI g.r.nt.lemez. Varsay.lan olarak UI.. ve t.m komut istemleri g.r.nt.lenir...../norestart - yeniden ba.latma denemelerini engeller. Varsay.lan.. olarak UI yeniden ba.latmadan .nce komut isteyecekt
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2200
                                Entropy (8bit):5.1485120966265
                                Encrypted:false
                                SSDEEP:48:cxX7DZ0T8obZsw9g5gS56K97D7NCt2VoN3mQXNJPOhP58vqc1qwueo3RAL:8LyTLlS9h9hCtsihdxOh+NL
                                MD5:5836F0C655BDD97093F68AAF69AB2BAB
                                SHA1:B6842E816F9E0DCC559A5692E4D26101D10B4B16
                                SHA-256:C015247D022BDC108B4FFCAE89CB55D1E313034D7E6EED18744C1BB55F108F8C
                                SHA-512:640A79D6A756E591AD02DDCCC53BC43F855C5148B8CBB5CE6C1CAF5419CA02F7B2AFF89CCA4C056356814D3899EF79BF038B4E8B4B79EB85138A3CEDCCE93E5B
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="sl-si" Language="1060" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Namestitev</String>.. <String Id="Title">Microsoft .NET Framework, potreben za namestitev paketa [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Ali ste prepri.ani, da .elite preklicati?</String>.. <String Id="HelpHeader">Pomo. za namestitev</String>.. <String Id="HelpText">/passive | /quiet - prika.e minimalni uporabni.ki vmesnik brez pozivov ali ne prika.e.. uporabni.kega vmesnika in pozivov. Privzeto so prikazani uporabni.ki vmesnik in.. vsi pozivi...../norestart - skrije vse mo.nosti za vnovicni zagon. Privzeto uporabni.ki vmesnik.. prika.e poziv pred ponovnim zag
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1980
                                Entropy (8bit):6.189594519053644
                                Encrypted:false
                                SSDEEP:48:cxX7DjQT8tOBousi+zq+frUR2ropNV2rfN3msNUqPPT9T+DwZ9f5wDTAV:8L4TGUGw3V8N3RykV
                                MD5:A34DCF7771198C779648B89156483E83
                                SHA1:A6E0FA91CD50048511C7BEF1BE3A8D32B42B6D1F
                                SHA-256:89C559C6765F8D643469E3C8F4AA93023F09369B0395EA647FAD5AF3C2893EB6
                                SHA-512:0F1D7BC4FD64E18EEEC488CDCE01FB6BFA5CD3BFF614A8D03E388D39F569B8341E74302946877EB25BA1EB17AEC137499189605E251FAFB6B20051744CB463B1
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="zh-ch" Language="2052" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] ..</String>.. <String Id="Title">[WixBundleName] .... Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">.......?</String>.. <String Id="HelpHeader">......</String>.. <String Id="HelpText">/passive | /quiet - ..... UI .......... UI ... ........... UI ........../norestart - .............. UI ........../log log.txt - .............. %TEMP% ........</String>.. <String Id="HelpCloseButton"
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2211
                                Entropy (8bit):5.1155097909395035
                                Encrypted:false
                                SSDEEP:48:cxX7DbT8QGls54nK3znI5zKDj4NLkdoN3mMNYsEPbpK2Aegeu9A5g:8LXTUasJnYdi59som6
                                MD5:8A278E519EF81B2847490EFB070219BC
                                SHA1:7365EDF6E4F9E66B6CEE47933B6C70FF0B9ECFF8
                                SHA-256:E2BFDB2CF3BEAE2E988827C52C58006D7EEAD4ABA5312B5EAE1F6CCF3863C385
                                SHA-512:88275C1136FFB15AB04D315E8601BE2DE77387F3E00F17E9807E415A9DFC4A73E2CD3B5710E4CA58006F91E18180D7CFAEEF4E8319C624E1B81397F9CB9ECA92
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="pt-pt" Language="2070" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Configura..o do [WixBundleName]</String>.. <String Id="Title">O Microsoft .NET Framework . necess.rio para a configura..o do [WixBundleName]</String>.. <String Id="ConfirmCancelMessage">Tem a certeza de que pretende cancelar?</String>.. <String Id="HelpHeader">Ajuda da Configura..o</String>.. <String Id="HelpText">/passive | /quiet - apresenta IU m.nima sem mensagens ou n.o apresenta IU nem.. mensagens. Por predefini..o, s.o apresentadas a IU e todas as mensagens...../norestart - suprimir qualquer tentativa de rein.cio. Por predefini..o, a IU.. avisar. antes de reiniciar.../log log.txt - r
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2400
                                Entropy (8bit):4.992567587099768
                                Encrypted:false
                                SSDEEP:48:cxX7DLT8/OusS2V8j4Lq+7dKzCLdqaaD6NJaXFoN3mRNLo3PWKWnRcsB9A8:8LfTz+8EPqKqTJiFikUgk8
                                MD5:1024AA88AE01BC7BA797193CC6023375
                                SHA1:9252A309C1CB32573F4D58A595A78660FDF54B2F
                                SHA-256:B884C4ABB8867553C1FFADD6721C2135EC5F9F1455C3F668D711CCEA65363D1A
                                SHA-512:77E6DD332104C0461B7C5A08469161AF3F1DC51D3B55585D39DD9FC9E2088DA036BDF2278CFB96CA702FD26CE073C6C6F66611313270700B9E7A76600C1C8E38
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="es-es" Language="3082" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">Instalaci.n de [WixBundleName]</String>.. <String Id="Title">La instalaci.n de [WixBundleName] requiere Microsoft .NET Framework</String>.. <String Id="ConfirmCancelMessage">.Est. seguro de que desea cancelar?</String>.. <String Id="HelpHeader">Ayuda del programa de instalaci.n</String>.. <String Id="HelpText">/passive | /quiet - muestra una interfaz de usuario m.nima y no realiza.. preguntas, o bien no muestra interfaz de usuario y no realiza preguntas... De manera predeterminada se muestra la interfaz de usuario completa y se.. realizan todas las preguntas necesarias...../norestart - suprime cu
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (506), with CRLF line terminators
                                Category:dropped
                                Size (bytes):308790
                                Entropy (8bit):3.736233023525819
                                Encrypted:false
                                SSDEEP:1536:XXshb2C9gjPPi5bA61e3eQEGK/G9fcLjIqrJ3vEFy3Y6rMir7le:Xqz9GHQb1wY/GaLFrJ3cFy3Zr7le
                                MD5:E2791919CC8A75143683C44C7798ECAD
                                SHA1:3D1ADC54618DC2349350A18BA363F29C24C146C9
                                SHA-256:466BC232084A5EB301D0256E7BF6AAE9BF222B8CDE54E5B7FB75E443C31C442F
                                SHA-512:9B1FA1DCD15F78F89C95B0AFD42DE6FEE342767555E584A3F239221B9A067707B7B9DCE7A990D400860AF418B3C512DF8988EF03B29CCA1F54A9DFC1A5DB211D
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".u.t.f.-.1.6.".?.>.....<.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a. .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.x./.2.0.1.0./.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a.".>..... . .<.W.i.x.B.u.n.d.l.e.P.r.o.p.e.r.t.i.e.s. .D.i.s.p.l.a.y.N.a.m.e.=.".E.M.A.3.D. .2.0.2.4.R.2.". .L.o.g.P.a.t.h.V.a.r.i.a.b.l.e.=.".W.i.x.B.u.n.d.l.e.L.o.g.". .C.o.m.p.r.e.s.s.e.d.=.".n.o.". .I.d.=.".{.f.7.0.7.6.d.3.a.-.b.9.d.e.-.4.1.0.c.-.a.6.a.0.-.0.8.9.3.d.b.e.7.8.5.d.3.}.". .U.p.g.r.a.d.e.C.o.d.e.=.".{.D.B.D.B.1.0.B.C.-.6.4.F.F.-.4.1.2.7.-.B.E.F.4.-.1.9.1.7.4.E.B.D.4.6.D.4.}.". .P.e.r.M.a.c.h.i.n.e.=.".y.e.s.". ./.>..... . .<.W.i.x.M.b.a.P.r.e.r.e.q.I.n.f.o.r.m.a.t.i.o.n. .P.a.c.k.a.g.e.I.d.=.".N.e.t.f.x.4.F.u.l.l.". .L.i.c.e.n.s.e.U.r.l.=.".N.e.t.f.x.L.i.c.e.n.s.e...r.t.f.". ./.>..... . .<.W.i.x.P.a.c.k.a.g.e.P.r.o.p.e.r.t.i.e.s. .P.a.c.k.a.g.e.=.".D.i.s.c.o.v.e.r.y.". .V.i.t.a.l.=.".n.o.".
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):706
                                Entropy (8bit):4.978464774518615
                                Encrypted:false
                                SSDEEP:12:MMHd41Pd7lzc+TXYr+XFy9bWzc+TXYcXII3VymhsSY9g3XmG8jDjXRg3uxT:Jd67RtYrx9itYhmhV3WzPO3I
                                MD5:B9E73DA1D0C74D457129E7B40ACA313D
                                SHA1:4DAF6F7D0C10EDC6FAE3117377D559BF7C4D6788
                                SHA-256:58FAB427D606F7F59FE13D6E59A3D707F92EAC96E17BF27C7B5A28A173AFCF7A
                                SHA-512:A63B82C07C3F581CFE86B81711AEBED92491EDCA645388EB3DAB94221B708DD0BFA8ADD37A403FA02A2F9DB75CDA0E0F724CA3566A6BDB66A3C089147D713895
                                Malicious:false
                                Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <configSections>.. <sectionGroup name="wix.bootstrapper" type="Microsoft.Tools.WindowsInstallerXml.Bootstrapper.BootstrapperSectionGroup, BootstrapperCore">.. <section name="host" type="Microsoft.Tools.WindowsInstallerXml.Bootstrapper.HostSection, BootstrapperCore" />.. </sectionGroup>.. </configSections>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. </startup>.. <wix.bootstrapper>.. <host assemblyName="ema3d.UI.Boot">.. <supportedFramework version="v4\Full" />.. <supportedFramework version="v4\Client" />.. </host>.. </wix.bootstrapper>..</configuration>
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):90032
                                Entropy (8bit):5.688056417150366
                                Encrypted:false
                                SSDEEP:1536:lHMBp/GRbgi5ofpiG2pq+51FogDTY11UfV:luUbV5jlq+51Fo626
                                MD5:6193421A522A7DB8821FC4DED2170132
                                SHA1:0D8A6F348F4D2BA1782E6ECED6678B51E05E2BDE
                                SHA-256:AD7CE3129176F150B9FFFBA9BED86814C61E8F01EC8827F12B23272013C91F62
                                SHA-512:A201A9D3D91772DD711A4DC52207F4FA104EFBF10750174ECBACC9D9F1810ADF704915B6497EE59DC7E8902E5CD578BC5647FB51A3D878B829F5BAE27A08AED8
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g^.........." ..0...... ........... ...@....... ....................................@.................................`...O....@...............@.......`......(-............................................... ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......0..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):184240
                                Entropy (8bit):5.87607955863929
                                Encrypted:false
                                SSDEEP:3072:PGfZS7hUuK3PcbFeRRLxyR69UgoCaf8ZECnfKlRUjW01KyFD:bzMRLkR6joxfe1z
                                MD5:ADAC22D3A7E4FBEEA84F14A87BB06893
                                SHA1:505D710D57D53C97AF2AEE9CAD6486E4B96F93E4
                                SHA-256:E8A011E7CF01CC512CF3350767E40576BA78559429443EBD2BEDAE6B0E869BB5
                                SHA-512:5EB8A59978487145815BFB03932313AA6B308C0300473005682228E857642D522D45B0C94CE50DB3DBAE41438297E39AEE0A12256D10D0750F9D48541D87E0C2
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g^.........." ..0...... ......z.... ........... ..............................m.....@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):343776
                                Entropy (8bit):6.342368825094352
                                Encrypted:false
                                SSDEEP:6144:hjR3hvRexOPu3FwQkFr5YQLALz6mbqvFrE:tdFEIPu3yQkF3tFE
                                MD5:D735420B968EFA87E11F8D5AB1151D6B
                                SHA1:F662D3310B45D917F8B917198B62B27C4A01E376
                                SHA-256:9093786E788A2182C59D66C9710C349E6578E1896AE212AC84D90EC1EC5C3B89
                                SHA-512:9A0D8502287C1252EFFDB917C0CBF67F36D262C07A59D6F8FC6C03DF0A955C2CA13AF82AFD2E463C8008FB92AAD62D9C31A34028C54E1446BF2ED69201713019
                                Malicious:false
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.........." ..0.............b ... ...@....... ...............................H....`.................................. ..O....@...................&...`....................................................... ............... ..H............text...h.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................D ......H...........h............E...................................................X(,...(.........X(,...(......(-...(.......(-...(....*...0..s..........(s.....(s...(,...(.......(u.....(u...(,...(.......(s.....(s...(.....(....Y(.......(u.....(u...(.....(....Y(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*J.(.....(....sp...*..(.....(....X.(.....(....Xsp...*..(.....(....#.......@[X.(.....(....#.......@[Xsp...*..(....#.......@[.(....#.......@[sp...*..0..E...
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):126896
                                Entropy (8bit):6.637074858344021
                                Encrypted:false
                                SSDEEP:3072:RO4ChgervCKABl5n4lMuMtN8cYmuXHyPKdeGlT:MJfBidDuUY6qNT
                                MD5:62A89C59A1ABDF48AF7F00122DAD6B94
                                SHA1:ADF012CE9FC22C5C128F9AF63F6B54C7C1D03B23
                                SHA-256:8D9E0FE6B3F1EB231FDB4DECBB49E4E4E2B64DCB188DFC03261A9179B4DB7816
                                SHA-512:6B4CB3EB89D3D5620A31FBD12AB854DC3FB31018468357797786D43315EEF4DE675C1905F21C8E8E7D22DAB9BAAEDC688FD767325FE3A0F0A2A09A2CAA9E2002
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......0m..t..Vt..Vt..V.j.W~..V.j.W...V.j.Wf..V&d.Wd..V&d.We..V&d.Wi..V.j.We..Vt..V...V.e.W{..V.e.Wu..V.e.Vu..Vt.`Vu..V.e.Wu..VRicht..V........PE..L.....g^...........!.....6..........(>.......P............................... ......![....@.................................8...x...............................|......T...........................8...@............P...............................text...[5.......6.................. ..`.rdata...s...P...t...:..............@..@.data...4...........................@....rsrc...............................@..@.reloc..|...........................@..B................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):192432
                                Entropy (8bit):6.602750370249682
                                Encrypted:false
                                SSDEEP:3072:cjWIuq/+AIIzkioKPS6LJp9LYelv7ShV/GdmX01Qk2U5r/E6JyT1/t5MDi21jxeU:cjWIN/+1ivqa7nwhg0kQC/Ex1/tN95L4
                                MD5:025B447A432C7C2C5F4A07D5BDF8B454
                                SHA1:1ABA9A9C6FE4AE74049B8F4668D31F174FF6BC1C
                                SHA-256:2270E987EE91F4B0FA174A9987A3D5D05D2E98D2ACDBA9128680CD18F21F7304
                                SHA-512:A29F370E3F61422945223CA8A81CE2171130F111F7A95FEB8B85F9FE12CA61D3C9ECE01A4C02201F2A7454315A1AD5B30F183A8D5B64B6C70D8C4D08689D5128
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........P...1...1...1...W...1...W..y1...Y...1...Y...1...Y...1...W...1...W...1...W...1...1...1..hX...1..hX...1..hX...1...1j..1..hX...1..Rich.1..........................PE..L.....g^...........!.....................................................................@.................................l...................................h.......T...........................8...@...............X............................text............................... ..`.rdata..8...........................@..@.data...............................@....rsrc...............................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PNG image data, 63 x 63, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):797
                                Entropy (8bit):7.648767094164769
                                Encrypted:false
                                SSDEEP:12:6v/7rW3M/jDYAlFTzdvhKZ7e/cbp4/82UNb6MjmlKPNXheD1H0oJodqSXaTbutak:lQD1lldv8Z7g04/82Y6+Pxi19mDoqt5
                                MD5:A356956FD269567B8F4612A33802637B
                                SHA1:75AE41181581FD6376CA9CA88147011E48BF9A30
                                SHA-256:A401A225ADDAF89110B4B0F6E8CF94779E7C0640BCDD2D670FFCF05AAB0DAD03
                                SHA-512:A0F7836AEFA1747F481C116F6B085F503B5C09B3A1DD97CD2189F7CE4E6E7EA98F1F66503CBA2E6A83E873248CC7507328710DFA670AA5763DF8AEDCC560285E
                                Malicious:false
                                Preview:.PNG........IHDR...?...?.....W_......sRGB.........gAMA......a.....pHYs..........+......IDAThC./W.0....P(...Db+q8$.........J...-..8.e]._..;........Y... .Y....z\........{W|..../q..<%.....C5...0....OrU....,..^........).....2.......i.Ge..T9T..}.7..J.......}..b...S.>.%y..Fc..j.X.....y."...e.U..M(ez....4\..C....u.......w..0..J.Wo."...mM.r.h..8..q..X..k!...j..xn...l...W`..r.+.R..J........c.T.}......cz..<43..@.c..rH...|..V.....K.mN.........k....,..4OL..5..M.tm%=.U.t-7.w....k.R.....c...-].5~..]2..5...GA..[..={.5..].=(.$}.\.9..5...MWu..[#.....F..j.F...d...,..MWu.7..3......$.......G.t.....=;N<_:[......0.,1.y.\.Z.|..%..>}...q.s....y.#p......!-.;.6!o.KO..E.6...........<..c..9_B....y....im...b...Xn.....)t9Q...........V.WMtP. .P..Z.&..KR.ac......IEND.B`.
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):3915
                                Entropy (8bit):5.15881451198739
                                Encrypted:false
                                SSDEEP:48:cecHddpXBT2E/zPHWgtpmAPH8TSJmBP+NPHrM/O8YpQbFUuhJ3PK7usPH4Lr:wHdHxS4Z9UG4BmNjCOhpsB3PswP
                                MD5:A20778EC90A094A62A6C3A6AB2A6DC7D
                                SHA1:74C131B5FD80446FFDF2AFAD723762DD36621309
                                SHA-256:F8C3A03F47F0B9B3C20F0522A2481DA28C77FECDBB302F8DD8FBED87758CBAEA
                                SHA-512:47F34A9F416D223DCBF071E7292A05554AF3D27CDE67FC8C161C1BED564C6E7FC448C2F482E05F33149C782E09C681BD65730CA00CF9EC68B284128214B75529
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Theme xmlns="http://wixtoolset.org/schemas/thmutil/2010">.. <Window Width="485" Height="300" HexStyle="100a0000" FontId="0">#(loc.Caption)</Window>.. <Font Id="0" Height="-12" Weight="500" Foreground="000000" Background="FFFFFF">Segoe UI</Font>.. <Font Id="1" Height="-24" Weight="500" Foreground="000000">Segoe UI</Font>.. <Font Id="2" Height="-22" Weight="500" Foreground="666666">Segoe UI</Font>.. <Font Id="3" Height="-12" Weight="500" Foreground="000000" Background="FFFFFF">Segoe UI</Font>.. <Font Id="4" Height="-12" Weight="500" Foreground="ff0000" Background="FFFFFF" Underline="yes">Segoe UI</Font>.... <Image X="11" Y="11" Width="64" Height="64" ImageFile="mbapreq.png" Visible="yes"/>.. <Text X="80" Y="11" Width="-11" Height="96" FontId="1" Visible="yes" DisablePrefix="yes">#(loc.Title)</Text>.... <Page Name="Help">.. <Text X="11" Y="112" Width="-11" Height="30" FontId="2" DisablePrefix="yes">#(loc.HelpHeader
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2464
                                Entropy (8bit):5.076345322304751
                                Encrypted:false
                                SSDEEP:48:cxX7DxMT8dbCsK19Wqq8+JIDxN3Wm2WcN3miNlLPDHXsmkaYXfXQ2BmGA7b1fABP:8LuTY1xmmmTerNR0AT1O
                                MD5:4D2C8D10C5DCCA6B938B71C8F02CA8A8
                                SHA1:11577021465379E9D1FF4260E607149BA5DFA6B3
                                SHA-256:C63DE5F309502F9272402587A6BE22624D1BC2FEACD1BD33FB11E44CD6614B96
                                SHA-512:AE791C1F05821167F1D2E1D07DBF95FE7E72B35B3E4B1E22720006C7A672B1330B748414792392B0E806F111AA4EFC1C424F4479EBDE349E3F079792DBB3BF47
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLocalization Culture="en-us" Language="1033" xmlns="http://schemas.microsoft.com/wix/2006/localization">.. <String Id="Caption">[WixBundleName] Setup</String>.. <String Id="Title">Microsoft .NET Framework required for [WixBundleName] setup</String>.. <String Id="ConfirmCancelMessage">Are you sure you want to cancel?</String>.. <String Id="HelpHeader">Setup Help</String>.. <String Id="HelpText">/passive | /quiet - displays minimal UI with no prompts or displays no UI and.. no prompts. By default UI and all prompts are displayed...../norestart - suppress any attempts to restart. By default UI will prompt before restart.../log log.txt - logs to a specific file. By default a log file is created in %TEMP%.</String>.. <String Id="HelpClos
                                Process:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1048328
                                Entropy (8bit):7.595028138776364
                                Encrypted:false
                                SSDEEP:24576:5VnVr6ecc38BetTec6cXC6v8WlYKeuIsPUSy+4NY0yk7b7z:p67KTec/yclYK1rf4NxRX
                                MD5:F51103F1E13618AE83B88837789FE62C
                                SHA1:D5F2AF880AEB85B3B8933F8969D2A886A4B32574
                                SHA-256:893CDA166AF5049C8C8A9C116BE2D75FA6122B6E90A13B8DF8F84FC355CE9A8D
                                SHA-512:2B8B3FB4EF655BB9E7256716022E032BB8EA495198F8C125E4CFA2E1CEBD4398D2826FF6ACA57A032F2C8627E6D70C11E47746696F6F5ABD8FE12357E4EB0B7B
                                Malicious:false
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B...#..#..#...E..#...E...#...K..#...K..#...K..#...E..#...E..#...E..#..#..."...J...#...JQ.#..#9.#...J..#..Rich.#..........PE..L...A.g^.....................T....................@..........................@.......h....@.................................t.......................(....&.......=...z..T....................{.......z..@...........................................text............................... ..`.rdata..............................@..@.data...............................@....wixburn8...........................@..@.rsrc...............................@..@.reloc...=.......>..................@..B........................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.674392800672086
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:jlK7Q70gbN.exe
                                File size:1'204'392 bytes
                                MD5:fa7b382660c277341e573e54ea81ac1f
                                SHA1:b84161e5c80dadd9efd6a8307e5d6cdd607b8bc8
                                SHA256:39e87c245f3df670592eac79160e0de43421742c0e0ab1cfb1452790f07747c9
                                SHA512:c0cfc4b06ebfc3ffb57595ed9d7d7169581ab9608e23e03a621c4fd0cbd34ec90bfde6c3468bf60cc7b5c86ce22e2528211716d684c057d1358ada84beb34ff2
                                SSDEEP:24576:5ZnVr6ecc38BetTecucXC6v8WlYKeuIsPUSy+4NY0yk7b7uIsvkX:J67KTecTyclYK1rf4NxR6IN
                                TLSH:3B45CF32E561402AE7F101F3B87897303D6CAB28275089EAE3D4BD1D7A7449667BF217
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B...#...#...#...E...#...E...#...K...#...K...#...K...#...E...#...E...#...E...#...#..."...J...#...JQ..#...#9..#...J...#..Rich.#.
                                Icon Hash:0e96933333317969
                                Entrypoint:0x42df91
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5E67C141 [Tue Mar 10 16:33:05 2020 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2a47c65375416ebacde9ef7e2931050a
                                Signature Valid:true
                                Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                Signature Validation Error:The operation completed successfully
                                Error Number:0
                                Not Before, Not After
                                • 02/08/2023 02:00:00 02/08/2026 01:59:59
                                Subject Chain
                                • CN="Electro Magnetic Applications, Inc", O="Electro Magnetic Applications, Inc", S=Colorado, C=US
                                Version:3
                                Thumbprint MD5:108711BB85EFC58B76D316A4EF7CEE70
                                Thumbprint SHA-1:5A4FF1ADF82F020F2C6AA0EB4413D83E3B4D3746
                                Thumbprint SHA-256:71ED552650D578FF0A728BA2ADF92B23E7F5C4EB3BBD2C10B081F850512A5775
                                Serial:6AD5B0A8BC68EA1CE815864097608736
                                Instruction
                                call 00007F0C34E4FA9Fh
                                jmp 00007F0C34E4F3DFh
                                int3
                                int3
                                int3
                                int3
                                int3
                                mov eax, dword ptr [esp+08h]
                                mov ecx, dword ptr [esp+10h]
                                or ecx, eax
                                mov ecx, dword ptr [esp+0Ch]
                                jne 00007F0C34E4F56Bh
                                mov eax, dword ptr [esp+04h]
                                mul ecx
                                retn 0010h
                                push ebx
                                mul ecx
                                mov ebx, eax
                                mov eax, dword ptr [esp+08h]
                                mul dword ptr [esp+14h]
                                add ebx, eax
                                mov eax, dword ptr [esp+08h]
                                mul ecx
                                add edx, ebx
                                pop ebx
                                retn 0010h
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                cmp cl, 00000040h
                                jnc 00007F0C34E4F577h
                                cmp cl, 00000020h
                                jnc 00007F0C34E4F568h
                                shrd eax, edx, cl
                                shr edx, cl
                                ret
                                mov eax, edx
                                xor edx, edx
                                and cl, 0000001Fh
                                shr eax, cl
                                ret
                                xor eax, eax
                                xor edx, edx
                                ret
                                push ebp
                                mov ebp, esp
                                jmp 00007F0C34E4F56Fh
                                push dword ptr [ebp+08h]
                                call 00007F0C34E55C04h
                                pop ecx
                                test eax, eax
                                je 00007F0C34E4F571h
                                push dword ptr [ebp+08h]
                                call 00007F0C34E55C76h
                                pop ecx
                                test eax, eax
                                je 00007F0C34E4F548h
                                pop ebp
                                ret
                                cmp dword ptr [ebp+08h], FFFFFFFFh
                                je 00007F0C34E4FE64h
                                jmp 00007F0C34E4FE41h
                                push ebp
                                mov ebp, esp
                                push dword ptr [ebp+08h]
                                call 00007F0C34E4FE7Dh
                                pop ecx
                                pop ebp
                                ret
                                push ebp
                                mov ebp, esp
                                test byte ptr [ebp+08h], 00000001h
                                push esi
                                mov esi, ecx
                                mov dword ptr [esi], 0046130Ch
                                je 00007F0C34E4F56Ch
                                push 0000000Ch
                                push esi
                                call 00007F0C34E4F53Dh
                                pop ecx
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x68b740xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x11488.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1239c80x26e0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x3d98.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x67ac00x54.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x67b140x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x67a000x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x4b0000x3d8.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x686f40x100.rdata
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x49a030x49c00c552f17ca270eab049c92efc369a84caFalse0.5400721663135594data6.567127031294IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x4b0000x1f1e40x1f200ed4c0b6ba10247249759c26d8bc81464False0.3012518825301205data5.08278823204171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x6b0000x18140xc000a7fbbd0bda6cb08de192ef47f25e53cFalse0.23307291666666666data2.8642627912652303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .wixburn0x6d0000x380x200ba3da9ac5fce2b7d7ee162aa46ad9b52False0.12890625data0.7244003241542494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x6e0000x114880x1160046e7b737dbfa2cdbeee948cb726b0e4cFalse0.5234375data6.605533687491705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x800000x3d980x3e00d6533570cd82aea87b99e92b9410e9b6False0.8092237903225806data6.772376538385135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x6e3280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.668010752688172
                                RT_ICON0x6e6100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.7027027027027027
                                RT_ICON0x6e7380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.5573027718550106
                                RT_ICON0x6f5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7328519855595668
                                RT_ICON0x6fe880x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.7854046242774566
                                RT_ICON0x703f00x4344PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9901277584204413
                                RT_ICON0x747340x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.26641473783656117
                                RT_ICON0x7895c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3351659751037344
                                RT_ICON0x7af040x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.450515947467167
                                RT_ICON0x7bfac0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6932624113475178
                                RT_MESSAGETABLE0x7c4140x2840dataEnglishUnited States0.28823757763975155
                                RT_GROUP_ICON0x7ec540x92dataEnglishUnited States0.6643835616438356
                                RT_VERSION0x7ece80x2ccdataEnglishUnited States0.473463687150838
                                RT_MANIFEST0x7efb40x4d2XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1174), with CRLF line terminatorsEnglishUnited States0.47568881685575365
                                DLLImport
                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, InitiateSystemShutdownExW, GetUserNameW, RegQueryValueExW, RegDeleteValueW, CloseEventLog, OpenEventLogW, ReportEventW, ConvertStringSecurityDescriptorToSecurityDescriptorW, CreateWellKnownSid, InitializeAcl, DecryptFileW, SetEntriesInAclW, ChangeServiceConfigW, CloseServiceHandle, ControlService, OpenSCManagerW, OpenServiceW, QueryServiceStatus, SetNamedSecurityInfoW, CheckTokenMembership, AllocateAndInitializeSid, SetEntriesInAclA, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegSetValueExW, RegQueryInfoKeyW, RegEnumValueW, RegEnumKeyExW, RegDeleteKeyW, RegCreateKeyExW, GetTokenInformation, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW, QueryServiceConfigW
                                USER32.dllPeekMessageW, PostMessageW, IsWindow, WaitForInputIdle, PostQuitMessage, GetMessageW, TranslateMessage, MsgWaitForMultipleObjects, PostThreadMessageW, GetMonitorInfoW, MonitorFromPoint, IsDialogMessageW, LoadCursorW, LoadBitmapW, SetWindowLongW, GetWindowLongW, GetCursorPos, MessageBoxW, CreateWindowExW, UnregisterClassW, RegisterClassW, DefWindowProcW, DispatchMessageW
                                OLEAUT32.dllVariantInit, SysAllocString, VariantClear, SysFreeString
                                GDI32.dllDeleteDC, DeleteObject, SelectObject, StretchBlt, GetObjectW, CreateCompatibleDC
                                SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, ShellExecuteExW
                                ole32.dllCoUninitialize, CoInitializeEx, CoInitialize, StringFromGUID2, CoCreateInstance, CoTaskMemFree, CLSIDFromProgID, CoInitializeSecurity
                                KERNEL32.dllGetCommandLineW, GetCommandLineA, GetCPInfo, CreateFileW, CloseHandle, GetProcAddress, LocalFree, HeapSetInformation, GetLastError, GetModuleHandleW, FormatMessageW, lstrlenA, lstrlenW, MultiByteToWideChar, WideCharToMultiByte, LCMapStringW, Sleep, GetLocalTime, GetModuleFileNameW, ExpandEnvironmentStringsW, GetTempPathW, GetTempFileNameW, CreateDirectoryW, GetFullPathNameW, CompareStringW, GetCurrentProcessId, WriteFile, SetFilePointer, LoadLibraryW, GetSystemDirectoryW, CreateFileA, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GetEnvironmentStringsW, FindClose, SetCurrentDirectoryW, GetCurrentDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, FindFirstFileW, FindNextFileW, MoveFileExW, InitializeCriticalSection, DeleteCriticalSection, ReleaseMutex, GetCurrentProcess, GetCurrentThreadId, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CreateProcessW, GetVersionExW, VerSetConditionMask, GetVolumePathNameW, EnterCriticalSection, LeaveCriticalSection, GetSystemTime, GetWindowsDirectoryW, GetNativeSystemInfo, FreeEnvironmentStringsW, FreeLibrary, GetModuleHandleExW, GetComputerNameW, VerifyVersionInfoW, GetDateFormatW, GetUserDefaultUILanguage, GetUserDefaultLangID, GetSystemDefaultLangID, GetStringTypeW, ReadFile, SetFilePointerEx, DuplicateHandle, LoadLibraryExW, CreateEventW, ProcessIdToSessionId, ConnectNamedPipe, SetNamedPipeHandleState, CreateNamedPipeW, WaitForSingleObject, GetProcessId, OpenProcess, CreateThread, GetExitCodeThread, SetEvent, WaitForMultipleObjects, LocalFileTimeToFileTime, SetEndOfFile, SetFileTime, ResetEvent, DosDateTimeToFileTime, CompareStringA, GetExitCodeProcess, SetThreadExecutionState, CopyFileExW, CreateMutexW, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, GetThreadLocale, GetOEMCP, GetACP, IsValidCodePage, SetStdHandle, GetFileSizeEx, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DecodePointer, WriteConsoleW, InterlockedIncrement, InterlockedDecrement, GetModuleHandleA, GlobalAlloc, GlobalFree, CopyFileW, VirtualAlloc, VirtualFree, SystemTimeToTzSpecificLocalTime, GetTimeZoneInformation, SystemTimeToFileTime, GetSystemInfo, VirtualProtect, VirtualQuery, GetSystemWow64DirectoryW, GetProcessHeap, FindFirstFileExW, GetFileType, ExitProcess, GetStdHandle, InitializeCriticalSectionAndSpinCount, SetLastError, RtlUnwind, RaiseException, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, LoadLibraryExA
                                RPCRT4.dllUuidCreate
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 7, 2024 23:30:33.144845963 CEST53563771.1.1.1192.168.2.5

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:17:30:12
                                Start date:07/10/2024
                                Path:C:\Users\user\Desktop\jlK7Q70gbN.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\jlK7Q70gbN.exe"
                                Imagebase:0x6d0000
                                File size:1'204'392 bytes
                                MD5 hash:FA7B382660C277341E573E54EA81AC1F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:2
                                Start time:17:30:12
                                Start date:07/10/2024
                                Path:C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Temp\{562041EC-09A3-44AA-87AE-CC1700EABB21}\.cr\jlK7Q70gbN.exe" -burn.clean.room="C:\Users\user\Desktop\jlK7Q70gbN.exe" -burn.filehandle.attached=528 -burn.filehandle.self=540
                                Imagebase:0x7d0000
                                File size:1'048'328 bytes
                                MD5 hash:F51103F1E13618AE83B88837789FE62C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:3
                                Start time:17:30:14
                                Start date:07/10/2024
                                Path:C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Temp\{FFE22A89-11FD-4A47-9FF0-982DA2A5AD2F}\.be\EMA3D.exe" -q -burn.elevated BurnPipe.{01823A2F-6092-4017-B70C-7D2B2DE988B6} {636B081A-FA87-43E7-BB2F-5B923C0323C7} 6180
                                Imagebase:0xa10000
                                File size:1'048'328 bytes
                                MD5 hash:F51103F1E13618AE83B88837789FE62C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 801 6d51d2-6d5280 call 6ff620 * 2 GetModuleHandleW call 710816 call 7109ca call 6d1206 812 6d5296-6d52a7 call 6d4326 801->812 813 6d5282 801->813 819 6d52a9-6d52ae 812->819 820 6d52b0-6d52cc call 6d5653 CoInitializeEx 812->820 814 6d5287-6d5291 call 71055b 813->814 821 6d5511-6d5518 814->821 819->814 829 6d52ce-6d52d3 820->829 830 6d52d5-6d52e1 call 70ffdc 820->830 823 6d551a-6d5520 call 6d2762 821->823 824 6d5525-6d5527 821->824 823->824 827 6d5529-6d5530 824->827 828 6d5537-6d5555 call 6dd7d7 call 6ea7ca call 6eaa14 824->828 827->828 831 6d5532 call 6e4174 827->831 850 6d5557-6d555f 828->850 851 6d5583-6d5596 call 6d4fe1 828->851 829->814 838 6d52f5-6d5304 call 711112 830->838 839 6d52e3 830->839 831->828 848 6d530d-6d531c call 712dba 838->848 849 6d5306-6d530b 838->849 842 6d52e8-6d52f0 call 71055b 839->842 842->821 857 6d531e-6d5323 848->857 858 6d5325-6d5334 call 713819 848->858 849->842 850->851 853 6d5561-6d5564 850->853 862 6d559d-6d55a4 851->862 863 6d5598 call 713ce1 851->863 853->851 856 6d5566-6d5581 call 6e42d4 call 6d563d 853->856 856->851 857->842 873 6d533d-6d535c GetVersionExW 858->873 874 6d5336-6d533b 858->874 867 6d55ab-6d55b2 862->867 868 6d55a6 call 7131c0 862->868 863->862 870 6d55b9-6d55c0 867->870 871 6d55b4 call 71175e 867->871 868->867 876 6d55c7-6d55c9 870->876 877 6d55c2 call 7100eb 870->877 871->870 879 6d535e-6d5368 GetLastError 873->879 880 6d5396-6d53db call 6d34c4 call 6d563d 873->880 874->842 885 6d55cb CoUninitialize 876->885 886 6d55d1-6d55d8 876->886 877->876 881 6d536a-6d5373 879->881 882 6d5375 879->882 903 6d53dd-6d53e8 call 6d2762 880->903 904 6d53ee-6d53fe call 6e7430 880->904 881->882 887 6d537c-6d5391 call 6d38ba 882->887 888 6d5377 882->888 885->886 890 6d55da-6d55dc 886->890 891 6d5613-6d561c call 710439 886->891 887->842 888->887 895 6d55de-6d55e0 890->895 896 6d55e2-6d55e8 890->896 901 6d561e call 6d4639 891->901 902 6d5623-6d563a call 710b1c call 6fdd3f 891->902 900 6d55ea-6d5603 call 6e3d09 call 6d563d 895->900 896->900 900->891 919 6d5605-6d5612 call 6d563d 900->919 901->902 903->904 915 6d540a-6d5413 904->915 916 6d5400 904->916 920 6d5419-6d541c 915->920 921 6d54db-6d54e8 call 6d4d7a 915->921 916->915 919->891 924 6d54b3-6d54cf call 6d4b2a 920->924 925 6d5422-6d5425 920->925 927 6d54ed-6d54f1 921->927 932 6d54fd-6d550f 924->932 942 6d54d1 924->942 929 6d548b-6d54a7 call 6d4936 925->929 930 6d5427-6d542a 925->930 927->932 933 6d54f3 927->933 929->932 944 6d54a9 929->944 935 6d542c-6d542f 930->935 936 6d5463-6d547f call 6d4acd 930->936 932->821 933->932 940 6d5431-6d5436 935->940 941 6d5440-6d5453 call 6d4cc9 935->941 936->932 946 6d5481 936->946 940->941 941->932 948 6d5459 941->948 942->921 944->924 946->929 948->936
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?), ref: 006D5254
                                    • Part of subcall function 00710816: InitializeCriticalSection.KERNEL32(0073C6EC,?,006D5260,00000000,?,?,?,?,?,?), ref: 0071082D
                                    • Part of subcall function 006D1206: CommandLineToArgvW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000000,ignored ,00000000,?,00000000,?,?,?,006D527C,00000000,?), ref: 006D1244
                                    • Part of subcall function 006D1206: GetLastError.KERNEL32(?,?,?,006D527C,00000000,?,?,00000003,00000000,00000000,?,?,?,?,?,?), ref: 006D124E
                                  • CoInitializeEx.COMBASE(00000000,00000000,?,?,00000000,?,?,00000003,00000000,00000000,?,?,?,?,?,?), ref: 006D52C2
                                    • Part of subcall function 00711112: GetProcAddress.KERNEL32(RegDeleteKeyExW,AdvApi32.dll), ref: 00711133
                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?), ref: 006D5354
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 006D535E
                                  • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 006D55CB
                                  Strings
                                  • Failed to run untrusted mode., xrefs: 006D54F3
                                  • 3.14.0.3910, xrefs: 006D53C1
                                  • Failed to parse command line., xrefs: 006D5282
                                  • Failed to run embedded mode., xrefs: 006D5481
                                  • Failed to initialize core., xrefs: 006D5400
                                  • Failed to initialize XML util., xrefs: 006D5336
                                  • Failed to initialize Regutil., xrefs: 006D5306
                                  • Failed to initialize Cryputil., xrefs: 006D52E3
                                  • Failed to get OS info., xrefs: 006D538C
                                  • Invalid run mode., xrefs: 006D5436
                                  • Failed to initialize engine state., xrefs: 006D52A9
                                  • Failed to run per-machine mode., xrefs: 006D54A9
                                  • Failed to run per-user mode., xrefs: 006D54D1
                                  • Failed to initialize COM., xrefs: 006D52CE
                                  • Failed to initialize Wiutil., xrefs: 006D531E
                                  • c:\agent\_work\79\s\src\burn\engine\engine.cpp, xrefs: 006D5382
                                  • Failed to run RunOnce mode., xrefs: 006D5459
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorInitializeLast$AddressArgvCommandCriticalHandleLineModuleProcSectionUninitializeVersion
                                  • String ID: 3.14.0.3910$Failed to get OS info.$Failed to initialize COM.$Failed to initialize Cryputil.$Failed to initialize Regutil.$Failed to initialize Wiutil.$Failed to initialize XML util.$Failed to initialize core.$Failed to initialize engine state.$Failed to parse command line.$Failed to run RunOnce mode.$Failed to run embedded mode.$Failed to run per-machine mode.$Failed to run per-user mode.$Failed to run untrusted mode.$Invalid run mode.$c:\agent\_work\79\s\src\burn\engine\engine.cpp
                                  • API String ID: 3262001429-1276476639
                                  • Opcode ID: eaa0058087e17a40acdc1b516f9e3029efe81b694f3286e823c8574125c52449
                                  • Instruction ID: 26cb15506287a1920d8f247707ef7b64d47aa8035d70cf00b3ca748dafcbb1d2
                                  • Opcode Fuzzy Hash: eaa0058087e17a40acdc1b516f9e3029efe81b694f3286e823c8574125c52449
                                  • Instruction Fuzzy Hash: C5B1D471D00A299BDB32AF688C45BED76B6AF04700F04019BF90AB6791DB749F848F95
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,00000000,007138BD,00000000,?,00000000), ref: 00713329
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,BTm,006FBD36,0071B518,BTm,?,00000000,?), ref: 00713335
                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00713375
                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00713381
                                  • GetProcAddress.KERNEL32(00000000,Wow64EnableWow64FsRedirection), ref: 0071338C
                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00713396
                                  • CoCreateInstance.OLE32(0073C7A0,00000000,00000001,0071B878,?,?,?,?,?,?,?,?,?,?,BTm,006FBD36), ref: 007133D1
                                  • ExitProcess.KERNEL32 ref: 00713480
                                  Strings
                                  • kernel32.dll, xrefs: 00713319
                                  • Wow64EnableWow64FsRedirection, xrefs: 00713383
                                  • Wow64RevertWow64FsRedirection, xrefs: 0071338E
                                  • IsWow64Process, xrefs: 0071336F
                                  • Wow64DisableWow64FsRedirection, xrefs: 0071337B
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 00713359
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressProc$CreateErrorExitHandleInstanceLastModuleProcess
                                  • String ID: IsWow64Process$Wow64DisableWow64FsRedirection$Wow64EnableWow64FsRedirection$Wow64RevertWow64FsRedirection$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp$kernel32.dll
                                  • API String ID: 2124981135-2947744589
                                  • Opcode ID: ec0275d04d6118a48cc3a6524e614baa8551e371c0032f807c84c2ccf9341680
                                  • Instruction ID: 9e7a5b54e9d9ff79cdec4a38a9454fd2da7fbefb316f10b003315bb044ca32e3
                                  • Opcode Fuzzy Hash: ec0275d04d6118a48cc3a6524e614baa8551e371c0032f807c84c2ccf9341680
                                  • Instruction Fuzzy Hash: 1A41B375A00355ABDB229BACC844BEE7BA4EF44B10F114169ED11EB2C1DB7DDF808B94
                                  APIs
                                    • Part of subcall function 006D34C4: GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000104,?,?,?,?,006D10DD,?,00000000), ref: 006D34E5
                                  • CreateFileW.KERNELBASE(?,80000000,00000005,00000000,00000003,00000080,00000000,?,00000000), ref: 006D10F6
                                    • Part of subcall function 006D1173: HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D1184
                                    • Part of subcall function 006D1173: GetModuleHandleW.KERNEL32(kernel32,?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D118F
                                    • Part of subcall function 006D1173: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 006D119D
                                    • Part of subcall function 006D1173: GetLastError.KERNEL32(?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D11B8
                                    • Part of subcall function 006D1173: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 006D11C0
                                    • Part of subcall function 006D1173: GetLastError.KERNEL32(?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D11D5
                                  • CloseHandle.KERNEL32(?,?,?,?,0071B4D0,?,cabinet.dll,00000009,?,?,00000000), ref: 006D1131
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorFileHandleLastModuleProc$CloseCreateHeapInformationName
                                  • String ID: cabinet.dll$clbcatq.dll$crypt32.dll$feclient.dll$msasn1.dll$msi.dll$version.dll$wininet.dll
                                  • API String ID: 3687706282-221319812
                                  • Opcode ID: d1bf0812c9321932f798a3e7e75614c24325bf942810d24ef6cd7f781c163154
                                  • Instruction ID: 44d5048d317731f1c5a39ef13bbbadba244edd5e3cdda594b208e22fecae0435
                                  • Opcode Fuzzy Hash: d1bf0812c9321932f798a3e7e75614c24325bf942810d24ef6cd7f781c163154
                                  • Instruction Fuzzy Hash: FE219471D0021CABDB509FA8CC45BDEBBBAAB09714F50812AEA11BB3C1D7B459448BA4
                                  Strings
                                  • Failed to calculate working folder to ensure it exists., xrefs: 006E9FC1
                                  • Failed create working folder., xrefs: 006E9FD7
                                  • Failed to copy working folder., xrefs: 006E9FFF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CurrentDirectoryErrorLastProcessWindows
                                  • String ID: Failed create working folder.$Failed to calculate working folder to ensure it exists.$Failed to copy working folder.
                                  • API String ID: 3841436932-2072961686
                                  • Opcode ID: 5b4517009ecff0f3b78a1d3eb12acfbc94618cb7e196d97cd0a64b983ff9ec85
                                  • Instruction ID: 52fdcb1de07655e1c07bab9456f9bbe1b95b7b7f23158cf3686f11d860c7438d
                                  • Opcode Fuzzy Hash: 5b4517009ecff0f3b78a1d3eb12acfbc94618cb7e196d97cd0a64b983ff9ec85
                                  • Instruction Fuzzy Hash: 5D01D4319013A4FA8B226B9ADC05CDE7F77DF90B247114116F800B6214E6359F50AA95
                                  APIs
                                  • GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                  • RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: 5d41d96900651bd1ffe2d0990a4a1511a48dde726a049db6816917992a5c88e7
                                  • Instruction ID: 25673d6a543a6c7e3d074e0ba45632f8bf9031e541490a2631c0836f5615c3a9
                                  • Opcode Fuzzy Hash: 5d41d96900651bd1ffe2d0990a4a1511a48dde726a049db6816917992a5c88e7
                                  • Instruction Fuzzy Hash: DAC012331A020CAB8B006FFCEC0ECCA3BACBB28602B00C500B909C61A0C73CE0549B64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 6df97e-6df9af call 713c5b 3 6df9b1 0->3 4 6df9b3-6df9b5 0->4 3->4 5 6df9c9-6df9e2 call 7135af 4->5 6 6df9b7-6df9c4 call 71055b 4->6 11 6df9ee-6dfa03 call 7135af 5->11 12 6df9e4-6df9e9 5->12 13 6dfeb1-6dfeb6 6->13 24 6dfa0f-6dfa1c call 6de9f9 11->24 25 6dfa05-6dfa0a 11->25 14 6dfea8-6dfeaf call 71055b 12->14 16 6dfebe-6dfec3 13->16 17 6dfeb8-6dfeba 13->17 30 6dfeb0 14->30 20 6dfecb-6dfed0 16->20 21 6dfec5-6dfec7 16->21 17->16 22 6dfed8-6dfedc 20->22 23 6dfed2-6dfed4 20->23 21->20 27 6dfede-6dfee1 call 6d2762 22->27 28 6dfee6-6dfeeb 22->28 23->22 33 6dfa1e-6dfa23 24->33 34 6dfa28-6dfa3d call 7135af 24->34 25->14 27->28 30->13 33->14 37 6dfa3f-6dfa44 34->37 38 6dfa49-6dfa5b call 714f04 34->38 37->14 41 6dfa5d-6dfa65 38->41 42 6dfa6a-6dfa7f call 7135af 38->42 43 6dfd34-6dfd3d call 71055b 41->43 47 6dfa8b-6dfaa0 call 7135af 42->47 48 6dfa81-6dfa86 42->48 43->30 52 6dfaac-6dfabe call 7137bb 47->52 53 6dfaa2-6dfaa7 47->53 48->14 56 6dfaca-6dfae0 call 713c5b 52->56 57 6dfac0-6dfac5 52->57 53->14 60 6dfd8f-6dfda9 call 6dec73 56->60 61 6dfae6-6dfae8 56->61 57->14 68 6dfdab-6dfdb0 60->68 69 6dfdb5-6dfdcd call 713c5b 60->69 62 6dfaea-6dfaef 61->62 63 6dfaf4-6dfb09 call 7137bb 61->63 62->14 70 6dfb0b-6dfb10 63->70 71 6dfb15-6dfb2a call 7135af 63->71 68->14 76 6dfe97-6dfe98 call 6df0a3 69->76 77 6dfdd3-6dfdd5 69->77 70->14 79 6dfb2c-6dfb2e 71->79 80 6dfb3a-6dfb4f call 7135af 71->80 83 6dfe9d-6dfea1 76->83 81 6dfdd7-6dfddc 77->81 82 6dfde1-6dfdff call 7135af 77->82 79->80 84 6dfb30-6dfb35 79->84 90 6dfb5f-6dfb74 call 7135af 80->90 91 6dfb51-6dfb53 80->91 81->14 92 6dfe0b-6dfe23 call 7135af 82->92 93 6dfe01-6dfe06 82->93 83->30 87 6dfea3 83->87 84->14 87->14 101 6dfb84-6dfb99 call 7135af 90->101 102 6dfb76-6dfb78 90->102 91->90 94 6dfb55-6dfb5a 91->94 99 6dfe25-6dfe27 92->99 100 6dfe30-6dfe48 call 7135af 92->100 93->14 94->14 99->100 103 6dfe29-6dfe2e 99->103 109 6dfe4a-6dfe4c 100->109 110 6dfe55-6dfe6d call 7135af 100->110 111 6dfba9-6dfbbe call 7135af 101->111 112 6dfb9b-6dfb9d 101->112 102->101 104 6dfb7a-6dfb7f 102->104 103->14 104->14 109->110 113 6dfe4e-6dfe53 109->113 119 6dfe6f-6dfe74 110->119 120 6dfe76-6dfe8e call 7135af 110->120 121 6dfbce-6dfbe3 call 7135af 111->121 122 6dfbc0-6dfbc2 111->122 112->111 114 6dfb9f-6dfba4 112->114 113->14 114->14 119->14 120->76 128 6dfe90-6dfe95 120->128 129 6dfbe5-6dfbe7 121->129 130 6dfbf3-6dfc08 call 7135af 121->130 122->121 125 6dfbc4-6dfbc9 122->125 125->14 128->14 129->130 131 6dfbe9-6dfbee 129->131 134 6dfc18-6dfc2d call 7135af 130->134 135 6dfc0a-6dfc0c 130->135 131->14 139 6dfc3d-6dfc55 call 7135af 134->139 140 6dfc2f-6dfc31 134->140 135->134 136 6dfc0e-6dfc13 135->136 136->14 144 6dfc65-6dfc7d call 7135af 139->144 145 6dfc57-6dfc59 139->145 140->139 142 6dfc33-6dfc38 140->142 142->14 149 6dfc8d-6dfca2 call 7135af 144->149 150 6dfc7f-6dfc81 144->150 145->144 146 6dfc5b-6dfc60 145->146 146->14 154 6dfca8-6dfcc5 CompareStringW 149->154 155 6dfd42-6dfd44 149->155 150->149 151 6dfc83-6dfc88 150->151 151->14 158 6dfccf-6dfce4 CompareStringW 154->158 159 6dfcc7-6dfccd 154->159 156 6dfd4f-6dfd51 155->156 157 6dfd46-6dfd4d 155->157 160 6dfd5d-6dfd75 call 7137bb 156->160 161 6dfd53-6dfd58 156->161 157->156 163 6dfce6-6dfcf0 158->163 164 6dfcf2-6dfd07 CompareStringW 158->164 162 6dfd10-6dfd15 159->162 160->60 170 6dfd77-6dfd79 160->170 161->14 162->156 163->162 165 6dfd09 164->165 166 6dfd17-6dfd2f call 6d38ba 164->166 165->162 166->43 172 6dfd7b-6dfd80 170->172 173 6dfd85 170->173 172->14 173->60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: StringVariant$AllocClearFreeInit
                                  • String ID: AboutUrl$Arp$BTm$Classification$Comments$Contact$Department$DisableModify$DisableRemove$DisplayName$DisplayVersion$ExecutableName$Failed to get @AboutUrl.$Failed to get @Classification.$Failed to get @Comments.$Failed to get @Contact.$Failed to get @Department.$Failed to get @DisableModify.$Failed to get @DisableRemove.$Failed to get @DisplayName.$Failed to get @DisplayVersion.$Failed to get @ExecutableName.$Failed to get @HelpLink.$Failed to get @HelpTelephone.$Failed to get @Id.$Failed to get @Manufacturer.$Failed to get @Name.$Failed to get @ParentDisplayName.$Failed to get @PerMachine.$Failed to get @ProductFamily.$Failed to get @ProviderKey.$Failed to get @Publisher.$Failed to get @Register.$Failed to get @Tag.$Failed to get @UpdateUrl.$Failed to get @Version.$Failed to parse @Version: %ls$Failed to parse related bundles$Failed to parse software tag.$Failed to select ARP node.$Failed to select Update node.$Failed to select registration node.$Failed to set registration paths.$HelpLink$HelpTelephone$Invalid modify disabled type: %ls$Manufacturer$Name$ParentDisplayName$PerMachine$ProductFamily$ProviderKey$Publisher$Register$Registration$Tag$Update$UpdateUrl$Version$button$c:\agent\_work\79\s\src\burn\engine\registration.cpp$clbcatq.dll$msasn1.dll$yes
                                  • API String ID: 760788290-1019891731
                                  • Opcode ID: 19c68cd606cc3b98338a2fa1c92432fd10698427b686cddeae69208042bef03a
                                  • Instruction ID: 0799a6cbb797c48fffc0b1929af1181d8d8fc8f3d34f7b45888563a8fb65c58e
                                  • Opcode Fuzzy Hash: 19c68cd606cc3b98338a2fa1c92432fd10698427b686cddeae69208042bef03a
                                  • Instruction Fuzzy Hash: F6E1C272E40675FACB21AB64CC42EFD76A7BB10B10F554233F812B63A2D7649E615780

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 174 6db45a-6db4cf call 6ff620 * 2 179 6db507-6db50d 174->179 180 6db4d1-6db4db GetLastError 174->180 181 6db50f 179->181 182 6db511-6db523 SetFilePointerEx 179->182 183 6db4dd-6db4e6 180->183 184 6db4e8 180->184 181->182 185 6db525-6db52f GetLastError 182->185 186 6db557-6db571 ReadFile 182->186 183->184 187 6db4ef-6db4fc call 6d38ba 184->187 188 6db4ea 184->188 190 6db53c 185->190 191 6db531-6db53a 185->191 192 6db5a8-6db5af 186->192 193 6db573-6db57d GetLastError 186->193 203 6db501-6db502 187->203 188->187 199 6db53e 190->199 200 6db543-6db555 call 6d38ba 190->200 191->190 197 6db5b5-6db5be 192->197 198 6dbba6-6dbbba call 6d38ba 192->198 194 6db57f-6db588 193->194 195 6db58a 193->195 194->195 201 6db58c 195->201 202 6db591-6db5a3 call 6d38ba 195->202 197->198 205 6db5c4-6db5d4 SetFilePointerEx 197->205 216 6dbbbf 198->216 199->200 200->203 201->202 202->203 208 6dbbc0-6dbbc6 call 71055b 203->208 210 6db60b-6db623 ReadFile 205->210 211 6db5d6-6db5e0 GetLastError 205->211 230 6dbbc7-6dbbd7 call 6fdd3f 208->230 213 6db65a-6db661 210->213 214 6db625-6db62f GetLastError 210->214 218 6db5ed 211->218 219 6db5e2-6db5eb 211->219 223 6dbb8b-6dbba4 call 6d38ba 213->223 224 6db667-6db671 213->224 220 6db63c 214->220 221 6db631-6db63a 214->221 216->208 225 6db5ef 218->225 226 6db5f4-6db601 call 6d38ba 218->226 219->218 228 6db63e 220->228 229 6db643-6db650 call 6d38ba 220->229 221->220 223->216 224->223 231 6db677-6db69a SetFilePointerEx 224->231 225->226 226->210 228->229 229->213 236 6db69c-6db6a6 GetLastError 231->236 237 6db6d1-6db6e9 ReadFile 231->237 243 6db6a8-6db6b1 236->243 244 6db6b3 236->244 239 6db6eb-6db6f5 GetLastError 237->239 240 6db720-6db738 ReadFile 237->240 247 6db6f7-6db700 239->247 248 6db702 239->248 249 6db76f-6db78a SetFilePointerEx 240->249 250 6db73a-6db744 GetLastError 240->250 243->244 245 6db6ba-6db6c7 call 6d38ba 244->245 246 6db6b5 244->246 245->237 246->245 247->248 256 6db709-6db716 call 6d38ba 248->256 257 6db704 248->257 254 6db78c-6db796 GetLastError 249->254 255 6db7c4-6db7e3 ReadFile 249->255 251 6db746-6db74f 250->251 252 6db751 250->252 251->252 260 6db758-6db765 call 6d38ba 252->260 261 6db753 252->261 263 6db798-6db7a1 254->263 264 6db7a3 254->264 258 6dbb4c-6dbb56 GetLastError 255->258 259 6db7e9-6db7eb 255->259 256->240 257->256 268 6dbb58-6dbb61 258->268 269 6dbb63 258->269 266 6db7ec-6db7f3 259->266 260->249 261->260 263->264 270 6db7aa-6db7ba call 6d38ba 264->270 271 6db7a5 264->271 273 6db7f9-6db805 266->273 274 6dbb27-6dbb44 call 6d38ba 266->274 268->269 276 6dbb6a-6dbb80 call 6d38ba 269->276 277 6dbb65 269->277 270->255 271->270 279 6db807-6db80e 273->279 280 6db810-6db819 273->280 289 6dbb49-6dbb4a 274->289 294 6dbb81-6dbb89 call 71055b 276->294 277->276 279->280 284 6db853-6db85a 279->284 286 6db81f-6db845 ReadFile 280->286 287 6dbaea-6dbb01 call 6d38ba 280->287 291 6db85c-6db87e call 6d38ba 284->291 292 6db883-6db89a call 6d39df 284->292 286->258 290 6db84b-6db851 286->290 301 6dbb06-6dbb0c call 71055b 287->301 289->294 290->266 291->289 304 6db89c-6db8b9 call 6d38ba 292->304 305 6db8be-6db8d3 SetFilePointerEx 292->305 294->230 315 6dbb12-6dbb13 301->315 304->208 307 6db8d5-6db8df GetLastError 305->307 308 6db913-6db938 ReadFile 305->308 311 6db8ec 307->311 312 6db8e1-6db8ea 307->312 313 6db96f-6db97b 308->313 314 6db93a-6db944 GetLastError 308->314 316 6db8ee 311->316 317 6db8f3-6db903 call 6d38ba 311->317 312->311 318 6db97d-6db999 call 6d38ba 313->318 319 6db99e-6db9a2 313->319 320 6db946-6db94f 314->320 321 6db951 314->321 322 6dbb14-6dbb16 315->322 316->317 339 6db908-6db90e call 71055b 317->339 318->301 328 6db9dd-6db9f0 call 714c76 319->328 329 6db9a4-6db9d8 call 6d38ba call 71055b 319->329 320->321 324 6db958-6db96d call 6d38ba 321->324 325 6db953 321->325 322->230 323 6dbb1c-6dbb22 call 6d3aa4 322->323 323->230 324->339 325->324 341 6db9fc-6dba06 328->341 342 6db9f2-6db9f7 328->342 329->322 339->315 345 6dba08-6dba0e 341->345 346 6dba10-6dba18 341->346 342->339 349 6dba29-6dba89 call 6d39df 345->349 350 6dba1a-6dba22 346->350 351 6dba24-6dba27 346->351 354 6dbaad-6dbace call 6feb20 call 6db1d7 349->354 355 6dba8b-6dbaa7 call 6d38ba 349->355 350->349 351->349 354->322 362 6dbad0-6dbae0 call 6d38ba 354->362 355->354 362->287
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 006DB4D1
                                  • SetFilePointerEx.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB51F
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 006DB525
                                  • ReadFile.KERNELBASE(00000000,006D44B0,00000040,?,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB56D
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 006DB573
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB5D0
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB5D6
                                  • ReadFile.KERNELBASE(00000000,?,00000018,00000040,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB61F
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB625
                                  • SetFilePointerEx.KERNELBASE(00000000,-00000098,00000000,00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB696
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB69C
                                  • ReadFile.KERNEL32(00000000,?,00000004,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB6E5
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB6EB
                                  • ReadFile.KERNEL32(00000000,?,00000004,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB734
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB73A
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB786
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB78C
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • ReadFile.KERNEL32(00000000,?,00000028,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB7DF
                                  • ReadFile.KERNEL32(00000000,?,00000028,00000028,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB841
                                  • SetFilePointerEx.KERNELBASE(00000000,?,00000000,00000000,00000000,00000034,00000001,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB8CB
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB8D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: File$ErrorLast$Read$Pointer$Heap$AllocateProcess
                                  • String ID: ($.wix$4$Failed to allocate buffer for section info.$Failed to allocate memory for container sizes.$Failed to find Burn section.$Failed to find valid DOS image header in buffer.$Failed to find valid NT image header in buffer.$Failed to get total size of bundle.$Failed to open handle to engine process path.$Failed to read DOS header.$Failed to read NT header.$Failed to read complete image section header, index: %u$Failed to read complete section info.$Failed to read image section header, index: %u$Failed to read section info, data to short: %u$Failed to read section info, unsupported version: %08x$Failed to read section info.$Failed to read signature offset.$Failed to read signature size.$Failed to seek past optional headers.$Failed to seek to NT header.$Failed to seek to section info.$Failed to seek to start of file.$PE$PE Header from file didn't match PE Header in memory.$burn$c:\agent\_work\79\s\src\burn\engine\section.cpp$hDq
                                  • API String ID: 3411815225-1256511360
                                  • Opcode ID: d52fc1e652cedc2a9a3d3a4101e7ace56ffea1ff31e3f640811112b0fa7cbc5b
                                  • Instruction ID: 30276bf5d256864acc4cb06bac6eaa083093a6ee7f7e657fa1dc29d73c305e38
                                  • Opcode Fuzzy Hash: d52fc1e652cedc2a9a3d3a4101e7ace56ffea1ff31e3f640811112b0fa7cbc5b
                                  • Instruction Fuzzy Hash: CB12D876E40235EBD7709A198C46FEB76AAAF04B10F0241AAFD04BB3C4D7789D418BD5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 365 6dcd76-6dcda2 call 713bd5 368 6dcda4 365->368 369 6dcdb6-6dcdc7 365->369 370 6dcda9-6dcdb1 call 71055b 368->370 374 6dcdc9-6dcdce 369->374 375 6dcdd0-6dcdd5 369->375 376 6dd10b-6dd110 370->376 374->370 375->376 377 6dcddb-6dcdee call 6d39df 375->377 378 6dd118-6dd11d 376->378 379 6dd112-6dd114 376->379 384 6dce14-6dce21 377->384 385 6dcdf0-6dce0f call 6d38ba call 71055b 377->385 381 6dd11f-6dd121 378->381 382 6dd125-6dd129 378->382 379->378 381->382 386 6dd12b-6dd12e call 6d2762 382->386 387 6dd133-6dd137 382->387 389 6dd107 384->389 390 6dce27-6dce29 384->390 397 6dd10a 385->397 386->387 394 6dd109 389->394 393 6dce2c-6dce42 call 713b34 390->393 400 6dd1df 393->400 401 6dce48-6dce5a call 7135af 393->401 394->397 397->376 402 6dd1e4-6dd1ec call 71055b 400->402 407 6dd1d8-6dd1dd 401->407 408 6dce60-6dce6c call 7135af 401->408 402->394 407->402 410 6dce71-6dce75 408->410 411 6dce7b-6dce90 call 7135af 410->411 412 6dd1d1-6dd1d6 410->412 415 6dd1ca-6dd1cf 411->415 416 6dce96-6dceb1 CompareStringW 411->416 412->402 415->402 417 6dcebc-6dced1 CompareStringW 416->417 418 6dceb3-6dceba 416->418 420 6dced8-6dceed CompareStringW 417->420 421 6dced3-6dced6 417->421 419 6dcefa-6dcefe 418->419 424 6dcf00-6dcf19 call 7135af 419->424 425 6dcf42-6dcf5b call 7137bb 419->425 422 6dd1af-6dd1b7 420->422 423 6dcef3 420->423 421->419 427 6dd1bc-6dd1c5 call 71055b 422->427 423->419 435 6dcf1b-6dcf1f 424->435 436 6dcf21-6dcf23 424->436 432 6dcf5d-6dcf5f 425->432 433 6dcf65-6dcf7e call 7135af 425->433 427->394 432->433 437 6dd14e-6dd153 432->437 443 6dcf86-6dcf88 433->443 444 6dcf80-6dcf84 433->444 435->425 435->436 439 6dcf29-6dcf3c call 6dc1d4 436->439 440 6dd144-6dd149 436->440 437->402 439->425 446 6dd13a-6dd142 439->446 440->402 447 6dcf8e-6dcfa7 call 7135af 443->447 448 6dd1a8-6dd1ad 443->448 444->443 444->447 446->427 451 6dcfaf-6dcfb1 447->451 452 6dcfa9-6dcfad 447->452 448->402 453 6dcfb7-6dcfd0 call 7135af 451->453 454 6dd1a1-6dd1a6 451->454 452->451 452->453 457 6dcff2-6dd00b call 7135af 453->457 458 6dcfd2-6dcfd4 453->458 454->402 465 6dd00d-6dd00f 457->465 466 6dd02f-6dd048 call 7135af 457->466 459 6dcfda-6dcfec call 6d2b03 458->459 460 6dd162-6dd167 458->460 459->457 467 6dd158-6dd15d 459->467 460->402 468 6dd015-6dd029 call 6d2108 465->468 469 6dd170-6dd175 465->469 474 6dd06c-6dd081 call 7135af 466->474 475 6dd04a-6dd04c 466->475 467->402 468->466 479 6dd169-6dd16e 468->479 469->402 483 6dd19a-6dd19f 474->483 484 6dd087-6dd09b call 6d2108 474->484 476 6dd17e-6dd183 475->476 477 6dd052-6dd066 call 6d2108 475->477 476->402 477->474 485 6dd177-6dd17c 477->485 479->402 483->402 488 6dd0a1-6dd0ba call 7135af 484->488 489 6dd193-6dd198 484->489 485->402 492 6dd0dd-6dd0e2 488->492 493 6dd0bc-6dd0be 488->493 489->402 494 6dd0ee-6dd101 492->494 495 6dd0e4-6dd0ea 492->495 496 6dd18c-6dd191 493->496 497 6dd0c4-6dd0d7 call 6dbc01 493->497 494->389 494->393 495->494 496->402 497->492 501 6dd185-6dd18a 497->501 501->402
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,download,000000FF,00000000,Packaging,00000000,00000000,FilePath,0071B4B8,00000000,0071CB64,?,00000000), ref: 006DCEAC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCompareProcessString
                                  • String ID: Catalog$CertificateRootPublicKeyIdentifier$CertificateRootThumbprint$Container$DownloadUrl$Failed to allocate memory for payload structs.$Failed to find catalog.$Failed to get @Catalog.$Failed to get @CertificateRootPublicKeyIdentifier.$Failed to get @CertificateRootThumbprint.$Failed to get @Container.$Failed to get @DownloadUrl.$Failed to get @FilePath.$Failed to get @FileSize.$Failed to get @Hash.$Failed to get @Id.$Failed to get @LayoutOnly.$Failed to get @Packaging.$Failed to get @SourcePath.$Failed to get next node.$Failed to get payload node count.$Failed to hex decode @CertificateRootPublicKeyIdentifier.$Failed to hex decode @CertificateRootThumbprint.$Failed to hex decode the Payload/@Hash.$Failed to parse @FileSize.$Failed to select payload nodes.$Failed to to find container: %ls$FilePath$FileSize$Hash$Invalid value for @Packaging: %ls$LayoutOnly$Packaging$Payload$SourcePath$c:\agent\_work\79\s\src\burn\engine\payload.cpp$cabinet.dll$download$embedded$external$feclient.dll$msasn1.dll$msi.dll$version.dll$wininet.dll
                                  • API String ID: 1171520630-214904704
                                  • Opcode ID: 60cf5ae2820771582ffc8a918f5a313e6c5aff61a4ae0b2253b9c45c3bb02a38
                                  • Instruction ID: 8470fd330afcc3eb06cdb37ecbb25a6c56abbf7fa98800cb0da027a5ada06f44
                                  • Opcode Fuzzy Hash: 60cf5ae2820771582ffc8a918f5a313e6c5aff61a4ae0b2253b9c45c3bb02a38
                                  • Instruction Fuzzy Hash: 75C1A3B1D4062AFBCB11AA58CD05EEDBA6AEF00B20F104267F911B63D0D774EE95D690

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 502 6f0ae0-6f0af7 SetEvent 503 6f0b39-6f0b47 WaitForSingleObject 502->503 504 6f0af9-6f0b03 GetLastError 502->504 507 6f0b7e-6f0b89 ResetEvent 503->507 508 6f0b49-6f0b53 GetLastError 503->508 505 6f0b05-6f0b0e 504->505 506 6f0b10 504->506 505->506 509 6f0b17-6f0b27 call 6d38ba 506->509 510 6f0b12 506->510 511 6f0b8b-6f0b95 GetLastError 507->511 512 6f0bc3-6f0bc9 507->512 513 6f0b55-6f0b5e 508->513 514 6f0b60 508->514 531 6f0b2c-6f0b34 call 71055b 509->531 510->509 515 6f0b97-6f0ba0 511->515 516 6f0ba2 511->516 518 6f0bfc-6f0c15 call 6d22b5 512->518 519 6f0bcb-6f0bce 512->519 513->514 520 6f0b67-6f0b7c call 6d38ba 514->520 521 6f0b62 514->521 515->516 523 6f0ba9-6f0bbe call 6d38ba 516->523 524 6f0ba4 516->524 535 6f0c2d-6f0c38 SetEvent 518->535 536 6f0c17-6f0c28 call 71055b 518->536 526 6f0bf2-6f0bf7 519->526 527 6f0bd0-6f0bed call 6d38ba 519->527 520->531 521->520 523->531 524->523 534 6f0eb2-6f0eb7 526->534 546 6f0ea8-6f0eae call 71055b 527->546 531->534 537 6f0ebc-6f0ec2 534->537 538 6f0eb9 534->538 543 6f0c3a-6f0c44 GetLastError 535->543 544 6f0c72-6f0c80 WaitForSingleObject 535->544 554 6f0eaf-6f0eb1 536->554 538->537 548 6f0c46-6f0c4f 543->548 549 6f0c51 543->549 550 6f0cba-6f0cc5 ResetEvent 544->550 551 6f0c82-6f0c8c GetLastError 544->551 546->554 548->549 557 6f0c58-6f0c6d call 6d38ba 549->557 558 6f0c53 549->558 555 6f0cff-6f0d06 550->555 556 6f0cc7-6f0cd1 GetLastError 550->556 559 6f0c8e-6f0c97 551->559 560 6f0c99 551->560 554->534 566 6f0d08-6f0d0b 555->566 567 6f0d75-6f0d98 CreateFileW 555->567 563 6f0cde 556->563 564 6f0cd3-6f0cdc 556->564 583 6f0ea7 557->583 558->557 559->560 561 6f0c9b 560->561 562 6f0ca0-6f0cb5 call 6d38ba 560->562 561->562 562->583 569 6f0ce5-6f0cfa call 6d38ba 563->569 570 6f0ce0 563->570 564->563 574 6f0d0d-6f0d10 566->574 575 6f0d38-6f0d3c call 6d39df 566->575 572 6f0d9a-6f0da4 GetLastError 567->572 573 6f0dd5-6f0de9 SetFilePointerEx 567->573 569->583 570->569 584 6f0da6-6f0daf 572->584 585 6f0db1 572->585 579 6f0deb-6f0df5 GetLastError 573->579 580 6f0e23-6f0e2e SetEndOfFile 573->580 576 6f0d12-6f0d15 574->576 577 6f0d31-6f0d33 574->577 592 6f0d41-6f0d46 575->592 588 6f0d27-6f0d2c 576->588 589 6f0d17-6f0d1d 576->589 577->534 590 6f0df7-6f0e00 579->590 591 6f0e02 579->591 594 6f0e65-6f0e72 SetFilePointerEx 580->594 595 6f0e30-6f0e3a GetLastError 580->595 583->546 584->585 586 6f0db8-6f0dcb call 6d38ba 585->586 587 6f0db3 585->587 586->573 587->586 588->554 589->588 590->591 600 6f0e09-6f0e1e call 6d38ba 591->600 601 6f0e04 591->601 598 6f0d48-6f0d62 call 6d38ba 592->598 599 6f0d67-6f0d70 592->599 594->554 597 6f0e74-6f0e7e GetLastError 594->597 602 6f0e3c-6f0e45 595->602 603 6f0e47 595->603 607 6f0e8b 597->607 608 6f0e80-6f0e89 597->608 598->583 599->554 600->583 601->600 602->603 604 6f0e4e-6f0e63 call 6d38ba 603->604 605 6f0e49 603->605 604->583 605->604 612 6f0e8d 607->612 613 6f0e92-6f0ea2 call 6d38ba 607->613 608->607 612->613 613->583
                                  APIs
                                  • SetEvent.KERNEL32(?,?,?,?,?,006F0690,?,?), ref: 006F0AEF
                                  • GetLastError.KERNEL32(?,?,?,?,006F0690,?,?), ref: 006F0AF9
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,006F0690,?,?), ref: 006F0B3E
                                  • GetLastError.KERNEL32(?,?,?,?,006F0690,?,?), ref: 006F0B49
                                  • ResetEvent.KERNEL32(?,?,?,?,?,006F0690,?,?), ref: 006F0B81
                                  • GetLastError.KERNEL32(?,?,?,?,006F0690,?,?), ref: 006F0B8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Event$ObjectResetSingleWait
                                  • String ID: Failed to allocate buffer for stream.$Failed to copy stream name: %ls$Failed to create file: %ls$Failed to reset begin operation event.$Failed to set end of file.$Failed to set file pointer to beginning of file.$Failed to set file pointer to end of file.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 1865021742-2724965156
                                  • Opcode ID: 1fed2d93a03d10c6f7b79ac6732cee18085cad801ebfa0b8434d77216f03ae7c
                                  • Instruction ID: 3deb1ef81203910a627069a653425886704b470989f97c1d6fd12203f7dd8289
                                  • Opcode Fuzzy Hash: 1fed2d93a03d10c6f7b79ac6732cee18085cad801ebfa0b8434d77216f03ae7c
                                  • Instruction Fuzzy Hash: 96911177A8063ABBF33116A85D0ABBA2912BF04B21F124214FF50BE7D2D36DEC0085D5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 619 6d4d7a-6d4dc2 call 6ff620 call 6d34c4 624 6d4dc4-6d4dd1 call 71055b 619->624 625 6d4dd6-6d4de0 call 6e97ea 619->625 630 6d4f72-6d4f7c 624->630 631 6d4de9-6d4df8 call 6e97f0 625->631 632 6d4de2-6d4de7 625->632 633 6d4f7e-6d4f83 CloseHandle 630->633 634 6d4f87-6d4f8b 630->634 637 6d4dfd-6d4e01 631->637 635 6d4e1e-6d4e39 call 6d2022 632->635 633->634 639 6d4f8d-6d4f92 CloseHandle 634->639 640 6d4f96-6d4f9a 634->640 649 6d4e3b-6d4e40 635->649 650 6d4e42-6d4e56 call 6e6952 635->650 641 6d4e18-6d4e1b 637->641 642 6d4e03 637->642 639->640 643 6d4f9c-6d4fa1 CloseHandle 640->643 644 6d4fa5-6d4fa7 640->644 641->635 646 6d4e08-6d4e13 call 71055b 642->646 643->644 647 6d4fac-6d4fc0 call 6d287d * 2 644->647 648 6d4fa9-6d4faa CloseHandle 644->648 646->630 664 6d4fca-6d4fce 647->664 665 6d4fc2-6d4fc5 call 6d2762 647->665 648->647 649->646 658 6d4e58 650->658 659 6d4e70-6d4e84 call 6e6a0c 650->659 662 6d4e5d 658->662 668 6d4e8d-6d4ea8 call 6d2064 659->668 669 6d4e86-6d4e8b 659->669 666 6d4e62-6d4e6b call 71055b 662->666 671 6d4fd8-6d4fde 664->671 672 6d4fd0-6d4fd3 call 6d2762 664->672 665->664 676 6d4f6f 666->676 678 6d4eaa-6d4eaf 668->678 679 6d4eb4-6d4ecd call 6d2064 668->679 669->662 672->671 676->630 678->646 682 6d4ecf-6d4ed4 679->682 683 6d4ed9-6d4f05 CreateProcessW 679->683 682->646 684 6d4f07-6d4f11 GetLastError 683->684 685 6d4f42-6d4f61 call 710d3e 683->685 686 6d4f1e 684->686 687 6d4f13-6d4f1c 684->687 685->630 693 6d4f63-6d4f6a call 71055b 685->693 689 6d4f25-6d4f3d call 6d38ba 686->689 690 6d4f20 686->690 687->686 689->666 690->689 693->676
                                  APIs
                                    • Part of subcall function 006D34C4: GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000104,?,?,?,?,006D10DD,?,00000000), ref: 006D34E5
                                  • CloseHandle.KERNEL32(00000000,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 006D4F81
                                  • CloseHandle.KERNEL32(000000FF,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 006D4F90
                                  • CloseHandle.KERNEL32(000000FF,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 006D4F9F
                                  • CloseHandle.KERNEL32(?,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 006D4FAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle$FileModuleName
                                  • String ID: "%ls" %ls$%ls %ls$-%ls="%ls"$D$Failed to allocate full command-line.$Failed to allocate parameters for unelevated process.$Failed to append %ls$Failed to append original command line.$Failed to cache to clean room.$Failed to get path for current process.$Failed to launch clean room process: %ls$Failed to wait for clean room process: %ls$burn.clean.room$burn.filehandle.attached$burn.filehandle.self$c:\agent\_work\79\s\src\burn\engine\engine.cpp$Tm$Tm
                                  • API String ID: 3884789274-2779114772
                                  • Opcode ID: 19c029bb4a51c781a182f12c36eddd7655017f9ae26be59c42b93a15442855d1
                                  • Instruction ID: d0bc266e543896df889a9df2773f9bc9ee525806537e0618237e0f65ee78f74f
                                  • Opcode Fuzzy Hash: 19c029bb4a51c781a182f12c36eddd7655017f9ae26be59c42b93a15442855d1
                                  • Instruction Fuzzy Hash: 87717272D00229BBCB219BA8CC45DEFBB7AAF44720F114156FA10B7391DB749E418BE0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 949 6e7430-6e7475 call 6ff620 call 6d762d 954 6e7477-6e747c 949->954 955 6e7481-6e7492 call 6dc3ca 949->955 956 6e771a-6e7721 call 71055b 954->956 960 6e749e-6e74af call 6dc231 955->960 961 6e7494-6e7499 955->961 964 6e7722-6e7727 956->964 970 6e74bb-6e74d0 call 6dc489 960->970 971 6e74b1-6e74b6 960->971 961->956 966 6e772f-6e7733 964->966 967 6e7729-6e772a call 6d2762 964->967 968 6e773d-6e7742 966->968 969 6e7735-6e7738 call 6d2762 966->969 967->966 974 6e774a-6e7757 call 6dc180 968->974 975 6e7744-6e7745 call 6d2762 968->975 969->968 981 6e74dc-6e74ec call 6fbd12 970->981 982 6e74d2-6e74d7 970->982 971->956 983 6e7759-6e775c call 6d2762 974->983 984 6e7761-6e7765 974->984 975->974 990 6e74ee-6e74f3 981->990 991 6e74f8-6e756b call 6e5bab 981->991 982->956 983->984 988 6e776f-6e7773 984->988 989 6e7767-6e776a call 6d2762 984->989 993 6e777d-6e7783 988->993 994 6e7775-6e7778 call 6d3aa4 988->994 989->988 990->956 998 6e756d-6e7572 991->998 999 6e7577-6e757c 991->999 994->993 998->956 1000 6e757e 999->1000 1001 6e7583-6e75ba call 6d563d GetCurrentProcess call 710b93 call 6d8274 999->1001 1000->1001 1008 6e75bc 1001->1008 1009 6e75d4-6e75eb call 6d8274 1001->1009 1010 6e75c1-6e75cf call 71055b 1008->1010 1014 6e75ed-6e75f2 1009->1014 1015 6e75f4-6e75f9 1009->1015 1010->964 1014->1010 1017 6e75fb-6e760d call 6d821a 1015->1017 1018 6e7655-6e765a 1015->1018 1028 6e760f-6e7614 1017->1028 1029 6e7619-6e7629 call 6d3533 1017->1029 1019 6e765c-6e766e call 6d821a 1018->1019 1020 6e767a-6e7683 1018->1020 1019->1020 1031 6e7670-6e7675 1019->1031 1023 6e768f-6e769a call 6ea408 1020->1023 1024 6e7685-6e7688 1020->1024 1034 6e769f-6e76a3 1023->1034 1024->1023 1027 6e768a-6e768d 1024->1027 1027->1023 1032 6e76b2-6e76b5 1027->1032 1028->956 1040 6e762b-6e7630 1029->1040 1041 6e7635-6e7649 call 6d821a 1029->1041 1031->956 1038 6e76bc-6e76d2 call 6dd54c 1032->1038 1039 6e76b7-6e76ba 1032->1039 1036 6e76ac 1034->1036 1037 6e76a5-6e76aa 1034->1037 1036->1032 1037->956 1045 6e76db-6e76f3 call 6dcb82 1038->1045 1046 6e76d4-6e76d9 1038->1046 1039->964 1039->1038 1040->956 1041->1018 1049 6e764b-6e7650 1041->1049 1051 6e76fc-6e7713 call 6dc8a5 1045->1051 1052 6e76f5-6e76fa 1045->1052 1046->956 1049->956 1051->964 1055 6e7715 1051->1055 1052->956 1055->956
                                  Strings
                                  • Failed to open manifest stream., xrefs: 006E74B1
                                  • Failed to extract bootstrapper application payloads., xrefs: 006E76F5
                                  • Failed to get manifest stream from container., xrefs: 006E74D2
                                  • WixBundleElevated, xrefs: 006E75AB, 006E75BC
                                  • Failed to parse command line., xrefs: 006E756D
                                  • WixBundleSourceProcessFolder, xrefs: 006E763A
                                  • Failed to set source process folder variable., xrefs: 006E764B
                                  • Failed to load catalog files., xrefs: 006E7715
                                  • Failed to initialize internal cache functionality., xrefs: 006E76A5
                                  • Failed to open attached UX container., xrefs: 006E7494
                                  • Failed to set source process path variable., xrefs: 006E760F
                                  • WixBundleUILevel, xrefs: 006E75DC, 006E75ED
                                  • WixBundleOriginalSource, xrefs: 006E765F
                                  • Failed to get unique temporary folder for bootstrapper application., xrefs: 006E76D4
                                  • Failed to initialize variables., xrefs: 006E7477
                                  • Failed to get source process folder from path., xrefs: 006E762B
                                  • Failed to overwrite the %ls built-in variable., xrefs: 006E75C1
                                  • Failed to load manifest., xrefs: 006E74EE
                                  • Failed to set original source variable., xrefs: 006E7670
                                  • WixBundleSourceProcessPath, xrefs: 006E75FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalInitializeSection
                                  • String ID: Failed to extract bootstrapper application payloads.$Failed to get manifest stream from container.$Failed to get source process folder from path.$Failed to get unique temporary folder for bootstrapper application.$Failed to initialize internal cache functionality.$Failed to initialize variables.$Failed to load catalog files.$Failed to load manifest.$Failed to open attached UX container.$Failed to open manifest stream.$Failed to overwrite the %ls built-in variable.$Failed to parse command line.$Failed to set original source variable.$Failed to set source process folder variable.$Failed to set source process path variable.$WixBundleElevated$WixBundleOriginalSource$WixBundleSourceProcessFolder$WixBundleSourceProcessPath$WixBundleUILevel
                                  • API String ID: 32694325-1564579409
                                  • Opcode ID: 0772692353aaead6c1b3978322e963ffba4a1a684b6e68041e141ef107c71023
                                  • Instruction ID: e6e9e7d2d46da260f755498271809593ea5226632a4c42aca2dc3dd967014c11
                                  • Opcode Fuzzy Hash: 0772692353aaead6c1b3978322e963ffba4a1a684b6e68041e141ef107c71023
                                  • Instruction Fuzzy Hash: BFA1A6B2E45B6ABADF12DAB5CC41EEEB76EBB14700F010226F501E7241D774EA448BD4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1056 6e85c4-6e8612 CreateFileW 1057 6e8658-6e8668 call 714b80 1056->1057 1058 6e8614-6e861e GetLastError 1056->1058 1066 6e866a-6e867b call 71055b 1057->1066 1067 6e8680-6e8694 call 71415b 1057->1067 1060 6e862b 1058->1060 1061 6e8620-6e8629 1058->1061 1062 6e862d 1060->1062 1063 6e8632-6e8653 call 6d38ba call 71055b 1060->1063 1061->1060 1062->1063 1080 6e87fc-6e880c call 6fdd3f 1063->1080 1075 6e87f5-6e87f6 CloseHandle 1066->1075 1076 6e86af-6e86b4 1067->1076 1077 6e8696-6e86aa call 71055b 1067->1077 1075->1080 1076->1075 1079 6e86ba-6e86c9 SetFilePointerEx 1076->1079 1077->1075 1082 6e86cb-6e86d5 GetLastError 1079->1082 1083 6e8703-6e8713 call 7150a2 1079->1083 1085 6e86d7-6e86e0 1082->1085 1086 6e86e2 1082->1086 1093 6e871f-6e8730 SetFilePointerEx 1083->1093 1094 6e8715-6e871a 1083->1094 1085->1086 1089 6e86e9-6e86fe call 6d38ba 1086->1089 1090 6e86e4 1086->1090 1098 6e87ed-6e87f4 call 71055b 1089->1098 1090->1089 1095 6e876a-6e877a call 7150a2 1093->1095 1096 6e8732-6e873c GetLastError 1093->1096 1094->1098 1095->1094 1108 6e877c-6e878c call 7150a2 1095->1108 1099 6e873e-6e8747 1096->1099 1100 6e8749 1096->1100 1098->1075 1099->1100 1103 6e874b 1100->1103 1104 6e8750-6e8765 call 6d38ba 1100->1104 1103->1104 1104->1098 1108->1094 1112 6e878e-6e879f SetFilePointerEx 1108->1112 1113 6e87d6-6e87dd call 7150a2 1112->1113 1114 6e87a1-6e87ab GetLastError 1112->1114 1120 6e87e2-6e87e6 1113->1120 1116 6e87ad-6e87b6 1114->1116 1117 6e87b8 1114->1117 1116->1117 1118 6e87bf-6e87d4 call 6d38ba 1117->1118 1119 6e87ba 1117->1119 1118->1098 1119->1118 1120->1075 1122 6e87e8 1120->1122 1122->1098
                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,40000000,00000005,00000000,00000002,08000080,00000000,?,00000000,00000000,006D4DFD,?,?,00000000,006D4DFD,00000000), ref: 006E8607
                                  • GetLastError.KERNEL32 ref: 006E8614
                                    • Part of subcall function 0071415B: ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 007141F1
                                  • SetFilePointerEx.KERNELBASE(00000000,0071B4B8,00000000,00000000,00000000,?,00000000,0071B500,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006E86C1
                                  • GetLastError.KERNEL32 ref: 006E86CB
                                  • CloseHandle.KERNELBASE(00000000,?,00000000,0071B500,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006E87F6
                                  Strings
                                  • Failed to copy engine from: %ls to: %ls, xrefs: 006E869C
                                  • Failed to seek to original data in exe burn section header., xrefs: 006E87CF
                                  • Failed to seek to beginning of engine file: %ls, xrefs: 006E866D
                                  • Failed to update signature offset., xrefs: 006E8715
                                  • Failed to create engine file at path: %ls, xrefs: 006E8645
                                  • Failed to seek to signature table in exe header., xrefs: 006E8760
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E8638, 006E86EF, 006E8756, 006E87C5
                                  • cabinet.dll, xrefs: 006E876F
                                  • Failed to zero out original data offset., xrefs: 006E87E8
                                  • msi.dll, xrefs: 006E8708
                                  • Failed to seek to checksum in exe header., xrefs: 006E86F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: File$ErrorLast$CloseCreateHandlePointerRead
                                  • String ID: Failed to copy engine from: %ls to: %ls$Failed to create engine file at path: %ls$Failed to seek to beginning of engine file: %ls$Failed to seek to checksum in exe header.$Failed to seek to original data in exe burn section header.$Failed to seek to signature table in exe header.$Failed to update signature offset.$Failed to zero out original data offset.$c:\agent\_work\79\s\src\burn\engine\cache.cpp$cabinet.dll$msi.dll
                                  • API String ID: 3456208997-3624690521
                                  • Opcode ID: 6f076211c93681c1a03bf2fa7d45e26e56c03d7b3c8c7ccf167b09f3d2610b54
                                  • Instruction ID: 35e63b5dd11fdd3b199df81a63c4147fa678077146be0f92027eec86809636a4
                                  • Opcode Fuzzy Hash: 6f076211c93681c1a03bf2fa7d45e26e56c03d7b3c8c7ccf167b09f3d2610b54
                                  • Instruction Fuzzy Hash: 6851EA73D42775BFEB1157A99C46FFF266AAB04B10F114119FE04FB280EB689C4086E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1124 6d762d-6d7ee0 InitializeCriticalSection 1125 6d7ee3-6d7f07 call 6d565e 1124->1125 1128 6d7f09-6d7f10 1125->1128 1129 6d7f14-6d7f25 call 71055b 1125->1129 1128->1125 1130 6d7f12 1128->1130 1132 6d7f28-6d7f38 call 6fdd3f 1129->1132 1130->1132
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(006E7471,006D53FA,00000000,006D5482), ref: 006D764D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalInitializeSection
                                  • String ID: #$$$'$0$Date$Failed to add built-in variable: %ls.$InstallerName$InstallerVersion$LogonUser$WixBundleAction$WixBundleActiveParent$WixBundleElevated$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$WixBundleForcedRestartPackage$WixBundleInstalled$WixBundleProviderKey$WixBundleSourceProcessFolder$WixBundleSourceProcessPath$WixBundleTag$WixBundleUILevel$WixBundleVersion
                                  • API String ID: 32694325-3635313340
                                  • Opcode ID: 0afc8a96a4cecd7dc9decd2dc2819cb6c5ef58da8e72ff071ae23a72ed5c9693
                                  • Instruction ID: 60fb6caaad8ed3dfddb086180a6edab044fc459d15ed0cf57d15aea378d1eee5
                                  • Opcode Fuzzy Hash: 0afc8a96a4cecd7dc9decd2dc2819cb6c5ef58da8e72ff071ae23a72ed5c9693
                                  • Instruction Fuzzy Hash: 553249B0D516699BDB66CF9AC9883DDFAB5BB48304F5081EED20CB6250C7B41BC88F45

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1136 6e81b2-6e81fb call 6ff620 1139 6e8374-6e8381 call 6d229e 1136->1139 1140 6e8201-6e820f GetCurrentProcess call 710b93 1136->1140 1145 6e8383 1139->1145 1146 6e8390-6e83a0 call 6fdd3f 1139->1146 1143 6e8214-6e8221 1140->1143 1147 6e82af-6e82bd GetTempPathW 1143->1147 1148 6e8227-6e8236 GetWindowsDirectoryW 1143->1148 1149 6e8388-6e838f call 71055b 1145->1149 1151 6e82bf-6e82c9 GetLastError 1147->1151 1152 6e82f7-6e8309 UuidCreate 1147->1152 1153 6e8238-6e8242 GetLastError 1148->1153 1154 6e8270-6e8281 call 6d347e 1148->1154 1149->1146 1160 6e82cb-6e82d4 1151->1160 1161 6e82d6 1151->1161 1156 6e830b-6e8310 1152->1156 1157 6e8312-6e8327 StringFromGUID2 1152->1157 1162 6e824f 1153->1162 1163 6e8244-6e824d 1153->1163 1174 6e828d-6e82a3 call 6d379b 1154->1174 1175 6e8283-6e8288 1154->1175 1156->1149 1166 6e8329-6e8343 call 6d38ba 1157->1166 1167 6e8345-6e8366 call 6d2022 1157->1167 1160->1161 1168 6e82dd-6e82f2 call 6d38ba 1161->1168 1169 6e82d8 1161->1169 1170 6e8256-6e826b call 6d38ba 1162->1170 1171 6e8251 1162->1171 1163->1162 1166->1149 1184 6e836f 1167->1184 1185 6e8368-6e836d 1167->1185 1168->1149 1169->1168 1170->1149 1171->1170 1174->1152 1186 6e82a5-6e82aa 1174->1186 1175->1149 1184->1139 1185->1149 1186->1149
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,006D54C6), ref: 006E8208
                                    • Part of subcall function 00710B93: OpenProcessToken.ADVAPI32(?,00000008,?,006D53FA,00000000,?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710BB1
                                    • Part of subcall function 00710B93: GetLastError.KERNEL32(?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710BBB
                                    • Part of subcall function 00710B93: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710C45
                                  • GetWindowsDirectoryW.KERNEL32(?,00000104,00000000), ref: 006E822E
                                  • GetLastError.KERNEL32 ref: 006E8238
                                  • GetTempPathW.KERNEL32(00000104,?,00000000), ref: 006E82B5
                                  • GetLastError.KERNEL32 ref: 006E82BF
                                  • UuidCreate.RPCRT4(?), ref: 006E82FE
                                  Strings
                                  • Failed to get windows path for working folder., xrefs: 006E8266
                                  • Failed to convert working folder guid into string., xrefs: 006E833E
                                  • Failed to append bundle id on to temp path for working folder., xrefs: 006E8368
                                  • Failed to ensure windows path for working folder ended in backslash., xrefs: 006E8283
                                  • Failed to get temp path for working folder., xrefs: 006E82ED
                                  • Failed to create working folder guid., xrefs: 006E830B
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E825C, 006E82E3, 006E8334
                                  • %ls%ls\, xrefs: 006E8350
                                  • Failed to concat Temp directory on windows path for working folder., xrefs: 006E82A5
                                  • Temp\, xrefs: 006E828D
                                  • Failed to copy working folder path., xrefs: 006E8383
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Process$CloseCreateCurrentDirectoryHandleOpenPathTempTokenUuidWindows
                                  • String ID: %ls%ls\$Failed to append bundle id on to temp path for working folder.$Failed to concat Temp directory on windows path for working folder.$Failed to convert working folder guid into string.$Failed to copy working folder path.$Failed to create working folder guid.$Failed to ensure windows path for working folder ended in backslash.$Failed to get temp path for working folder.$Failed to get windows path for working folder.$Temp\$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 266130487-3370790371
                                  • Opcode ID: 896e32e77f04a78a4d8a1f85f3d7d8fb071600c1e1c237c164744081ab2000f2
                                  • Instruction ID: ca0a1f03269d3b2bd015de3b937b5aabe0a6f7bff418b1e7e8a91bc400e0de30
                                  • Opcode Fuzzy Hash: 896e32e77f04a78a4d8a1f85f3d7d8fb071600c1e1c237c164744081ab2000f2
                                  • Instruction Fuzzy Hash: 77412CB2E42778AFD72096E59C0AFDB72A96F10B11F004156FA08F7280EF789E4486D5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1187 6f0ec5-6f0ef1 CoInitializeEx 1188 6f0f05-6f0f50 call 70f792 1187->1188 1189 6f0ef3-6f0f00 call 71055b 1187->1189 1195 6f0f7a-6f0f9c call 70f7b3 1188->1195 1196 6f0f52-6f0f75 call 6d38ba call 71055b 1188->1196 1194 6f1168-6f1178 call 6fdd3f 1189->1194 1204 6f1056-6f1061 SetEvent 1195->1204 1205 6f0fa2-6f0faa 1195->1205 1215 6f1161-6f1162 CoUninitialize 1196->1215 1206 6f1063-6f106d GetLastError 1204->1206 1207 6f10a0-6f10ae WaitForSingleObject 1204->1207 1209 6f1159-6f115c call 70f7c3 1205->1209 1210 6f0fb0-6f0fb6 1205->1210 1213 6f106f-6f1078 1206->1213 1214 6f107a 1206->1214 1211 6f10e2-6f10ed ResetEvent 1207->1211 1212 6f10b0-6f10ba GetLastError 1207->1212 1209->1215 1210->1209 1217 6f0fbc-6f0fc4 1210->1217 1222 6f10ef-6f10f9 GetLastError 1211->1222 1223 6f1124-6f112a 1211->1223 1220 6f10bc-6f10c5 1212->1220 1221 6f10c7 1212->1221 1213->1214 1224 6f107e-6f108e call 6d38ba 1214->1224 1225 6f107c 1214->1225 1215->1194 1218 6f103e-6f1051 call 71055b 1217->1218 1219 6f0fc6-6f0fc8 1217->1219 1218->1209 1226 6f0fdb-6f0fde 1219->1226 1227 6f0fca 1219->1227 1220->1221 1231 6f10cb-6f10e0 call 6d38ba 1221->1231 1232 6f10c9 1221->1232 1233 6f10fb-6f1104 1222->1233 1234 6f1106 1222->1234 1228 6f112c-6f112f 1223->1228 1229 6f1154 1223->1229 1263 6f1093-6f109b call 71055b 1224->1263 1225->1224 1240 6f1038 1226->1240 1241 6f0fe0 1226->1241 1236 6f0fcc-6f0fce 1227->1236 1237 6f0fd0-6f0fd9 1227->1237 1238 6f1131-6f114b call 6d38ba 1228->1238 1239 6f1150-6f1152 1228->1239 1229->1209 1231->1263 1232->1231 1233->1234 1244 6f110a-6f111f call 6d38ba 1234->1244 1245 6f1108 1234->1245 1248 6f103a-6f103c 1236->1248 1237->1248 1238->1263 1239->1209 1240->1248 1250 6f101f-6f1024 1241->1250 1251 6f0fee-6f0ff3 1241->1251 1252 6f102d-6f1032 1241->1252 1253 6f0ffc-6f1001 1241->1253 1254 6f100a-6f100f 1241->1254 1255 6f1018-6f101d 1241->1255 1256 6f0fe7-6f0fec 1241->1256 1257 6f1026-6f102b 1241->1257 1258 6f0ff5-6f0ffa 1241->1258 1259 6f1034-6f1036 1241->1259 1260 6f1003-6f1008 1241->1260 1261 6f1011-6f1016 1241->1261 1244->1263 1245->1244 1248->1204 1248->1218 1250->1218 1251->1218 1252->1218 1253->1218 1254->1218 1255->1218 1256->1218 1257->1218 1258->1218 1259->1218 1260->1218 1261->1218 1263->1209
                                  APIs
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 006F0EE7
                                  • CoUninitialize.COMBASE ref: 006F1162
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: InitializeUninitialize
                                  • String ID: <the>.cab$Failed to extract all files from container, erf: %d:%X:%d$Failed to initialize COM.$Failed to initialize cabinet.dll.$Failed to reset begin operation event.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 3442037557-4128139206
                                  • Opcode ID: 49295924065bbd9fb77a4407a495aebfcce51233be813ab9c4858bbec143cce8
                                  • Instruction ID: 8c541c3aacb3c130a9f1f1e7fcb1dae892d41222ab90c3fd8994682495232113
                                  • Opcode Fuzzy Hash: 49295924065bbd9fb77a4407a495aebfcce51233be813ab9c4858bbec143cce8
                                  • Instruction Fuzzy Hash: 48515B77E4027EE7933056584C06EBB26539B02BE0B12432AFF11BF385DE6D8C4296D6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1268 6d4326-6d437d InitializeCriticalSection * 2 call 6e4c86 * 2 1273 6d44a1-6d44ab call 6db45a 1268->1273 1274 6d4383 1268->1274 1279 6d44b0-6d44b4 1273->1279 1275 6d4389-6d4396 1274->1275 1277 6d439c-6d43c8 lstrlenW * 2 CompareStringW 1275->1277 1278 6d4494-6d449b 1275->1278 1280 6d441a-6d4446 lstrlenW * 2 CompareStringW 1277->1280 1281 6d43ca-6d43ed lstrlenW 1277->1281 1278->1273 1278->1275 1282 6d44b6-6d44c2 call 71055b 1279->1282 1283 6d44c3-6d44c9 1279->1283 1280->1278 1287 6d4448-6d446b lstrlenW 1280->1287 1284 6d44d7-6d44ec call 6d38ba 1281->1284 1285 6d43f3-6d43f8 1281->1285 1282->1283 1299 6d44f1-6d44f8 1284->1299 1285->1284 1288 6d43fe-6d440e call 6d2abf 1285->1288 1291 6d4471-6d4476 1287->1291 1292 6d4503-6d451d call 6d38ba 1287->1292 1301 6d44cc-6d44d5 1288->1301 1302 6d4414 1288->1302 1291->1292 1296 6d447c-6d448c call 6d2abf 1291->1296 1292->1299 1296->1301 1306 6d448e 1296->1306 1303 6d44f9-6d4501 call 71055b 1299->1303 1301->1303 1302->1280 1303->1283 1306->1278
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,?,?,006D52A3,?,?,00000000,?,?), ref: 006D4352
                                  • InitializeCriticalSection.KERNEL32(000000D0,?,?,006D52A3,?,?,00000000,?,?), ref: 006D435B
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,000004B8,000004A0,?,?,006D52A3,?,?,00000000,?,?), ref: 006D43A1
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,burn.filehandle.attached,00000000,?,?,006D52A3,?,?,00000000,?,?), ref: 006D43AB
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,00000000,?,?,006D52A3,?,?,00000000,?,?), ref: 006D43BF
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,?,?,006D52A3,?,?,00000000,?,?), ref: 006D43CF
                                  • lstrlenW.KERNEL32(burn.filehandle.self,?,?,006D52A3,?,?,00000000,?,?), ref: 006D441F
                                  • lstrlenW.KERNEL32(burn.filehandle.self,burn.filehandle.self,00000000,?,?,006D52A3,?,?,00000000,?,?), ref: 006D4429
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,00000000,?,?,006D52A3,?,?,00000000,?,?), ref: 006D443D
                                  • lstrlenW.KERNEL32(burn.filehandle.self,?,?,006D52A3,?,?,00000000,?,?), ref: 006D444D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: lstrlen$CompareCriticalInitializeSectionString
                                  • String ID: Failed to initialize engine section.$Failed to parse file handle: '%ls'$Missing required parameter for switch: %ls$burn.filehandle.attached$burn.filehandle.self$c:\agent\_work\79\s\src\burn\engine\engine.cpp
                                  • API String ID: 3039292287-348208256
                                  • Opcode ID: cbf927a2e6e98445ef2d12bd63c6e05d1172a704394929ae09fc770433380cd7
                                  • Instruction ID: fa05b07297225ee4914a94582b804d5ab58af3990746cc56e02544fb5e498d52
                                  • Opcode Fuzzy Hash: cbf927a2e6e98445ef2d12bd63c6e05d1172a704394929ae09fc770433380cd7
                                  • Instruction Fuzzy Hash: 4B5180B1E40215BFC7249B68DC46F9A77AAEB44720F10411AF618DB390DB74AD90CAA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1308 6dc252-6dc284 1309 6dc2ee-6dc30a GetCurrentProcess * 2 DuplicateHandle 1308->1309 1310 6dc286-6dc2a4 CreateFileW 1308->1310 1311 6dc30c-6dc316 GetLastError 1309->1311 1312 6dc344 1309->1312 1313 6dc2aa-6dc2b4 GetLastError 1310->1313 1314 6dc346-6dc34c 1310->1314 1319 6dc318-6dc321 1311->1319 1320 6dc323 1311->1320 1312->1314 1315 6dc2b6-6dc2bf 1313->1315 1316 6dc2c1 1313->1316 1317 6dc34e-6dc354 1314->1317 1318 6dc356 1314->1318 1315->1316 1321 6dc2c8-6dc2db call 6d38ba 1316->1321 1322 6dc2c3 1316->1322 1323 6dc358-6dc366 SetFilePointerEx 1317->1323 1318->1323 1319->1320 1324 6dc32a-6dc342 call 6d38ba 1320->1324 1325 6dc325 1320->1325 1336 6dc2e0-6dc2e9 call 71055b 1321->1336 1322->1321 1327 6dc39d-6dc3a3 1323->1327 1328 6dc368-6dc372 GetLastError 1323->1328 1324->1336 1325->1324 1334 6dc3a5-6dc3a9 call 6f1508 1327->1334 1335 6dc3c1-6dc3c7 1327->1335 1332 6dc37f 1328->1332 1333 6dc374-6dc37d 1328->1333 1337 6dc386-6dc39b call 6d38ba 1332->1337 1338 6dc381 1332->1338 1333->1332 1340 6dc3ae-6dc3b2 1334->1340 1336->1335 1346 6dc3b9-6dc3c0 call 71055b 1337->1346 1338->1337 1340->1335 1343 6dc3b4 1340->1343 1343->1346 1346->1335
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,08000080,00000000,?,00000000,00000000,BTm,006DC442,BTm,?,?,006D5482), ref: 006DC299
                                  • GetLastError.KERNEL32 ref: 006DC2AA
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002,?,00000000,00000000,BTm,006DC442,BTm,?,?,006D5482,006D5482,00000000,?), ref: 006DC2F9
                                  • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 006DC2FF
                                  • DuplicateHandle.KERNELBASE(00000000), ref: 006DC302
                                  • GetLastError.KERNEL32 ref: 006DC30C
                                  • SetFilePointerEx.KERNELBASE(?,00000000,00000000,00000000,00000000), ref: 006DC35E
                                  • GetLastError.KERNEL32 ref: 006DC368
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CurrentFileProcess$CreateDuplicateHandlePointer
                                  • String ID: BTm$Failed to duplicate handle to container: %ls$Failed to move file pointer to container offset.$Failed to open container.$Failed to open file: %ls$c:\agent\_work\79\s\src\burn\engine\container.cpp$crypt32.dll$feclient.dll
                                  • API String ID: 2619879409-786298395
                                  • Opcode ID: 8bf5c8141be30476feb3641f15987e25fdb633218ee1099818a0bd2291b3c477
                                  • Instruction ID: 3e7ed178b4d1afe682070ebbedbfd9cb96a6d3d53174badfc99138d8a343cdb6
                                  • Opcode Fuzzy Hash: 8bf5c8141be30476feb3641f15987e25fdb633218ee1099818a0bd2291b3c477
                                  • Instruction Fuzzy Hash: 0541E77654021AABD7209F5D9D49E9B3BB7ABC5730B22C01AFD14EB381E735D801DBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1349 712dba-712dda call 6d38d1 1352 712de0-712dee call 714cdb 1349->1352 1353 712ee4-712ee8 1349->1353 1357 712df3-712e12 GetProcAddress 1352->1357 1355 712ef2-712ef6 1353->1355 1356 712eea-712eed call 6d2762 1353->1356 1356->1355 1359 712e14 1357->1359 1360 712e19-712e32 GetProcAddress 1357->1360 1359->1360 1361 712e34 1360->1361 1362 712e39-712e52 GetProcAddress 1360->1362 1361->1362 1363 712e54 1362->1363 1364 712e59-712e72 GetProcAddress 1362->1364 1363->1364 1365 712e74 1364->1365 1366 712e79-712e92 GetProcAddress 1364->1366 1365->1366 1367 712e94 1366->1367 1368 712e99-712eb2 GetProcAddress 1366->1368 1367->1368 1369 712eb4 1368->1369 1370 712eb9-712ed3 GetProcAddress 1368->1370 1369->1370 1371 712ed5 1370->1371 1372 712eda 1370->1372 1371->1372 1372->1353
                                  APIs
                                    • Part of subcall function 006D38D1: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 006D3910
                                    • Part of subcall function 006D38D1: GetLastError.KERNEL32 ref: 006D391A
                                    • Part of subcall function 00714CDB: GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000001), ref: 00714D0C
                                  • GetProcAddress.KERNEL32(MsiDeterminePatchSequenceW,00000000), ref: 00712E04
                                  • GetProcAddress.KERNEL32(MsiDetermineApplicablePatchesW), ref: 00712E24
                                  • GetProcAddress.KERNEL32(MsiEnumProductsExW), ref: 00712E44
                                  • GetProcAddress.KERNEL32(MsiGetPatchInfoExW), ref: 00712E64
                                  • GetProcAddress.KERNEL32(MsiGetProductInfoExW), ref: 00712E84
                                  • GetProcAddress.KERNEL32(MsiSetExternalUIRecord), ref: 00712EA4
                                  • GetProcAddress.KERNEL32(MsiSourceListAddSourceExW), ref: 00712EC4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLast$DirectorySystem
                                  • String ID: Msi.dll$MsiDetermineApplicablePatchesW$MsiDeterminePatchSequenceW$MsiEnumProductsExW$MsiGetPatchInfoExW$MsiGetProductInfoExW$MsiSetExternalUIRecord$MsiSourceListAddSourceExW
                                  • API String ID: 2510051996-1735120554
                                  • Opcode ID: 0b767808ebb50470e9ff356561404501a49360a7200da246decd8113dd9d1d06
                                  • Instruction ID: 53257d9aca78c6f4fab2e44d8fa871fa41cd712851d0698b173801023eca031d
                                  • Opcode Fuzzy Hash: 0b767808ebb50470e9ff356561404501a49360a7200da246decd8113dd9d1d06
                                  • Instruction Fuzzy Hash: DD31EAB1A40318EEFB139F65EE067A53AA0F715706F10C12AE800761B2E77D49A5DF88
                                  APIs
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,wininet.dll,?,00000000,00000000,00000000,?,?,006DC3AE,?,?), ref: 006F153F
                                  • GetLastError.KERNEL32(?,006DC3AE,?,?), ref: 006F1548
                                  Strings
                                  • Failed to create begin operation event., xrefs: 006F1576
                                  • Failed to create extraction thread., xrefs: 006F1608
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F156C, 006F15B2, 006F15FE
                                  • Failed to copy file name., xrefs: 006F152A
                                  • wininet.dll, xrefs: 006F151E
                                  • Failed to wait for operation complete., xrefs: 006F161B
                                  • Failed to create operation complete event., xrefs: 006F15BC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateErrorEventLast
                                  • String ID: Failed to copy file name.$Failed to create begin operation event.$Failed to create extraction thread.$Failed to create operation complete event.$Failed to wait for operation complete.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp$wininet.dll
                                  • API String ID: 545576003-3114295247
                                  • Opcode ID: cc5b0d0c0954fe60b2ea3a97e6c33eb2658f40992be654a9652e3e579ecb9f18
                                  • Instruction ID: d104561236a5e5b11a51043f23676d842449599d4e3c7e74afeb7299c5a3eca5
                                  • Opcode Fuzzy Hash: cc5b0d0c0954fe60b2ea3a97e6c33eb2658f40992be654a9652e3e579ecb9f18
                                  • Instruction Fuzzy Hash: 302129F3E8163EB7E22016695C45E7B699EAF41BE1F024115FE01FF680E658DC0045E9
                                  APIs
                                  • GetProcAddress.KERNELBASE(SystemFunction040,AdvApi32.dll), ref: 00710004
                                  • GetProcAddress.KERNEL32(SystemFunction041), ref: 00710016
                                  • GetProcAddress.KERNEL32(CryptProtectMemory,Crypt32.dll), ref: 00710059
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 0071006D
                                  • GetProcAddress.KERNEL32(CryptUnprotectMemory), ref: 007100A5
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 007100B9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLast
                                  • String ID: AdvApi32.dll$Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory$SystemFunction040$SystemFunction041$c:\agent\_work\79\s\src\libs\dutil\cryputil.cpp
                                  • API String ID: 4214558900-2260022107
                                  • Opcode ID: 463e8908d67b9f29e2b5ad2b9a943142d67ce93b9d1a28700833758c4ad579bb
                                  • Instruction ID: d682efd9c03d3d0f48e16ad6775743680a1aa77895916a1bcaa593a8064dc4d7
                                  • Opcode Fuzzy Hash: 463e8908d67b9f29e2b5ad2b9a943142d67ce93b9d1a28700833758c4ad579bb
                                  • Instruction Fuzzy Hash: 0821D677941632E7F3329B58AC0BB966950B718751F02D015ED40BA2E1D3BDCCC09BD8
                                  APIs
                                  • CompareStringA.KERNELBASE(00000000,00000000,<the>.cab,?,?), ref: 006F06C6
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 006F06DE
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,?), ref: 006F06E3
                                  • DuplicateHandle.KERNELBASE(00000000,?,?), ref: 006F06E6
                                  • GetLastError.KERNEL32(?,?), ref: 006F06F0
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,08000080,00000000,?,?), ref: 006F075F
                                  • GetLastError.KERNEL32(?,?), ref: 006F076C
                                  Strings
                                  • <the>.cab, xrefs: 006F06BF
                                  • Failed to add virtual file pointer for cab container., xrefs: 006F0745
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F0714, 006F0790
                                  • Failed to duplicate handle to cab container., xrefs: 006F071E
                                  • Failed to open cabinet file: %hs, xrefs: 006F079D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CurrentErrorLastProcess$CompareCreateDuplicateFileHandleString
                                  • String ID: <the>.cab$Failed to add virtual file pointer for cab container.$Failed to duplicate handle to cab container.$Failed to open cabinet file: %hs$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 3030546534-4222385192
                                  • Opcode ID: 410a0bd4e840c0e3dd2d5402f9b6980de470878fde762af2f3fb161e8d43fd2d
                                  • Instruction ID: a7165304e39ea3ecd4fd09abf1ba95af9332e75ed9bc88571ae4050f152a8b29
                                  • Opcode Fuzzy Hash: 410a0bd4e840c0e3dd2d5402f9b6980de470878fde762af2f3fb161e8d43fd2d
                                  • Instruction Fuzzy Hash: 58310176A01139BBE7216B589C49EAB7F6AEF04760F114155FE04A7292D728AD008EE4
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,006D53FA,00000000,006D5482,00000000,?,006D82B1,?,?,?,00000000,00000000), ref: 006D6DDA
                                    • Part of subcall function 006D56E2: CompareStringW.KERNELBASE(0000007F,00001000,?,000000FF,version.dll,000000FF,?,?,00000000,006D65B1,006D65B1,?,006D5678,?,?,00000000), ref: 006D571E
                                    • Part of subcall function 006D56E2: GetLastError.KERNEL32(?,006D5678,?,?,00000000,?,?,006D65B1,?,006D7F03,?,?,?,?,?), ref: 006D574D
                                  • LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,00000000,00000000), ref: 006D6F6A
                                  Strings
                                  • Unsetting variable '%ls', xrefs: 006D6EF3, 006D6F26
                                  • Failed to find variable value '%ls'., xrefs: 006D6DF5
                                  • Setting version variable '%ls' to value '%hu.%hu.%hu.%hu', xrefs: 006D6EDF
                                  • Setting numeric variable '%ls' to value %lld, xrefs: 006D6F0B
                                  • Setting hidden variable '%ls', xrefs: 006D6E98
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D6E5D
                                  • Failed to set value of variable: %ls, xrefs: 006D6F52
                                  • Attempt to set built-in variable value: %ls, xrefs: 006D6E68
                                  • Setting variable failed: ID '%ls', HRESULT 0x%x, xrefs: 006D6F7C
                                  • Failed to insert variable '%ls'., xrefs: 006D6E1F
                                  • Setting string variable '%ls' to value '%ls', xrefs: 006D6EFA, 006D6F02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$CompareEnterErrorLastLeaveString
                                  • String ID: Attempt to set built-in variable value: %ls$Failed to find variable value '%ls'.$Failed to insert variable '%ls'.$Failed to set value of variable: %ls$Setting hidden variable '%ls'$Setting numeric variable '%ls' to value %lld$Setting string variable '%ls' to value '%ls'$Setting variable failed: ID '%ls', HRESULT 0x%x$Setting version variable '%ls' to value '%hu.%hu.%hu.%hu'$Unsetting variable '%ls'$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 2716280545-2805439763
                                  • Opcode ID: 47fa57458c658741bdbd9724dff07a1c4982e1fcd5eea7e65a0c88b992f8f568
                                  • Instruction ID: f50594610dffe91fa84796bf0f7f69da6ec8a5d80c9da3cfc68ff26f4b8fa56d
                                  • Opcode Fuzzy Hash: 47fa57458c658741bdbd9724dff07a1c4982e1fcd5eea7e65a0c88b992f8f568
                                  • Instruction Fuzzy Hash: 5251B471E40215ABCB309E59DC4AFEB3BABEB95700F14412AF845963C2C279DD81CAE1
                                  APIs
                                  • GetCurrentProcess.KERNEL32(000000FF,00000000,00000001,00000002,?,00000000,?,?,006D4E52,?,?), ref: 006E6972
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,?,006D4E52,?,?), ref: 006E6978
                                  • DuplicateHandle.KERNELBASE(00000000,?,?,006D4E52,?,?), ref: 006E697B
                                  • GetLastError.KERNEL32(?,?,006D4E52,?,?), ref: 006E6985
                                  • CloseHandle.KERNEL32(000000FF,?,006D4E52,?,?), ref: 006E69FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CurrentHandleProcess$CloseDuplicateErrorLast
                                  • String ID: %ls -%ls=%u$Failed to append the file handle to the command line.$Failed to duplicate file handle for attached container.$RNm$burn.filehandle.attached$c:\agent\_work\79\s\src\burn\engine\core.cpp
                                  • API String ID: 4224961946-4038015273
                                  • Opcode ID: 678688ab34013a1c1bd30769654a835b58751eb79cd129f4f0980718cd6a85f1
                                  • Instruction ID: 2b61eedbc99e374aaa1efa09a0d32e2bb85eb7f3716a92cbd13e411f2381602f
                                  • Opcode Fuzzy Hash: 678688ab34013a1c1bd30769654a835b58751eb79cd129f4f0980718cd6a85f1
                                  • Instruction Fuzzy Hash: BA11E472941326FBCB109BA9CD09A8E7BA9AB14770F114315F920FB2D1D3789E0196A0
                                  APIs
                                  • ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000040,00000000,00000000), ref: 006D31BC
                                  • GetLastError.KERNEL32 ref: 006D31C2
                                  • ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000000), ref: 006D321C
                                  • GetLastError.KERNEL32 ref: 006D3222
                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006D32D6
                                  • GetLastError.KERNEL32 ref: 006D32E0
                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 006D3336
                                  • GetLastError.KERNEL32 ref: 006D3340
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp, xrefs: 006D31E6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnvironmentExpandFullNamePathStrings
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp
                                  • API String ID: 1547313835-1445327374
                                  • Opcode ID: cc073349548820ee35e22a1c0633c004f2bddc7eb0fc643fcf8df037443ba51d
                                  • Instruction ID: ebdfdb457dc8437bfbf1f4898b3c3b0d52c725270cc1f457cc875eb9884aaf46
                                  • Opcode Fuzzy Hash: cc073349548820ee35e22a1c0633c004f2bddc7eb0fc643fcf8df037443ba51d
                                  • Instruction Fuzzy Hash: C761A173D0027AABDB219AD48D44BDEBAAAAB04760F164167EE00BB350E735DF0097D5
                                  APIs
                                  • VariantInit.OLEAUT32(0071B594), ref: 007135C5
                                  • SysAllocString.OLEAUT32(?), ref: 007135E1
                                  • VariantClear.OLEAUT32(?), ref: 00713668
                                  • SysFreeString.OLEAUT32(00000000), ref: 00713673
                                  Strings
                                  • `)u, xrefs: 00713673
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 007135F8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: StringVariant$AllocClearFreeInit
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 760788290-2301883107
                                  • Opcode ID: 879789242e55ac75c66b00cf45aa854a51e3b7ec63657e52e8c3df995a1fa46a
                                  • Instruction ID: 2204e751c5d9afc2b3e89d2719a608a08eb7ce964cfdeae0bc53288bb2a1b809
                                  • Opcode Fuzzy Hash: 879789242e55ac75c66b00cf45aa854a51e3b7ec63657e52e8c3df995a1fa46a
                                  • Instruction Fuzzy Hash: 2621A675900115FFDB11DB58C848EEEBBB9EF44B21F114158F915AB390C7399E44CB90
                                  APIs
                                  • OpenProcessToken.ADVAPI32(?,00000008,?,006D53FA,00000000,?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710BB1
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710BBB
                                  • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710BED
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710C06
                                  • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,006E75A3,00000000), ref: 00710C45
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\procutil.cpp, xrefs: 00710C33
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastToken$CloseHandleInformationOpenProcess
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\procutil.cpp
                                  • API String ID: 4040495316-1009431558
                                  • Opcode ID: b6d553728e81585726d7856ad1a1d2a5f60e44e4dc0c9116bc6bf021433fdbca
                                  • Instruction ID: 0304bf77a712851312e548329546146a82147aa619f79f73c3611377afd507c6
                                  • Opcode Fuzzy Hash: b6d553728e81585726d7856ad1a1d2a5f60e44e4dc0c9116bc6bf021433fdbca
                                  • Instruction Fuzzy Hash: FB21A472D00129EBD7219F9D9D44ADEBAA8EF14710F118156ED15FB2D0D3B88E80DAE4
                                  APIs
                                  • CreateFileW.KERNELBASE(?,80000000,00000005,?,00000003,00000080,00000000,?,00000000,?,?,?), ref: 006E6A40
                                  • CloseHandle.KERNEL32(00000000), ref: 006E6AB0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle
                                  • String ID: %ls -%ls=%u$Failed to append the file handle to the command line.$Failed to append the file handle to the obfuscated command line.$burn.filehandle.self
                                  • API String ID: 3498533004-3263533295
                                  • Opcode ID: 551c99adc53762c4e807efae4f53eb5e53088ea001ea36ee1c2216db0ad82eab
                                  • Instruction ID: 368d05392d339938f5252c74a2cdba3054715d7f50eace3f84521e74417c763a
                                  • Opcode Fuzzy Hash: 551c99adc53762c4e807efae4f53eb5e53088ea001ea36ee1c2216db0ad82eab
                                  • Instruction Fuzzy Hash: BD113871E01365BBCB21AAADDD49F9F3BA9AB41B70F008212F920B72D1E374454286A0
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 00713828
                                  • InterlockedIncrement.KERNEL32(0073C7B4), ref: 00713845
                                  • CLSIDFromProgID.COMBASE(Msxml2.DOMDocument,0073C7A0,?,?,?,?,?,?), ref: 00713860
                                  • CLSIDFromProgID.OLE32(MSXML.DOMDocument,0073C7A0,?,?,?,?,?,?), ref: 0071386C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FromProg$IncrementInitializeInterlocked
                                  • String ID: MSXML.DOMDocument$Msxml2.DOMDocument
                                  • API String ID: 2109125048-2356320334
                                  • Opcode ID: 563745507ca630215a6b260da242eef99188f98dd36e002fa395e120fd6db2c6
                                  • Instruction ID: 3b6dd02d3c4de41a64c5be670cb81ebcaad3feee5db01277323a095b649bf36a
                                  • Opcode Fuzzy Hash: 563745507ca630215a6b260da242eef99188f98dd36e002fa395e120fd6db2c6
                                  • Instruction Fuzzy Hash: 0DF06531744271A6F72107ADAC08B972DA6EB91F62F60C426FC44E21E4D36CD9C5CBB4
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000001), ref: 00714D0C
                                  • GlobalAlloc.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000001), ref: 00714D39
                                  • GetLastError.KERNEL32(?,00000000,?,00000000), ref: 00714D65
                                  • GetLastError.KERNEL32(00000000,0071B800,?,00000000,?,00000000,?,00000000), ref: 00714DA3
                                  • GlobalFree.KERNEL32(00000000), ref: 00714DD4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Global$AllocFree
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 1145190524-3405085980
                                  • Opcode ID: 765a76c4e4d0889086d3b140fe3713bc05a410dec66eb4efc1f61fea5b46ab07
                                  • Instruction ID: 2d66d737ea89a35df077781778b18e8db03ab33ea55595c5a4c5ad9687278c20
                                  • Opcode Fuzzy Hash: 765a76c4e4d0889086d3b140fe3713bc05a410dec66eb4efc1f61fea5b46ab07
                                  • Instruction Fuzzy Hash: 4D31F673A00229ABDF219A9C9C01EEFBAB8AF45760F114155FE44EB3C0D738DD4096E0
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?), ref: 006F08F7
                                  • GetLastError.KERNEL32(?,?,?), ref: 006F0901
                                  Strings
                                  • Invalid seek type., xrefs: 006F088D
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F0925
                                  • Failed to move file pointer 0x%x bytes., xrefs: 006F0932
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID: Failed to move file pointer 0x%x bytes.$Invalid seek type.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2976181284-3594109541
                                  • Opcode ID: 6bae5a8ea8fada41656e4e263866cf4a6ed8229437cac62199808b88c55e5830
                                  • Instruction ID: 3a6e38fdd70f2e17d87d83fb6fc6eee221805498286d0a1e7025524475ce41e5
                                  • Opcode Fuzzy Hash: 6bae5a8ea8fada41656e4e263866cf4a6ed8229437cac62199808b88c55e5830
                                  • Instruction Fuzzy Hash: 9E318075A0021EFFEB14DFA8D885DADB7BAFB04764B048115FA2497352E374EE108B90
                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,840F01E8,00000000,00000000,?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?), ref: 006D416D
                                  • GetLastError.KERNEL32(?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?,00000000,00000000), ref: 006D417B
                                  • CreateDirectoryW.KERNEL32(?,840F01E8,006D54C6,?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?,00000000), ref: 006D41EB
                                  • GetLastError.KERNEL32(?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?,00000000,00000000), ref: 006D41F5
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\dirutil.cpp, xrefs: 006D4225
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dirutil.cpp
                                  • API String ID: 1375471231-4184845720
                                  • Opcode ID: 569468fcbf62934986f697d797c4e9e81e8f865e340161d67fb6982a08c2e956
                                  • Instruction ID: 660a1ab80f29f4b004ade9247c55d923bb009360a1c12a658b799c2676170207
                                  • Opcode Fuzzy Hash: 569468fcbf62934986f697d797c4e9e81e8f865e340161d67fb6982a08c2e956
                                  • Instruction Fuzzy Hash: 2821D726E50231E7DB311AA55C84BBB6667AF65B61B12802BFD44EA340DE348D4192D4
                                  APIs
                                  • CompareStringW.KERNELBASE(0000007F,00001000,?,000000FF,version.dll,000000FF,?,?,00000000,006D65B1,006D65B1,?,006D5678,?,?,00000000), ref: 006D571E
                                  • GetLastError.KERNEL32(?,006D5678,?,?,00000000,?,?,006D65B1,?,006D7F03,?,?,?,?,?), ref: 006D574D
                                  Strings
                                  • Failed to compare strings., xrefs: 006D577B
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D5771
                                  • version.dll, xrefs: 006D5710
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareErrorLastString
                                  • String ID: Failed to compare strings.$c:\agent\_work\79\s\src\burn\engine\variable.cpp$version.dll
                                  • API String ID: 1733990998-2738194785
                                  • Opcode ID: b620b50c9a37658f860246350c9cad49355ccff751f1feda0f457610ee8fab6a
                                  • Instruction ID: 8be41340dae57ff84151aead1038e2b6c2aa002012dcccc4fefc3477857f456b
                                  • Opcode Fuzzy Hash: b620b50c9a37658f860246350c9cad49355ccff751f1feda0f457610ee8fab6a
                                  • Instruction Fuzzy Hash: DF213E37E00525EBC7148F5CCD44A99BBA6BF09730B31031AF812AB3C0D634DE018A90
                                  APIs
                                    • Part of subcall function 006F11D6: SetFilePointerEx.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000000,?,006F07EB,?,?,?), ref: 006F11FE
                                    • Part of subcall function 006F11D6: GetLastError.KERNEL32(?,006F07EB,?,?,?), ref: 006F1208
                                  • ReadFile.KERNELBASE(?,?,?,?,00000000,?,?,?), ref: 006F07F9
                                  • GetLastError.KERNEL32 ref: 006F0803
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F0827
                                  • Failed to read during cabinet extraction., xrefs: 006F0831
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$PointerRead
                                  • String ID: Failed to read during cabinet extraction.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2170121939-535368954
                                  • Opcode ID: 26a57b9152582f1f4adc785455540e8c8f67f753403b152ff376d56581998565
                                  • Instruction ID: a2c4beaa22468567fec594c285a6acff8482dc7e14bb9a887375043768b68abe
                                  • Opcode Fuzzy Hash: 26a57b9152582f1f4adc785455540e8c8f67f753403b152ff376d56581998565
                                  • Instruction Fuzzy Hash: 1101E172A00239BBDB209FA9DC04D9A7BA9FF087A0B014119FE14A7291D334E910DAD4
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000000,?,006F07EB,?,?,?), ref: 006F11FE
                                  • GetLastError.KERNEL32(?,006F07EB,?,?,?), ref: 006F1208
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F122C
                                  • Failed to move to virtual file pointer., xrefs: 006F1236
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID: Failed to move to virtual file pointer.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2976181284-2647110642
                                  • Opcode ID: 4e5504c79883b634cd64e6eb9f17ef47ea4c9b921619d53f9f6fddf5b5bce113
                                  • Instruction ID: e31eb30a277dff04194b6a46576f16c3e8d3c8e952b177bea4d3be2a2d37be31
                                  • Opcode Fuzzy Hash: 4e5504c79883b634cd64e6eb9f17ef47ea4c9b921619d53f9f6fddf5b5bce113
                                  • Instruction Fuzzy Hash: 6301DF33A0063AF7D7211ACA9C0899BBF26FF41BB07018129FE18AA241D72999509AD4
                                  APIs
                                  • ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 007141F1
                                  • GetLastError.KERNEL32 ref: 00714254
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714278
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 1948546556-3405085980
                                  • Opcode ID: 6334c30ae119a16d53d706b43c95496981fce04cf84f6fba2aa181fdca7aee42
                                  • Instruction ID: e9d5ee8fa383195f577c074bf394e054ed93fcadb95d562b6c698c8f1b8b0638
                                  • Opcode Fuzzy Hash: 6334c30ae119a16d53d706b43c95496981fce04cf84f6fba2aa181fdca7aee42
                                  • Instruction Fuzzy Hash: 34316071A0026DABDB25CF5CCC407DA77B5FB44751F0081AAF948E7280D7B89EC49BA4
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,?,00714218,?,?,?), ref: 007150C6
                                  • GetLastError.KERNEL32(?,?,00714218,?,?,?), ref: 007150D0
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 007150F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 442123175-3405085980
                                  • Opcode ID: f46627c1ebe2b84fcf8a8157d31ab2cf14fe90e29a2deb0502c00c82f3abb742
                                  • Instruction ID: f50f62721046198980e4426206e22794c013f274ba62aaff12ccfe9ce5936cdc
                                  • Opcode Fuzzy Hash: f46627c1ebe2b84fcf8a8157d31ab2cf14fe90e29a2deb0502c00c82f3abb742
                                  • Instruction Fuzzy Hash: CFF06D73A00529FBD7118AAECD45EDFBB69FB84B61F114126FD04EA180E674AA00D6E0
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(?,?,?,?,?,00000000,?,?,?,006E8664,00000000,00000000,00000000,00000000,00000000), ref: 00714B98
                                  • GetLastError.KERNEL32(?,?,?,006E8664,00000000,00000000,00000000,00000000,00000000), ref: 00714BA2
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714BC6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 2976181284-3405085980
                                  • Opcode ID: 9bbc27d7748fd9520fc23d95aa4f3e9e0244684bb5c94ff64fa76c9f5e2470f6
                                  • Instruction ID: a20f6b1a8f562269d554ea60de120aacecb883f6bb81e83d1537eca9365550ed
                                  • Opcode Fuzzy Hash: 9bbc27d7748fd9520fc23d95aa4f3e9e0244684bb5c94ff64fa76c9f5e2470f6
                                  • Instruction Fuzzy Hash: C2F086B6604129AB9B248F89DC05ADB7FA8EF04750B014059BD04AB291D238DD50D6E4
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 006D3910
                                  • GetLastError.KERNEL32 ref: 006D391A
                                  • LoadLibraryW.KERNELBASE(?,?,00000104,?), ref: 006D3983
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: DirectoryErrorLastLibraryLoadSystem
                                  • String ID:
                                  • API String ID: 1230559179-0
                                  • Opcode ID: 1ef31d137dabf9965c342495ded0e059e1cb3df63f0cceb0ffbe3e746790ae9a
                                  • Instruction ID: e04216892445026f51063ee0df0438733c3d688152e528c230b7c787e75b1e13
                                  • Opcode Fuzzy Hash: 1ef31d137dabf9965c342495ded0e059e1cb3df63f0cceb0ffbe3e746790ae9a
                                  • Instruction Fuzzy Hash: DF2125B2D0133967CB209BA48C59FDA73A99F04724F114266FE04FB381F674EE408695
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,007105D9,00000000,8007139F,?,00000000,00000000,8007139F,?,?,?,0071056D,000001C7), ref: 006D3AAE
                                  • RtlFreeHeap.NTDLL(00000000,?,007105D9,00000000,8007139F,?,00000000,00000000,8007139F,?,?,?,0071056D,000001C7,?,?), ref: 006D3AB5
                                  • GetLastError.KERNEL32(?,007105D9,00000000,8007139F,?,00000000,00000000,8007139F,?,?,?,0071056D,000001C7,?,?), ref: 006D3ABF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$ErrorFreeLastProcess
                                  • String ID:
                                  • API String ID: 406640338-0
                                  • Opcode ID: 517896343bb8ba99cba19682486b0d1746c2ad2c4549df7e2222d5c096bba3b4
                                  • Instruction ID: c17bdf2432570dbd9bc4b4311ad870019a1b3d9d72fd6f520f2b768c3037b232
                                  • Opcode Fuzzy Hash: 517896343bb8ba99cba19682486b0d1746c2ad2c4549df7e2222d5c096bba3b4
                                  • Instruction Fuzzy Hash: 12D01273B0013A67862117EE6C0C9DBBE58EF056A17068121FD44DA350EB29DD0097E9
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 007138AC
                                    • Part of subcall function 0071330F: GetModuleHandleA.KERNEL32(kernel32.dll,00000000,00000000,007138BD,00000000,?,00000000), ref: 00713329
                                    • Part of subcall function 0071330F: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,BTm,006FBD36,0071B518,BTm,?,00000000,?), ref: 00713335
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorHandleInitLastModuleVariant
                                  • String ID: BTm
                                  • API String ID: 52713655-1636500745
                                  • Opcode ID: 0155d294a8412adc5ed46a07add49e5c5ca12afd46058fab529f4d22e762c9ae
                                  • Instruction ID: f928938e77098b4a7f7a40e574ef3ffb150e14c9ab77b22ff13adebcf830a979
                                  • Opcode Fuzzy Hash: 0155d294a8412adc5ed46a07add49e5c5ca12afd46058fab529f4d22e762c9ae
                                  • Instruction Fuzzy Hash: F1316076E002299FDB01DFA8C884ADEB7F4EF08720F01456AE915FB351D774AD448BA4
                                  APIs
                                  • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 007112C6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 71445658-1128744096
                                  • Opcode ID: 3d3bea12c582aff08b74685aa3582684d3e48a7219a5eb73e3a9642819202b4a
                                  • Instruction ID: 5943d5d5df0ffd8ec17be0c3e86accccc9bda37cfa0f80e23529011b80ba5b56
                                  • Opcode Fuzzy Hash: 3d3bea12c582aff08b74685aa3582684d3e48a7219a5eb73e3a9642819202b4a
                                  • Instruction Fuzzy Hash: 57F0B432B4012A639B31099A9C05AE77D85EB857F0F558126BF48DF2A0D57DCC5097E8
                                  APIs
                                  • RegCloseKey.ADVAPI32(80070490,00000000,80070490,0073BB7C,00000000,80070490,?,?,006E8A07,WiX\Burn,PackageCache,00000000,0073BB7C,00000000,00000000,80070490), ref: 00715B17
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00711426
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0071145E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: QueryValue$Close
                                  • String ID:
                                  • API String ID: 1979452859-0
                                  • Opcode ID: d3040958452a1f4c8ff65b2f849f3aac901f169a713e46880e01ef406663b64b
                                  • Instruction ID: 3c2017b232f243884d85f939e235ff54c7cfb6ac60e8f81050e9c7b722a2ece1
                                  • Opcode Fuzzy Hash: d3040958452a1f4c8ff65b2f849f3aac901f169a713e46880e01ef406663b64b
                                  • Instruction Fuzzy Hash: 7911A0B680462AEB8B39AE9CCC859EEF775EB84360B114129ED5267250C3394E90E7D0
                                  APIs
                                    • Part of subcall function 006D3171: ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000040,00000000,00000000), ref: 006D31BC
                                    • Part of subcall function 006D3171: GetLastError.KERNEL32 ref: 006D31C2
                                    • Part of subcall function 006D3171: ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000000), ref: 006D321C
                                    • Part of subcall function 006D3171: GetLastError.KERNEL32 ref: 006D3222
                                    • Part of subcall function 006D3171: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006D32D6
                                    • Part of subcall function 006D3171: GetLastError.KERNEL32 ref: 006D32E0
                                  • CompareStringW.KERNEL32(00000000,00000001,00000000,000000FF,00000000,000000FF,00000000,00000000,00000003,00000000,00000000,00000003,00000000), ref: 006D2E27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnvironmentExpandStrings$CompareFullNamePathString
                                  • String ID:
                                  • API String ID: 1340564764-0
                                  • Opcode ID: 7e3041eee8f199f3f250d68c8a9660e3462b2a047a28082aafd818b6e049efb0
                                  • Instruction ID: 3b2b437c90dd77b847e0666aac11e16038daf8581a2d112a44b936d4b44e343f
                                  • Opcode Fuzzy Hash: 7e3041eee8f199f3f250d68c8a9660e3462b2a047a28082aafd818b6e049efb0
                                  • Instruction Fuzzy Hash: FB017C35D0122AFBDF129B94CC16BCEBB7AAB10726F104255F910763E0C7749B40DB94
                                  APIs
                                  • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000000,00000104,00000000,?,006E8AC1,0000001C,80070490,00000000,00000000,80070490), ref: 006D35C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FolderPath
                                  • String ID:
                                  • API String ID: 1514166925-0
                                  • Opcode ID: 95eff6679835a91bfc92b10f5dc8f7545140a383569de50b2757f5e175b4c9de
                                  • Instruction ID: f441cea77d0f82cead7554bd0769b5f3b88f42164fed7f6d707de0948bfaa203
                                  • Opcode Fuzzy Hash: 95eff6679835a91bfc92b10f5dc8f7545140a383569de50b2757f5e175b4c9de
                                  • Instruction Fuzzy Hash: 6DE0C2727002243BA6002AA46C00CEB3B8DDF153907004016FE00D6200DB61D61053B5
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 0070F7A0
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 29d017ff02d2f7ca28566877df06316ad37712804f3b249191077e7122073f22
                                  • Instruction ID: eab2a3f6d1038ade2d2fc030f6d4aecb57f3da67b600dfe4532722c4156f657d
                                  • Opcode Fuzzy Hash: 29d017ff02d2f7ca28566877df06316ad37712804f3b249191077e7122073f22
                                  • Instruction Fuzzy Hash: 3EB092E125D201ED329451182806C360198C080B20764822AB100C0582E86C49814133
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 0070F7A0
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 4ea2d1c65f1c76387648766d5357f868399ab086c2c7137984bace49355ba5d4
                                  • Instruction ID: 3c7536d3b1c2ed56873958ebbf04efbd83dc16a461a3e074fb0de71dbe11b11d
                                  • Opcode Fuzzy Hash: 4ea2d1c65f1c76387648766d5357f868399ab086c2c7137984bace49355ba5d4
                                  • Instruction Fuzzy Hash: 6FB012F125D101ED33D451182D07C37019CC0C0F20774813AF100C05C3EC6C4D824033
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 0070F7A0
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 2ac2ba1c915b3c09f31be0223e71156210fc413bc5c91a11b122e57ecefac2d6
                                  • Instruction ID: a465ebc3d5cb38cc0ffbaf48395c47ebc35484bc590552873d3ad2adbea75203
                                  • Opcode Fuzzy Hash: 2ac2ba1c915b3c09f31be0223e71156210fc413bc5c91a11b122e57ecefac2d6
                                  • Instruction Fuzzy Hash: DCB092E12AD201ED329411142806C360158C090B21764812AB50480482A86C49814033
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00719836
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 6ef53a81190ca62bbfc247faec0456bfc2e974961aea5c034a30df4227b08d0f
                                  • Instruction ID: d17373995f3a376fa41f84a8b3b82ac3685760a92e7cd81cc4769f7c596e50b5
                                  • Opcode Fuzzy Hash: 6ef53a81190ca62bbfc247faec0456bfc2e974961aea5c034a30df4227b08d0f
                                  • Instruction Fuzzy Hash: 27B092E925C201AC339451582916DBA0119C0C4B20734802AB200C00C2A84C1D828032
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00719836
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 09c16658bed5cb5ad3360175b572980a42c041370316ba76b1111e18415790b9
                                  • Instruction ID: 57380b4eb60ae486b38b9f3d3c6e71e735fbe19c36616e591f92ff984c0c86f0
                                  • Opcode Fuzzy Hash: 09c16658bed5cb5ad3360175b572980a42c041370316ba76b1111e18415790b9
                                  • Instruction Fuzzy Hash: 96B012F926C101AC33D4515C2C16CFA011DC0C0F20734C02BF700C00C3F84C1D8A8032
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00719836
                                    • Part of subcall function 00719B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00719B77
                                    • Part of subcall function 00719B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00719B88
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: bdc708501ddb355f3896ad958e9c24d155ca7da9ea9a6b3c5c46b0ece5c4a1a3
                                  • Instruction ID: 5f10fc4c67900c954c3d6ccb03d76b359f0097aa7dde9c2ec5bb617ac2f6f7bd
                                  • Opcode Fuzzy Hash: bdc708501ddb355f3896ad958e9c24d155ca7da9ea9a6b3c5c46b0ece5c4a1a3
                                  • Instruction Fuzzy Hash: 28B012F925C209BC33A411582D56CFA011EC1C5F30734803AF301C00C3A94C1DC29032
                                  APIs
                                  • lstrlenW.KERNEL32(00000000,00000000,00000000,?,?,006D22B1,?,00000000,?,00000000,?,006D39A5,00000000,?,00000104), ref: 006D14DC
                                    • Part of subcall function 006D3C5F: GetProcessHeap.KERNEL32(00000000,000001C7,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C67
                                    • Part of subcall function 006D3C5F: HeapSize.KERNEL32(00000000,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C6E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$ProcessSizelstrlen
                                  • String ID:
                                  • API String ID: 3492610842-0
                                  • Opcode ID: 61b23ccf51ae6b93a47939ec8edf0cefc95efdc4497e7431b31d2f1766fc2d9e
                                  • Instruction ID: 18d21b52b74121dba6525c0651cc7d1bc75f5faac9b9da2d309b03f90a0ae55b
                                  • Opcode Fuzzy Hash: 61b23ccf51ae6b93a47939ec8edf0cefc95efdc4497e7431b31d2f1766fc2d9e
                                  • Instruction Fuzzy Hash: 8901D836900128BBCF216E55DC80FDA7BABAF82760F118117FE15AF391C7B1AD4096A4
                                  APIs
                                  • GetFileAttributesW.KERNEL32(?,?,?,?,00000001,00000000,?), ref: 006D3DAD
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D3DC0
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,00000001,00000000,?), ref: 006D3E0C
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D3E16
                                  • GetTempPathW.KERNEL32(00000104,?,?,?,?,00000001,00000000,?), ref: 006D3E5D
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D3E67
                                  • FindFirstFileW.KERNEL32(?,?,?,*.*,?,?,?,?,00000001,00000000,?), ref: 006D3EB5
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D3EC6
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00000001,00000000,?), ref: 006D3F98
                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00000001,00000000,?), ref: 006D3FAC
                                  • GetTempFileNameW.KERNEL32(?,DEL,00000000,?,?,?,?,00000001,00000000,?), ref: 006D3FD5
                                  • MoveFileExW.KERNEL32(?,?,00000001,?,?,?,00000001,00000000,?), ref: 006D3FF8
                                  • MoveFileExW.KERNEL32(?,00000000,00000004,?,?,?,00000001,00000000,?), ref: 006D4011
                                  • FindNextFileW.KERNEL32(000000FF,?,?,?,?,?,?,?,00000001,00000000,?), ref: 006D4021
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D4036
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D4065
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D4087
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D40A9
                                  • RemoveDirectoryW.KERNEL32(?,?,?,?,00000001,00000000,?), ref: 006D40B3
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D40BD
                                  • MoveFileExW.KERNEL32(?,00000000,00000004,?,?,?,00000001,00000000,?), ref: 006D40E1
                                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D40FC
                                  • FindClose.KERNEL32(000000FF,?,?,?,00000001,00000000,?), ref: 006D4132
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$AttributesFindMove$Temp$CloseDeleteDirectoryFirstNameNextPathRemove
                                  • String ID: *.*$DEL$c:\agent\_work\79\s\src\libs\dutil\dirutil.cpp
                                  • API String ID: 1544372074-4233457899
                                  • Opcode ID: d05266b981a75757669d8646454658729d925e58b332ce0965697325f1ed7ea6
                                  • Instruction ID: ccd9dd8a06d6b081b1bd8796c8fa9714b6d7fd422d024c0149175d2f7538a2d1
                                  • Opcode Fuzzy Hash: d05266b981a75757669d8646454658729d925e58b332ce0965697325f1ed7ea6
                                  • Instruction Fuzzy Hash: 55A11972D01239A7D73097648C05BEA766B9F50760F024297EE44FB3D0DB768E80DAD5
                                  Strings
                                  • msasn1.dll, xrefs: 006F41B7
                                  • Failed to get cached path for package: %ls, xrefs: 006F40FB
                                  • Failed to uninstall MSI package., xrefs: 006F459B
                                  • WixBundleExecutePackageAction, xrefs: 006F4163, 006F4660
                                  • Failed to add reinstall all property on minor upgrade., xrefs: 006F4396
                                  • WixBundleExecutePackageCacheFolder, xrefs: 006F4116, 006F4650
                                  • Failed to add reboot suppression property on uninstall., xrefs: 006F4529
                                  • Failed to add patch properties to argument string., xrefs: 006F42A9
                                  • REBOOT=ReallySuppress, xrefs: 006F434C, 006F4518
                                  • REINSTALL=ALL, xrefs: 006F437F, 006F43F9
                                  • Failed to enable logging for package: %ls to: %ls, xrefs: 006F41CB
                                  • %ls %ls=ALL, xrefs: 006F4462, 006F4541
                                  • Failed to perform minor upgrade of MSI package., xrefs: 006F43E4
                                  • IGNOREDEPENDENCIES, xrefs: 006F4451, 006F4530
                                  • feclient.dll, xrefs: 006F4071, 006F40F9, 006F41C9, 006F42F7, 006F4584
                                  • Failed to run maintanance mode for MSI package., xrefs: 006F44A2
                                  • Failed to add reinstall mode and reboot suppression properties on minor upgrade., xrefs: 006F43B8
                                  • Failed to build MSI path., xrefs: 006F4149
                                  • Failed to add feature action properties to obfuscated argument string., xrefs: 006F4287
                                  • %ls%ls REINSTALLMODE="cmus%ls" REBOOT=ReallySuppress, xrefs: 006F4433
                                  • Failed to add the list of dependencies to ignore to the properties., xrefs: 006F4476
                                  • ACTION=ADMIN, xrefs: 006F44B5
                                  • REINSTALLMODE="vomus" REBOOT=ReallySuppress, xrefs: 006F43A1
                                  • Failed to add patch properties to obfuscated argument string., xrefs: 006F42CB
                                  • Failed to add properties to argument string., xrefs: 006F420F
                                  • Failed to add reinstall mode and reboot suppression properties on repair., xrefs: 006F4447
                                  • Failed to add reboot suppression property on install., xrefs: 006F4367
                                  • Failed to add ADMIN property on admin install., xrefs: 006F44CA
                                  • Failed to add obfuscated properties to argument string., xrefs: 006F4243
                                  • Failed to install MSI package., xrefs: 006F44F2
                                  • Failed to add feature action properties to argument string., xrefs: 006F4265
                                  • Failed to initialize external UI handler., xrefs: 006F41A0
                                  • VersionString, xrefs: 006F403A, 006F409B
                                  • crypt32.dll, xrefs: 006F41B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ACTION=ADMIN$ REBOOT=ReallySuppress$ REINSTALL=ALL$ REINSTALLMODE="vomus" REBOOT=ReallySuppress$%ls %ls=ALL$%ls%ls REINSTALLMODE="cmus%ls" REBOOT=ReallySuppress$Failed to add ADMIN property on admin install.$Failed to add feature action properties to argument string.$Failed to add feature action properties to obfuscated argument string.$Failed to add obfuscated properties to argument string.$Failed to add patch properties to argument string.$Failed to add patch properties to obfuscated argument string.$Failed to add properties to argument string.$Failed to add reboot suppression property on install.$Failed to add reboot suppression property on uninstall.$Failed to add reinstall all property on minor upgrade.$Failed to add reinstall mode and reboot suppression properties on minor upgrade.$Failed to add reinstall mode and reboot suppression properties on repair.$Failed to add the list of dependencies to ignore to the properties.$Failed to build MSI path.$Failed to enable logging for package: %ls to: %ls$Failed to get cached path for package: %ls$Failed to initialize external UI handler.$Failed to install MSI package.$Failed to perform minor upgrade of MSI package.$Failed to run maintanance mode for MSI package.$Failed to uninstall MSI package.$IGNOREDEPENDENCIES$VersionString$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$crypt32.dll$feclient.dll$msasn1.dll
                                  • API String ID: 0-2033600224
                                  • Opcode ID: 4ab81fb25a3042347c53d6e6b7c0efc9420c9bba0ef4f7544233cfab657c04b0
                                  • Instruction ID: 7d77617b530cc14f6bc6983569f320907616da6a369e1642dfd8c1c0430dc8f9
                                  • Opcode Fuzzy Hash: 4ab81fb25a3042347c53d6e6b7c0efc9420c9bba0ef4f7544233cfab657c04b0
                                  • Instruction Fuzzy Hash: A102827190063AAFDB229F54CC41EBAB77BBF54710F0001A5F608A7651DB36EEA5CB90
                                  APIs
                                  • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 00711A90
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711A9A
                                  • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?), ref: 00711AE7
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711AED
                                  • CreateWellKnownSid.ADVAPI32(00000017,00000000,?,?), ref: 00711B27
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711B2D
                                  • CreateWellKnownSid.ADVAPI32(00000018,00000000,?,?), ref: 00711B6D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711B73
                                  • CreateWellKnownSid.ADVAPI32(00000010,00000000,?,?), ref: 00711BB3
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711BB9
                                  • CreateWellKnownSid.ADVAPI32(00000016,00000000,?,?), ref: 00711BF9
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711BFF
                                  • SetEntriesInAclA.ADVAPI32(00000005,?,00000000,?), ref: 00711CF0
                                  • SetSecurityDescriptorOwner.ADVAPI32(?,?,00000000), ref: 00711D2A
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711D34
                                  • SetSecurityDescriptorGroup.ADVAPI32(?,?,00000000), ref: 00711D6C
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711D76
                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00711DAF
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00711DB9
                                  • CoInitializeSecurity.OLE32(?,000000FF,00000000,00000000,00000006,00000002,00000000,00003000,00000000), ref: 00711DF7
                                  • LocalFree.KERNEL32(?), ref: 00711E0D
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\srputil.cpp, xrefs: 00711ABB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateKnownSecurityWell$Descriptor$Initialize$DaclEntriesFreeGroupLocalOwner
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\srputil.cpp
                                  • API String ID: 267631441-2400857673
                                  • Opcode ID: 87a8c9292013cb0171ef3345324b864cc4e7fb10aa5a667ecdbfe91985906594
                                  • Instruction ID: 9b0157da6724ec70c340dc36a7e4194bfd2ed22914444c931c1034e23dc968ac
                                  • Opcode Fuzzy Hash: 87a8c9292013cb0171ef3345324b864cc4e7fb10aa5a667ecdbfe91985906594
                                  • Instruction Fuzzy Hash: F6C17B76D4123DABDB308F999C44BDFFAB8AF44710F41419AEA04FB280E7749D408EA4
                                  Strings
                                  • Failed to allocate space for burn payload inside of related bundle struct, xrefs: 006FC0CC
                                  • Failed to copy local source path for pseudo bundle., xrefs: 006FC149
                                  • Failed to copy filename for pseudo bundle., xrefs: 006FC125
                                  • Failed to copy key for pseudo bundle., xrefs: 006FC24E
                                  • -%ls, xrefs: 006FC05E
                                  • Failed to copy install arguments for related bundle package, xrefs: 006FC295
                                  • Failed to copy version for pseudo bundle., xrefs: 006FC43B
                                  • c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp, xrefs: 006FC087, 006FC0C0, 006FC1AF, 006FC3E0
                                  • Failed to append relation type to install arguments for related bundle package, xrefs: 006FC2B6
                                  • Failed to append relation type to repair arguments for related bundle package, xrefs: 006FC2FF
                                  • Failed to allocate space for burn package payload inside of related bundle struct, xrefs: 006FC093
                                  • Failed to copy uninstall arguments for related bundle package, xrefs: 006FC331
                                  • Failed to copy download source for pseudo bundle., xrefs: 006FC177
                                  • Failed to append relation type to uninstall arguments for related bundle package, xrefs: 006FC352
                                  • Failed to copy cache id for pseudo bundle., xrefs: 006FC26D
                                  • Failed to allocate memory for pseudo bundle payload hash., xrefs: 006FC1BB
                                  • Failed to copy key for pseudo bundle payload., xrefs: 006FC101
                                  • Failed to allocate memory for dependency providers., xrefs: 006FC3EC
                                  • Failed to copy repair arguments for related bundle package, xrefs: 006FC2DE
                                  • Failed to copy display name for pseudo bundle., xrefs: 006FC45D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID: -%ls$Failed to allocate memory for dependency providers.$Failed to allocate memory for pseudo bundle payload hash.$Failed to allocate space for burn package payload inside of related bundle struct$Failed to allocate space for burn payload inside of related bundle struct$Failed to append relation type to install arguments for related bundle package$Failed to append relation type to repair arguments for related bundle package$Failed to append relation type to uninstall arguments for related bundle package$Failed to copy cache id for pseudo bundle.$Failed to copy display name for pseudo bundle.$Failed to copy download source for pseudo bundle.$Failed to copy filename for pseudo bundle.$Failed to copy install arguments for related bundle package$Failed to copy key for pseudo bundle payload.$Failed to copy key for pseudo bundle.$Failed to copy local source path for pseudo bundle.$Failed to copy repair arguments for related bundle package$Failed to copy uninstall arguments for related bundle package$Failed to copy version for pseudo bundle.$c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp
                                  • API String ID: 1357844191-1088614172
                                  • Opcode ID: 3ba4ad8577f80d7d5afc9537c96ecc575f28699503b8cd1d981e0d09b4217e8a
                                  • Instruction ID: 0b31abbcd83e427b36779a9549b8176eb9839e51ea84006689da1da3f05fc7bd
                                  • Opcode Fuzzy Hash: 3ba4ad8577f80d7d5afc9537c96ecc575f28699503b8cd1d981e0d09b4217e8a
                                  • Instruction Fuzzy Hash: 3FC1E172A4061EABEB65DF28C951E7AB796FF05720F00422AFE15EB341D770ED109B90
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000020,?,00000001,00000000,?,?,?,?,?,?,?), ref: 006D4662
                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 006D4669
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 006D4673
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 006D46C3
                                  • GetLastError.KERNEL32 ref: 006D46CD
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 006D4711
                                  • GetLastError.KERNEL32 ref: 006D471B
                                  • Sleep.KERNEL32(000003E8), ref: 006D4757
                                  • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000001,80040002), ref: 006D4768
                                  • GetLastError.KERNEL32 ref: 006D4772
                                  • CloseHandle.KERNEL32(?), ref: 006D47C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$ProcessToken$AdjustCloseCurrentHandleInitiateLookupOpenPrivilegePrivilegesShutdownSleepSystemValue
                                  • String ID: Failed to adjust token to add shutdown privileges.$Failed to get process token.$Failed to get shutdown privilege LUID.$Failed to schedule restart.$SeShutdownPrivilege$c:\agent\_work\79\s\src\burn\engine\engine.cpp
                                  • API String ID: 2241679041-962387770
                                  • Opcode ID: ba8c86e0271f24f90e31f5f217efba92e21f729fef4387853a20df03be3add9c
                                  • Instruction ID: de0768e1dbb9616556b668e43782aa260545f5078263fcae4a28d6801fd7919c
                                  • Opcode Fuzzy Hash: ba8c86e0271f24f90e31f5f217efba92e21f729fef4387853a20df03be3add9c
                                  • Instruction Fuzzy Hash: 3D41EDB6E8023977E72157E84C4ABEF6669AF05751F024126FE01FB3C0DB789C4055E5
                                  APIs
                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(D:(A;;GA;;;SY)(A;;GA;;;BA)(A;;GRGW0x00100000;;;WD),00000001,?,00000000), ref: 006E4E95
                                  • GetLastError.KERNEL32(?,00000000,?,?,006D457C,?), ref: 006E4E9E
                                  • CreateNamedPipeW.KERNEL32(000000FF,00080003,00000000,00000001,00010000,00010000,00000001,?,?,00000000,?,?,006D457C,?), ref: 006E4F40
                                  • GetLastError.KERNEL32(?,006D457C,?), ref: 006E4F4D
                                  • CreateNamedPipeW.KERNEL32(000000FF,00080003,00000000,00000001,00010000,00010000,00000001,00000000,?,?,?,?,?,?,?,006D457C), ref: 006E4FC8
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,006D457C,?), ref: 006E4FD3
                                  • CloseHandle.KERNEL32(00000000,c:\agent\_work\79\s\src\burn\engine\pipe.cpp,00000132,00000000,?,?,?,?,?,?,?,006D457C,?), ref: 006E5013
                                  • LocalFree.KERNEL32(00000000,?,006D457C,?), ref: 006E5041
                                  Strings
                                  • Failed to create the security descriptor for the connection event and pipe., xrefs: 006E4ECC
                                  • D:(A;;GA;;;SY)(A;;GA;;;BA)(A;;GRGW0x00100000;;;WD), xrefs: 006E4E90
                                  • \\.\pipe\%ls, xrefs: 006E4EF6
                                  • c:\agent\_work\79\s\src\burn\engine\pipe.cpp, xrefs: 006E4EC2, 006E4F71, 006E4FF7
                                  • \\.\pipe\%ls.Cache, xrefs: 006E4F94
                                  • Failed to allocate full name of pipe: %ls, xrefs: 006E4F0C
                                  • Failed to create pipe: %ls, xrefs: 006E4F7E, 006E5004
                                  • Failed to allocate full name of cache pipe: %ls, xrefs: 006E4FAA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDescriptorNamedPipeSecurity$CloseConvertFreeHandleLocalString
                                  • String ID: D:(A;;GA;;;SY)(A;;GA;;;BA)(A;;GRGW0x00100000;;;WD)$Failed to allocate full name of cache pipe: %ls$Failed to allocate full name of pipe: %ls$Failed to create pipe: %ls$Failed to create the security descriptor for the connection event and pipe.$\\.\pipe\%ls$\\.\pipe\%ls.Cache$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 1214480349-256891332
                                  • Opcode ID: bb4a163bf526bd5b665b8dc4ae775684488813f171dbde12b81f238ca9e4a20d
                                  • Instruction ID: 4d38fd09c0be497f6843e8e1d848c4c50c8e180bd895068d42fc2ce93354ddd6
                                  • Opcode Fuzzy Hash: bb4a163bf526bd5b665b8dc4ae775684488813f171dbde12b81f238ca9e4a20d
                                  • Instruction Fuzzy Hash: C6512572D41325FBDB219BA99C46BDEBB76AF04710F114115FD00BA2C0E7B95E408AD4
                                  APIs
                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000003,F0000040,00000003,00000000,00000000,006E9DED,00000003,000007D0,00000003,?,000007D0,?,000007D0), ref: 0070FDF4
                                  • GetLastError.KERNEL32 ref: 0070FDFE
                                  • CryptCreateHash.ADVAPI32(?,?,00000000,00000000,?), ref: 0070FE3B
                                  • GetLastError.KERNEL32 ref: 0070FE45
                                  • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 0070FE8C
                                  • ReadFile.KERNEL32(00000000,?,00001000,?,00000000), ref: 0070FEB0
                                  • GetLastError.KERNEL32 ref: 0070FEBA
                                  • CryptDestroyHash.ADVAPI32(00000000), ref: 0070FEF7
                                  • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 0070FF0E
                                  • GetLastError.KERNEL32 ref: 0070FF27
                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 0070FF5F
                                  • GetLastError.KERNEL32 ref: 0070FF69
                                  • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00008004,00000001), ref: 0070FFA2
                                  • GetLastError.KERNEL32 ref: 0070FFB0
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\cryputil.cpp, xrefs: 0070FEDE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CryptErrorLast$Hash$ContextFile$AcquireCreateDataDestroyParamPointerReadRelease
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\cryputil.cpp
                                  • API String ID: 3955742341-4166059025
                                  • Opcode ID: 34ec1967c0585e1fa952f80495b5130be2395b7a74235fdc12b7f4fd5830bc2d
                                  • Instruction ID: 254014f5f65cefb45d275680c4033478412acc716ec6c4ba28c14ba9be74172f
                                  • Opcode Fuzzy Hash: 34ec1967c0585e1fa952f80495b5130be2395b7a74235fdc12b7f4fd5830bc2d
                                  • Instruction Fuzzy Hash: 05518737D4023AEBD7318A55CD08BDB76A4AF08751F0181B5FE48FA5D0D7789D809AE4
                                  Strings
                                  • copying, xrefs: 006E9F19, 006E9F21
                                  • Failed to reset permissions on unverified cached payload: %ls, xrefs: 006E9EDA
                                  • Failed to move verified file to complete payload path: %ls, xrefs: 006E9F55
                                  • Failed to find payload: %ls in working path: %ls and unverified path: %ls, xrefs: 006E9EB4
                                  • Failed to get cached path for package with cache id: %ls, xrefs: 006E9DB1
                                  • Failed to concat complete cached path., xrefs: 006E9DDD
                                  • Failed to create unverified path., xrefs: 006E9E57
                                  • moving, xrefs: 006E9F12
                                  • Failed to transfer working path to unverified path for payload: %ls., xrefs: 006E9E8D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to concat complete cached path.$Failed to create unverified path.$Failed to find payload: %ls in working path: %ls and unverified path: %ls$Failed to get cached path for package with cache id: %ls$Failed to move verified file to complete payload path: %ls$Failed to reset permissions on unverified cached payload: %ls$Failed to transfer working path to unverified path for payload: %ls.$copying$moving
                                  • API String ID: 0-1289240508
                                  • Opcode ID: 577f819ffe8c1ab415e5c31437963efe852fd58230f402a7ec8364c46da4421a
                                  • Instruction ID: a6343b010ff6d5109bc1c8e4d3dcfd154341564a44e56ba828241acaab488226
                                  • Opcode Fuzzy Hash: 577f819ffe8c1ab415e5c31437963efe852fd58230f402a7ec8364c46da4421a
                                  • Instruction Fuzzy Hash: 4251B131D41369FBDF226B95CC06FDEBA37AF14700F104051FA00B52A1E7769EA1ABA4
                                  APIs
                                  • GetVersionExW.KERNEL32(0000011C), ref: 006D631A
                                  • GetLastError.KERNEL32 ref: 006D6324
                                  Strings
                                  • Failed to get OS info., xrefs: 006D6352
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D6348
                                  • Failed to set variant value., xrefs: 006D6445
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastVersion
                                  • String ID: Failed to get OS info.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 305913169-697277656
                                  • Opcode ID: e02dc8187d29e51c1b8e40942195a4b201985c04a7a6fb12cc2e8dd8fb8590c8
                                  • Instruction ID: a13fdeec4fd83eba02723c8c72eaa1995e1acf769d5a71970ce63dbb75569ce3
                                  • Opcode Fuzzy Hash: e02dc8187d29e51c1b8e40942195a4b201985c04a7a6fb12cc2e8dd8fb8590c8
                                  • Instruction Fuzzy Hash: F241D571E00228ABDB20DB59CC45EEF7BB9EB85710F11809BF545E7380DA34AE81CB94
                                  APIs
                                  • GetSystemTime.KERNEL32(?), ref: 006D608A
                                  • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,00000000,00000000), ref: 006D609E
                                  • GetLastError.KERNEL32 ref: 006D60B0
                                  • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,?,00000000,?,00000000), ref: 006D6104
                                  • GetLastError.KERNEL32 ref: 006D610E
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D60CB, 006D6129
                                  • Failed to set variant value., xrefs: 006D614C
                                  • Failed to get the Date., xrefs: 006D6133
                                  • Failed to allocate the buffer for the Date., xrefs: 006D60EC
                                  • Failed to get the required buffer length for the Date., xrefs: 006D60D5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: DateErrorFormatLast$SystemTime
                                  • String ID: Failed to allocate the buffer for the Date.$Failed to get the Date.$Failed to get the required buffer length for the Date.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 2700948981-2785940276
                                  • Opcode ID: 4a101637a547540887c3e053d4267c404e8b06f5341535b1b2c6b6f813b8940e
                                  • Instruction ID: 9485b5deef8c5ec2d159f84bb0bc0723e56f89f5c0ddf676a20a29ea1ec1d269
                                  • Opcode Fuzzy Hash: 4a101637a547540887c3e053d4267c404e8b06f5341535b1b2c6b6f813b8940e
                                  • Instruction Fuzzy Hash: 27319972E402297BDB2196ECCC42FEFBA7AAF04750F114126FB01F7381DA649D4486E5
                                  APIs
                                  • EnterCriticalSection.KERNEL32(0073C6EC,00000000,?,?,?,?,006F1099,8007139F,Invalid operation for this state.,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7,8007139F), ref: 0071021E
                                  • GetCurrentProcessId.KERNEL32(00000000,?,006F1099,8007139F,Invalid operation for this state.,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7,8007139F), ref: 0071022E
                                  • GetCurrentThreadId.KERNEL32 ref: 00710237
                                  • GetLocalTime.KERNEL32(8007139F,?,006F1099,8007139F,Invalid operation for this state.,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7,8007139F), ref: 0071024D
                                  • LeaveCriticalSection.KERNEL32(0073C6EC,006F1099,?,00000000,0000FDE9,?,006F1099,8007139F,Invalid operation for this state.,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7,8007139F), ref: 00710344
                                  Strings
                                  • %ls[%04X:%04X][%04hu-%02hu-%02huT%02hu:%02hu:%02hu]%hs%03d:%ls %ls%ls, xrefs: 007102EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalCurrentSection$EnterLeaveLocalProcessThreadTime
                                  • String ID: %ls[%04X:%04X][%04hu-%02hu-%02huT%02hu:%02hu:%02hu]%hs%03d:%ls %ls%ls
                                  • API String ID: 296830338-59366893
                                  • Opcode ID: a2182b77cd04edd132e970857eb107901cda264ffaf052b3b320524d23cbde24
                                  • Instruction ID: ef50e144b16e41cce8e41db5912024f28dc63ad9425b50e030dfec018a6ae46d
                                  • Opcode Fuzzy Hash: a2182b77cd04edd132e970857eb107901cda264ffaf052b3b320524d23cbde24
                                  • Instruction Fuzzy Hash: 96415071D00219ABDB619FA8D845AFEB7B5BB08751F10802AF901E6290D77C9DC0DBE1
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,00000000,?,*.*,?,?,?,00000000,.unverified,?), ref: 006E9ADF
                                  • lstrlenW.KERNEL32(?), ref: 006E9B06
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 006E9B66
                                  • FindClose.KERNEL32(00000000), ref: 006E9B71
                                    • Part of subcall function 006D3D4E: GetFileAttributesW.KERNEL32(?,?,?,?,00000001,00000000,?), ref: 006D3DAD
                                    • Part of subcall function 006D3D4E: GetLastError.KERNEL32(?,?,?,00000001,00000000,?), ref: 006D3DC0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FileFind$AttributesCloseErrorFirstLastNextlstrlen
                                  • String ID: *.*$.unverified
                                  • API String ID: 457978746-2528915496
                                  • Opcode ID: 21e674fc211ba05f2dccd8c3ea3413ace4091e149b494fdfff785598c66d202e
                                  • Instruction ID: 61eb832752c74a5cc1ad8069e52cca7561970d13dd7c6bc7c6f2942155de744c
                                  • Opcode Fuzzy Hash: 21e674fc211ba05f2dccd8c3ea3413ace4091e149b494fdfff785598c66d202e
                                  • Instruction Fuzzy Hash: 0741913090126CAECF60AB65ED49BEE77BAEF44301F1041E5E508E11A0EB759EC4DF68
                                  APIs
                                  • GetTimeZoneInformation.KERNEL32(?,00000001,00000000), ref: 00718AE4
                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?), ref: 00718AF6
                                  Strings
                                  • %04hu-%02hu-%02huT%02hu:%02hu:%02hu%c%02u:%02u, xrefs: 00718B41
                                  • feclient.dll, xrefs: 00718ABE
                                  • %04hu-%02hu-%02huT%02hu:%02hu:%02huZ, xrefs: 00718ACD
                                  • crypt32.dll, xrefs: 00718AB4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Time$InformationLocalSpecificSystemZone
                                  • String ID: %04hu-%02hu-%02huT%02hu:%02hu:%02hu%c%02u:%02u$%04hu-%02hu-%02huT%02hu:%02hu:%02huZ$crypt32.dll$feclient.dll
                                  • API String ID: 1772835396-1985132828
                                  • Opcode ID: 69a38e46b50cd63fa79e102faecd4633adb4102ba91ae7d0ce016af27fffcf6b
                                  • Instruction ID: 21260029aa00b19326eebb4ed0cf31d620b636d721b01b500c7d7f221b1e86c4
                                  • Opcode Fuzzy Hash: 69a38e46b50cd63fa79e102faecd4633adb4102ba91ae7d0ce016af27fffcf6b
                                  • Instruction Fuzzy Hash: 9D210CA2900128AED764DB99CC45FBFB3FDEB4C711F00855AB945D2180E73CAA80D774
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 30a0d407aa8b3771bc351351438d54ab826518551480bfaa36f1eaab386a2aed
                                  • Instruction ID: 250b602118c01723ffeab31c95e7a3adfd78f2c2f4b08a068597036872d65ac8
                                  • Opcode Fuzzy Hash: 30a0d407aa8b3771bc351351438d54ab826518551480bfaa36f1eaab386a2aed
                                  • Instruction Fuzzy Hash: 1FC22771E04629CFDB25CE28CD407AAB3F5EB48315F1446EAD84DE7280E779AE818F41
                                  APIs
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D625C
                                  • Failed to set variant value., xrefs: 006D6282
                                  • Failed to get the user name., xrefs: 006D6266
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastNameUser
                                  • String ID: Failed to get the user name.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 2054405381-3472711869
                                  • Opcode ID: 0208ad5bd83374eba7b5fde51c79370479f6893fa22555849043d2a121247307
                                  • Instruction ID: 0cb050ba3469fbe69f36347ee5b161566e04ff0a8161a5200e0b2a3aeed97f54
                                  • Opcode Fuzzy Hash: 0208ad5bd83374eba7b5fde51c79370479f6893fa22555849043d2a121247307
                                  • Instruction Fuzzy Hash: 3D01F972E0033D67D7219B98CC45EEF77A9AF00710F114256F854E7381DA789F448AD4
                                  APIs
                                  • FormatMessageW.KERNEL32(006D42CC,006D54CB,?,00000000,00000000,00000000,?,80070656,?,?,?,006EE5DB,00000000,006D54CB,00000000,80070656), ref: 006D20A9
                                  • GetLastError.KERNEL32(?,?,?,006EE5DB,00000000,006D54CB,00000000,80070656,?,?,006E403F,006D54CB,?,80070656,00000001,crypt32.dll), ref: 006D20B6
                                  • LocalFree.KERNEL32(00000000,?,00000000,00000000,?,?,?,006EE5DB,00000000,006D54CB,00000000,80070656,?,?,006E403F,006D54CB), ref: 006D20FD
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\strutil.cpp, xrefs: 006D20DA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFormatFreeLastLocalMessage
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\strutil.cpp
                                  • API String ID: 1365068426-2901571208
                                  • Opcode ID: e79e6bc3bd3b3675ef02ecbc04617c6b2ce8ad17acbdd532d2390c76797f8c8e
                                  • Instruction ID: b93381a0e71c303f9066096db2d55d5396724ea09c7bff7f6e3bbc502e0be6a9
                                  • Opcode Fuzzy Hash: e79e6bc3bd3b3675ef02ecbc04617c6b2ce8ad17acbdd532d2390c76797f8c8e
                                  • Instruction Fuzzy Hash: 6B0161B6D4112AFBDB209B95DD05ADF7AADEF04750F018166BE01E7340E6349E00D6E4
                                  APIs
                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000003,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,006F68BF,00000000,00000003), ref: 006F692A
                                  • GetLastError.KERNEL32(?,006F68BF,00000000,00000003,00000000,?,?,?,?,?,?,?,?,?,006F6CAE,?), ref: 006F6934
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\msuengine.cpp, xrefs: 006F6958
                                  • Failed to set service start type., xrefs: 006F6962
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ChangeConfigErrorLastService
                                  • String ID: Failed to set service start type.$c:\agent\_work\79\s\src\burn\engine\msuengine.cpp
                                  • API String ID: 1456623077-436683145
                                  • Opcode ID: d44f7fed8008fa2a5827e116058fd0c7ad023ea43f9909f77a888a1a515b036d
                                  • Instruction ID: 9a2a4824e2f58424c90d60f223c2b40527729a76c2b37be3945e6e0919e78521
                                  • Opcode Fuzzy Hash: d44f7fed8008fa2a5827e116058fd0c7ad023ea43f9909f77a888a1a515b036d
                                  • Instruction Fuzzy Hash: CCF0EC33A4513A739630159D9C09EDB7D59EF12B71B128315FE78BA2D0DA698C0046D4
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 007038A2
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 007038AC
                                  • UnhandledExceptionFilter.KERNEL32(80003CDD,?,?,?,?,?,?), ref: 007038B9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: 9b10ac32f02d5638a65f07f978a1d0763b870323ab0b770ab7908a028c38a8cb
                                  • Instruction ID: 4d84ad3091b159a1d1e2e6cea5a5a6c1864b2388ad16697b5dbbbdb94eb26320
                                  • Opcode Fuzzy Hash: 9b10ac32f02d5638a65f07f978a1d0763b870323ab0b770ab7908a028c38a8cb
                                  • Instruction Fuzzy Hash: 9431B77490121C9BCB61DF64D8897DDBBB8FF08310F5082EAE51CA72A1E7349B858F59
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,00704412,00000000,80004004,?,00000000,?,00701641), ref: 00704435
                                  • TerminateProcess.KERNEL32(00000000,?,00704412,00000000,80004004,?,00000000,?,00701641), ref: 0070443C
                                  • ExitProcess.KERNEL32 ref: 0070444E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: e164e6654a3813269447576c74810a3f6d127c2e4921b1fd76b91b1c065a8c28
                                  • Instruction ID: 48491b68c4448f67c211cb1fc52ffbf2ee0a80baa946b450bd187fef1f840b09
                                  • Opcode Fuzzy Hash: e164e6654a3813269447576c74810a3f6d127c2e4921b1fd76b91b1c065a8c28
                                  • Instruction Fuzzy Hash: E2E0B671000189EBCF116F68DD0DA9C3BA9FB80381F00C554FA59861B2CB7DDD92DA45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40db5b7c9d8279b3a366fc659f2216b5f731865f41114b0c604240d22f025072
                                  • Instruction ID: 8062b7c35ff5d5cf6633c9fd708b23a93de9d5e9f53701bad39ab8a6c49347ab
                                  • Opcode Fuzzy Hash: 40db5b7c9d8279b3a366fc659f2216b5f731865f41114b0c604240d22f025072
                                  • Instruction Fuzzy Hash: C5022A71E01219EFDF14CFA8C8806AEB7F1FF88314F158269D919AB385D735AA41CB91
                                  APIs
                                    • Part of subcall function 00713E9A: RegCloseKey.ADVAPI32(00000000,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System,00020019,00000000,?,?,?,?,?,00713D3A,?), ref: 00713F0B
                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00713D5E
                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00713D6F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AllocateCheckCloseInitializeMembershipToken
                                  • String ID:
                                  • API String ID: 2114926846-0
                                  • Opcode ID: 52b072d44b9fcc210990823ce6d53812d15c632673d175f73c4ba4848fef94ad
                                  • Instruction ID: e46bf5c9b16eff7c7c0d1401857405729675d9762b0d129ab7adec16c21bce33
                                  • Opcode Fuzzy Hash: 52b072d44b9fcc210990823ce6d53812d15c632673d175f73c4ba4848fef94ad
                                  • Instruction Fuzzy Hash: 56113970A0020EEBDB10DFA8DC85BEFB7F8FF08304F50482DA251A6191D7789A84CB54
                                  APIs
                                  • FindFirstFileW.KERNEL32(006F8F8D,?,00000100,00000000,00000000), ref: 007146FF
                                  • FindClose.KERNEL32(00000000), ref: 0071470B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: e68d1b66801c8e540707f5fb1acdb40ab4c112e8dfacc6550cabf9c869d5b757
                                  • Instruction ID: e09486d66efe89670da3a8c07e378a81cf1134ce5fbc0e41af68e64b8a6dbcf2
                                  • Opcode Fuzzy Hash: e68d1b66801c8e540707f5fb1acdb40ab4c112e8dfacc6550cabf9c869d5b757
                                  • Instruction Fuzzy Hash: EA01817560020CABDB10EFA99D89DEBB7BDEFC6316F004065E919D32C0D738AD898B54
                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0070F1AD,?,?,00000008,?,?,0070EE41,00000000), ref: 0070F3DF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: d0281919849f78638de89fbb93ac6fe771c02ce7c433cf8a3d59111ce43c593a
                                  • Instruction ID: 504e8975a26019e688c39f9459b6ae7d04ba85e137cf213cab457e7ff848e341
                                  • Opcode Fuzzy Hash: d0281919849f78638de89fbb93ac6fe771c02ce7c433cf8a3d59111ce43c593a
                                  • Instruction Fuzzy Hash: D6B14C35610609CFD724CF28C486B697BE0FF45364F258668E999CF6E1C339E992CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3fb8338d501391d05a1fd7068e30b64c304bed43e3ea9ab900391464e9efb64c
                                  • Instruction ID: 90e0e88ba6136394f7eb2de59929a4ca820071029a633f5a29580a2558a3dd40
                                  • Opcode Fuzzy Hash: 3fb8338d501391d05a1fd7068e30b64c304bed43e3ea9ab900391464e9efb64c
                                  • Instruction Fuzzy Hash: ED31B472D04219EFDB28DF69CC89DAB77B9EB84350F148659F905972C1EA34BE40CB50
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0002E733,006FDE08), ref: 006FE72C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: d38ff2b8e735cf27ba010bc3a6541c4b7efd8a75c2a8be32438296477e000483
                                  • Instruction ID: f87df1ef04dc3d6562b03ad5a1669b869fcbc62b994d74bb75cff511c23b1c9d
                                  • Opcode Fuzzy Hash: d38ff2b8e735cf27ba010bc3a6541c4b7efd8a75c2a8be32438296477e000483
                                  • Instruction Fuzzy Hash:
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 44ee74e08a45ab47a5fbf058204854090db78880ec3f422a79573c2b98e1bc1d
                                  • Instruction ID: 259ea3a12599e7e745fc1b387d46e2874fdfbfb3db7d81595567dd286313500a
                                  • Opcode Fuzzy Hash: 44ee74e08a45ab47a5fbf058204854090db78880ec3f422a79573c2b98e1bc1d
                                  • Instruction Fuzzy Hash: 2B615777710205D6DB38AA28889D7BEB3D5AB51704F548B1EE442EB2C3DB6DED838305
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 17e95ed392a724f7cd599a3e1a6932c07ecfe8e0e91b59132266eab648f21c0b
                                  • Instruction ID: 1508bea591a0025d8442393aea2d0c7b81f05aae989d6a483bc997e8f93b84de
                                  • Opcode Fuzzy Hash: 17e95ed392a724f7cd599a3e1a6932c07ecfe8e0e91b59132266eab648f21c0b
                                  • Instruction Fuzzy Hash: 7B519E73604608DADF398968C89D7BEA7DDAF01300F14035ED582D7AC3DA1FAD4B8606
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                  • Instruction ID: 84288a33c791bbf06138781656dc15bd893495ea7d57fc2de2468db6d5ca84cb
                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                  • Instruction Fuzzy Hash: 6791B9721090E38ADB6E463D853853EFFE15E523B1B1A07ADE4F2CB5C1EE28C564D660
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                  • Instruction ID: f769538891543ddb576732ce9e0f50bb178f98f9cb8876bde8624fd8edc366f5
                                  • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                  • Instruction Fuzzy Hash: 2D91AD721080E38DDB69423D853453DFFE15A923B1B1A07ADD4F2CB5D5EE28C574DA60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                  • Instruction ID: 1e9f3d32a30adf3dfd722c1eb0f0048fa81856c54749d789a20d325f08475d42
                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                  • Instruction Fuzzy Hash: E09194722090E74EDB69433E843417EFFE25E523B171A07ADE4F2CA1C1EE28C564D660
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                  • Instruction ID: fea67298acdcf863e0b4ee083315b28b35c1ccfbb442b8282baca60a94a32b63
                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                  • Instruction Fuzzy Hash: E78186722080AB0EDB69433D853447EFFE35E513A131A07BDD5F2CA6D6EE24C564D620
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b30ba7d3b3a086f661f5c9c6ca10734b9223244faa3fc9e900ac31b1920a109
                                  • Instruction ID: 2615740aa27680c75dd647cd9440fa99cf206cb38ba702f4a4c553d0148a4b0f
                                  • Opcode Fuzzy Hash: 3b30ba7d3b3a086f661f5c9c6ca10734b9223244faa3fc9e900ac31b1920a109
                                  • Instruction Fuzzy Hash: 1F21A473F2053847770CC47E8C562B9B6E1C68C501745827AE9A6DA3C1D968D917E2E4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af2de9e3a2a527ca0d8387873407ce3f01140a323231b3c25390372088802005
                                  • Instruction ID: 7d6723d69beb044b95eab42fc3f0a6dc7cdba26ccf353a3dc76084058949e721
                                  • Opcode Fuzzy Hash: af2de9e3a2a527ca0d8387873407ce3f01140a323231b3c25390372088802005
                                  • Instruction Fuzzy Hash: 6911A723F30C295B675C81AD8C172BAA2D6DBD825070F433AD826E7384E994DE23D290
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9cc6b2dd824b08b2f17b87951fe2886d4bc0a590ba30c1ec50195a6cc8cb7c91
                                  • Instruction ID: 72a7d966cf30d97eb21c7882d24206a5ca45cff0585a8f03f41371e92fa98492
                                  • Opcode Fuzzy Hash: 9cc6b2dd824b08b2f17b87951fe2886d4bc0a590ba30c1ec50195a6cc8cb7c91
                                  • Instruction Fuzzy Hash: 2DE04632912268EBC725DEC8994899AF3ECEB09B20B11469AF914D3241C678DE00C7D1
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000101,?,?,00020006,00000000), ref: 006E0528
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close
                                  • String ID: /uninstall$"%ls" %ls$"%ls" /modify$"%ls" /uninstall /quiet$%hs$%hu.%hu.%hu.%hu$%s,0$/modify$3.14.0.3910$BundleAddonCode$BundleCachePath$BundleDetectCode$BundlePatchCode$BundleProviderKey$BundleTag$BundleUpgradeCode$BundleVersion$Comments$Contact$DisplayIcon$DisplayVersion$EngineVersion$EstimatedSize$Failed to cache bundle from path: %ls$Failed to create registration key.$Failed to register the bundle dependency key.$Failed to update name and publisher.$Failed to update resume mode.$Failed to write %ls value.$Failed to write software tags.$Failed to write update registration.$HelpLink$HelpTelephone$ModifyPath$NoElevateOnModify$NoModify$NoRemove$ParentDisplayName$ParentKeyName$Publisher$QuietUninstallString$SystemComponent$URLInfoAbout$URLUpdateInfo$UninstallString$VersionMajor$VersionMinor$crypt32.dll
                                  • API String ID: 3535843008-3464079327
                                  • Opcode ID: fd00b6b4ba6569694af45f57ebc4de5e0d85a879fa623b12c435997fddb0fdc5
                                  • Instruction ID: 8a763bb088f5269cc98d254bcf23863dd297302ee11fae59e0547c3bb198d53d
                                  • Opcode Fuzzy Hash: fd00b6b4ba6569694af45f57ebc4de5e0d85a879fa623b12c435997fddb0fdc5
                                  • Instruction Fuzzy Hash: 75F12971903BBAFBEB225655DE46FA975A6BB10710F404160FE007A3D1D7B8EEE096C0
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?,msasn1.dll,00000000,80070490,?,?,?,?,?,?,?,BTm,006FBED0,0071B570,?,0071B594), ref: 006D8494
                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,BTm,006FBED0,0071B570,?,0071B594,?,?,Chain), ref: 006D87F7
                                  Strings
                                  • msasn1.dll, xrefs: 006D8470
                                  • Failed to find variable value '%ls'., xrefs: 006D87C5
                                  • Initializing numeric variable '%ls' to value '%ls', xrefs: 006D85CF
                                  • Hidden, xrefs: 006D851C
                                  • Failed to get @Type., xrefs: 006D8771
                                  • Attempt to set built-in variable value: %ls, xrefs: 006D87BB
                                  • Invalid value for @Type: %ls, xrefs: 006D875E
                                  • Failed to get @Persisted., xrefs: 006D87D4
                                  • Failed to get @Value., xrefs: 006D877F
                                  • numeric, xrefs: 006D85A9
                                  • Variable, xrefs: 006D849E
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D87AC
                                  • Failed to set variant value., xrefs: 006D8778
                                  • Failed to change variant type., xrefs: 006D87CD
                                  • version, xrefs: 006D8619
                                  • Failed to get next node., xrefs: 006D87E9
                                  • Initializing version variable '%ls' to value '%ls', xrefs: 006D8640
                                  • Persisted, xrefs: 006D8537
                                  • Failed to set variant encryption, xrefs: 006D8790
                                  • Initializing hidden variable '%ls', xrefs: 006D865E
                                  • BTm, xrefs: 006D8463
                                  • Failed to insert variable '%ls'., xrefs: 006D8789
                                  • Type, xrefs: 006D8590
                                  • Failed to get @Id., xrefs: 006D87E2
                                  • Initializing string variable '%ls' to value '%ls', xrefs: 006D8607
                                  • string, xrefs: 006D85E4
                                  • Failed to select variable nodes., xrefs: 006D84B1
                                  • Failed to set value of variable: %ls, xrefs: 006D879A
                                  • Failed to get variable node count., xrefs: 006D84CE
                                  • Value, xrefs: 006D8552
                                  • Failed to get @Hidden., xrefs: 006D87DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Attempt to set built-in variable value: %ls$BTm$Failed to change variant type.$Failed to find variable value '%ls'.$Failed to get @Hidden.$Failed to get @Id.$Failed to get @Persisted.$Failed to get @Type.$Failed to get @Value.$Failed to get next node.$Failed to get variable node count.$Failed to insert variable '%ls'.$Failed to select variable nodes.$Failed to set value of variable: %ls$Failed to set variant encryption$Failed to set variant value.$Hidden$Initializing hidden variable '%ls'$Initializing numeric variable '%ls' to value '%ls'$Initializing string variable '%ls' to value '%ls'$Initializing version variable '%ls' to value '%ls'$Invalid value for @Type: %ls$Persisted$Type$Value$Variable$c:\agent\_work\79\s\src\burn\engine\variable.cpp$msasn1.dll$numeric$string$version
                                  • API String ID: 3168844106-1245998078
                                  • Opcode ID: f40e6ef7f1ddc4ac9268de8223ea410c5b2459b6697eb15420effab7f71593c0
                                  • Instruction ID: c00f54f33d4538b2a2b72d9e1aced85ba4ffa07ba56040457d07eac6846eaac7
                                  • Opcode Fuzzy Hash: f40e6ef7f1ddc4ac9268de8223ea410c5b2459b6697eb15420effab7f71593c0
                                  • Instruction Fuzzy Hash: 08B1B3B2D40219FFCB129B98CC49EEEBB76AF44710F204156F914B73D1DB789A819B90
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,006EBCAE,00000007,?,?,?), ref: 006F6AA6
                                    • Part of subcall function 00710DDC: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,006D5EE0,00000000), ref: 00710DF0
                                    • Part of subcall function 00710DDC: GetProcAddress.KERNEL32(00000000), ref: 00710DF7
                                    • Part of subcall function 00710DDC: GetLastError.KERNEL32(?,?,?,006D5EE0,00000000), ref: 00710E0E
                                  • CloseHandle.KERNEL32(00000000,?,000001F4,?,?,?,?,?,?,?,?,?,?,wusa.exe,?,00000025), ref: 006F6E95
                                  • CloseHandle.KERNEL32(00000000,?,000001F4,?,?,?,?,?,?,?,?,?,?,wusa.exe,?,00000025), ref: 006F6EA9
                                  Strings
                                  • wusa.exe, xrefs: 006F6B26
                                  • Failed to get cached path for package: %ls, xrefs: 006F6B82
                                  • WixBundleExecutePackageCacheFolder, xrefs: 006F6B91, 006F6EC1
                                  • Failed to append SysNative directory., xrefs: 006F6B03
                                  • Failed to append log switch to MSU command-line., xrefs: 006F6C3C
                                  • Failed to wait for executable to complete: %ls, xrefs: 006F6E24
                                  • D, xrefs: 006F6CC1
                                  • Failed to allocate WUSA.exe path., xrefs: 006F6B39
                                  • Failed to get process exit code., xrefs: 006F6DB2
                                  • "%ls" /uninstall /kb:%ls /quiet /norestart, xrefs: 006F6BFB
                                  • Failed to build MSU path., xrefs: 006F6BBB
                                  • Failed to determine WOW64 status., xrefs: 006F6AB8
                                  • Failed to find System32 directory., xrefs: 006F6B1B
                                  • /log:, xrefs: 006F6C28
                                  • "%ls" "%ls" /quiet /norestart, xrefs: 006F6BCE
                                  • Failed to format MSU uninstall command., xrefs: 006F6C0F
                                  • c:\agent\_work\79\s\src\burn\engine\msuengine.cpp, xrefs: 006F6D13, 006F6DA8, 006F6DD0
                                  • Failed to format MSU install command., xrefs: 006F6BE2
                                  • Failed to CreateProcess on path: %ls, xrefs: 006F6D20
                                  • Failed to get action arguments for MSU package., xrefs: 006F6B5C
                                  • Bootstrapper application aborted during MSU progress., xrefs: 006F6DDA
                                  • Failed to append log path to MSU command-line., xrefs: 006F6C5A
                                  • Failed to find Windows directory., xrefs: 006F6AE5
                                  • 2, xrefs: 006F6D39
                                  • SysNative\, xrefs: 006F6AF0
                                  • Failed to ensure WU service was enabled to install MSU package., xrefs: 006F6CB4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Handle$Close$AddressCurrentErrorLastModuleProcProcess
                                  • String ID: /log:$"%ls" "%ls" /quiet /norestart$"%ls" /uninstall /kb:%ls /quiet /norestart$2$Bootstrapper application aborted during MSU progress.$D$Failed to CreateProcess on path: %ls$Failed to allocate WUSA.exe path.$Failed to append SysNative directory.$Failed to append log path to MSU command-line.$Failed to append log switch to MSU command-line.$Failed to build MSU path.$Failed to determine WOW64 status.$Failed to ensure WU service was enabled to install MSU package.$Failed to find System32 directory.$Failed to find Windows directory.$Failed to format MSU install command.$Failed to format MSU uninstall command.$Failed to get action arguments for MSU package.$Failed to get cached path for package: %ls$Failed to get process exit code.$Failed to wait for executable to complete: %ls$SysNative\$WixBundleExecutePackageCacheFolder$c:\agent\_work\79\s\src\burn\engine\msuengine.cpp$wusa.exe
                                  • API String ID: 1400713077-82762285
                                  • Opcode ID: 75f33a10fe07d6a147597778a37e42ae8259c4907ee5d7fa4a58d1b0d007974a
                                  • Instruction ID: da89296337763377e76cc976c0a33116f443a77c8ce64612f60fb4dd2472d142
                                  • Opcode Fuzzy Hash: 75f33a10fe07d6a147597778a37e42ae8259c4907ee5d7fa4a58d1b0d007974a
                                  • Instruction Fuzzy Hash: 49D190B1A0031EAFDB219FE4DD85EFE7ABAAF18700F10412AF700A6251D7B59E54DB50
                                  APIs
                                  • lstrlenW.KERNEL32(?,?,00000000,?,?,00000000,75A8B390,?,006D457C,?,0071B500), ref: 006E547B
                                  • GetCurrentProcessId.KERNEL32(?,006D457C,?,0071B500), ref: 006E5486
                                  • SetNamedPipeHandleState.KERNEL32(?,000000FF,00000000,00000000,?,006D457C,?,0071B500), ref: 006E54BD
                                  • ConnectNamedPipe.KERNEL32(?,00000000,?,006D457C,?,0071B500), ref: 006E54D2
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E54DC
                                  • Sleep.KERNEL32(00000064,?,006D457C,?,0071B500), ref: 006E5511
                                  • SetNamedPipeHandleState.KERNEL32(?,00000000,00000000,00000000,?,006D457C,?,0071B500), ref: 006E5534
                                  • WriteFile.KERNEL32(?,crypt32.dll,00000004,00000000,00000000,?,006D457C,?,0071B500), ref: 006E554F
                                  • WriteFile.KERNEL32(?,|Em,0071B500,00000000,00000000,?,006D457C,?,0071B500), ref: 006E556A
                                  • WriteFile.KERNEL32(?,0071B4B8,00000004,feclient.dll,00000000,?,006D457C,?,0071B500), ref: 006E5585
                                  • ReadFile.KERNEL32(?,wininet.dll,00000004,feclient.dll,00000000,?,006D457C,?,0071B500), ref: 006E55A0
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E55FB
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E562F
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E5663
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E5697
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E56C8
                                  • GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E56F9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$File$NamedPipeWrite$HandleState$ConnectCurrentProcessReadSleeplstrlen
                                  • String ID: Failed to read ACK from pipe.$Failed to reset pipe to blocking.$Failed to set pipe to non-blocking.$Failed to wait for child to connect to pipe.$Failed to write our process id to pipe.$Failed to write secret length to pipe.$Failed to write secret to pipe.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$crypt32.dll$feclient.dll$wininet.dll$|Em
                                  • API String ID: 2944378912-2147848423
                                  • Opcode ID: 3cfeb0d155f8a0650ae5b496084b4d0fb0fe9d2fe5c62b14164a21193cf6ec1b
                                  • Instruction ID: 44199c1a1dfe0b22a5aa6fd4936aef21f3cf466721cdaee5058785160c4b842c
                                  • Opcode Fuzzy Hash: 3cfeb0d155f8a0650ae5b496084b4d0fb0fe9d2fe5c62b14164a21193cf6ec1b
                                  • Instruction Fuzzy Hash: F961FA77D82735ABD7209AAA8C45BDE66AA6F00754F124125FE02FF2D0D77CCD008AE5
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,generator,000000FF,?,?,?), ref: 00717782
                                  • SysFreeString.OLEAUT32(00000000), ref: 0071794B
                                  • SysFreeString.OLEAUT32(00000000), ref: 007179E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$FreeHeap$AllocateCompareProcess
                                  • String ID: ($@$`)u$author$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp$category$entry$generator$icon$link$logo$subtitle$title$updated
                                  • API String ID: 1555028553-2690593432
                                  • Opcode ID: 30c6f9667ed735d095e02cfe3950322c8e396494bf638a6fe978e25c78e65b94
                                  • Instruction ID: a4b2acb317caa55a52d9ce26b8590804212a25bc5cdf311e91b164458b768234
                                  • Opcode Fuzzy Hash: 30c6f9667ed735d095e02cfe3950322c8e396494bf638a6fe978e25c78e65b94
                                  • Instruction Fuzzy Hash: 6FB1BF7194C216BBDB289B68CC86FEDB674AB04730F204355F521BA2D1D778EE84D790
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,00737460,000000FF,?,?,?), ref: 007173FB
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,summary,000000FF), ref: 00717420
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,title,000000FF), ref: 00717440
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,published,000000FF), ref: 0071745C
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,updated,000000FF), ref: 00717484
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,author,000000FF), ref: 007174A0
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,category,000000FF), ref: 007174D9
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,content,000000FF), ref: 00717512
                                    • Part of subcall function 00716F7D: SysFreeString.OLEAUT32(00000000), ref: 007170B6
                                    • Part of subcall function 00716F7D: SysFreeString.OLEAUT32(00000000), ref: 007170F5
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717596
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717646
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$Compare$Free
                                  • String ID: ($`)u$author$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp$cabinet.dll$category$clbcatq.dll$content$feclient.dll$link$msi.dll$published$summary$title$updated$version.dll
                                  • API String ID: 318886736-4277159395
                                  • Opcode ID: 85dd9bf5594885447acdfcd5f9556e88dc80ecafb7eee1a47827b1e17eff7e04
                                  • Instruction ID: 9c18176009d46df7380a0f5e6216028650f36e629ea96bef691a0991201cb3b1
                                  • Opcode Fuzzy Hash: 85dd9bf5594885447acdfcd5f9556e88dc80ecafb7eee1a47827b1e17eff7e04
                                  • Instruction Fuzzy Hash: FCA1DF71908626FBDB298B9CCC41FEDB674AF04730F204355F925AA1D1D778EA90DB90
                                  APIs
                                  • UuidCreate.RPCRT4(?), ref: 006FD1A5
                                  • StringFromGUID2.OLE32(?,?,00000027), ref: 006FD1CE
                                  • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?), ref: 006FD2B7
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 006FD2C1
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000064,?,?,?,?), ref: 006FD35A
                                  • WaitForSingleObject.KERNEL32(0071B500,000000FF,?,?,?,?), ref: 006FD365
                                  • ReleaseMutex.KERNEL32(0071B500,?,?,?,?), ref: 006FD38F
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 006FD3B0
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 006FD3BE
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 006FD3F6
                                    • Part of subcall function 006FD038: WaitForSingleObject.KERNEL32(?,000000FF,759230B0,00000000,?,?,?,006FD334,?), ref: 006FD057
                                    • Part of subcall function 006FD038: ReleaseMutex.KERNEL32(?,?,?,006FD334,?), ref: 006FD06B
                                    • Part of subcall function 006FD038: WaitForSingleObject.KERNEL32(?,000000FF), ref: 006FD0B0
                                    • Part of subcall function 006FD038: ReleaseMutex.KERNEL32(?), ref: 006FD0C3
                                    • Part of subcall function 006FD038: SetEvent.KERNEL32(?), ref: 006FD0CC
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 006FD49F
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 006FD4B7
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp, xrefs: 006FD1E3, 006FD2E5, 006FD3E2, 006FD41A
                                  • Failed to CreateProcess on path: %ls, xrefs: 006FD2F0
                                  • Failed to create netfx chainer., xrefs: 006FD250
                                  • Failed to wait for netfx chainer process to complete, xrefs: 006FD424
                                  • Failed to create netfx chainer guid., xrefs: 006FD1B2
                                  • Failed to get netfx return code., xrefs: 006FD3EC
                                  • Failed to allocate event name., xrefs: 006FD231
                                  • Failed to process netfx chainer message., xrefs: 006FD33A
                                  • Failed to convert netfx chainer guid into string., xrefs: 006FD1ED
                                  • NetFxEvent.%ls, xrefs: 006FD21D
                                  • D, xrefs: 006FD29C
                                  • Failed to allocate netfx chainer arguments., xrefs: 006FD285
                                  • NetFxSection.%ls, xrefs: 006FD1FB
                                  • Failed to allocate section name., xrefs: 006FD20F
                                  • %ls /pipe %ls, xrefs: 006FD271
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Wait$ErrorLastMutexObjectReleaseSingle$CloseCreateHandleProcess$CodeEventExitFromMultipleObjectsStringUuid
                                  • String ID: %ls /pipe %ls$D$Failed to CreateProcess on path: %ls$Failed to allocate event name.$Failed to allocate netfx chainer arguments.$Failed to allocate section name.$Failed to convert netfx chainer guid into string.$Failed to create netfx chainer guid.$Failed to create netfx chainer.$Failed to get netfx return code.$Failed to process netfx chainer message.$Failed to wait for netfx chainer process to complete$NetFxEvent.%ls$NetFxSection.%ls$c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp
                                  • API String ID: 1533322865-3196626710
                                  • Opcode ID: ded273d365e2d56e0c3737ac88437b15d68d18a9eb10aae986f8031e850b62c5
                                  • Instruction ID: 3d6fa20f9ffd6ed17da753db1b9a6cdca2e1e6b0ce90c38ce73f39e51be0d72e
                                  • Opcode Fuzzy Hash: ded273d365e2d56e0c3737ac88437b15d68d18a9eb10aae986f8031e850b62c5
                                  • Instruction Fuzzy Hash: 29A17072D0022DABEB219BA8CC45BEEB7B7AB04710F114169EA08B7291D735AD44CF91
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DA418
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DA440
                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,?,?,?,?,?), ref: 006DA73F
                                  Strings
                                  • Registry key not found. Key = '%ls', xrefs: 006DA478
                                  • c:\agent\_work\79\s\src\burn\engine\search.cpp, xrefs: 006DA510, 006DA545, 006DA598, 006DA6A1
                                  • Unsupported registry key value type. Type = '%u', xrefs: 006DA5D2
                                  • Failed to change value type., xrefs: 006DA6E3, 006DA706
                                  • Failed to format key string., xrefs: 006DA425
                                  • Failed to set variable., xrefs: 006DA701
                                  • Failed to open registry key., xrefs: 006DA4B3
                                  • Failed to read registry value., xrefs: 006DA6C8
                                  • Failed to clear variable., xrefs: 006DA49E
                                  • Failed to query registry key value size., xrefs: 006DA51C
                                  • Failed to format value string., xrefs: 006DA44D
                                  • Failed to query registry key value., xrefs: 006DA5A4
                                  • Failed to allocate string buffer., xrefs: 006DA633
                                  • Failed to get expand environment string., xrefs: 006DA6AD
                                  • Registry value not found. Key = '%ls', Value = '%ls', xrefs: 006DA4E2
                                  • Failed to allocate memory registry value., xrefs: 006DA54F
                                  • RegistrySearchValue failed: ID '%ls', HRESULT 0x%x, xrefs: 006DA717
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open@16$Close
                                  • String ID: Failed to allocate memory registry value.$Failed to allocate string buffer.$Failed to change value type.$Failed to clear variable.$Failed to format key string.$Failed to format value string.$Failed to get expand environment string.$Failed to open registry key.$Failed to query registry key value size.$Failed to query registry key value.$Failed to read registry value.$Failed to set variable.$Registry key not found. Key = '%ls'$Registry value not found. Key = '%ls', Value = '%ls'$RegistrySearchValue failed: ID '%ls', HRESULT 0x%x$Unsupported registry key value type. Type = '%u'$c:\agent\_work\79\s\src\burn\engine\search.cpp
                                  • API String ID: 2348241696-664579708
                                  • Opcode ID: 15f3ae2a8b79bb21eb50f18e9afba93d539e00810a66d92cbd890a8caa1fa18b
                                  • Instruction ID: 47fb0ae19c45eb59a62b08505e07882d8bd98b4819df81996c80a4558814575e
                                  • Opcode Fuzzy Hash: 15f3ae2a8b79bb21eb50f18e9afba93d539e00810a66d92cbd890a8caa1fa18b
                                  • Instruction Fuzzy Hash: D0A1A472E04125EBDF219AE88805EEE7ABAAF08710F148126F905BB390D775DD4197E2
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000100,00000100,00000100,00000000,00000100,00000000,?,006DA889,00000100,000002C0,000002C0,00000100), ref: 006D57CC
                                  • lstrlenW.KERNEL32(000002C0,?,006DA889,00000100,000002C0,000002C0,00000100), ref: 006D57D6
                                  • _wcschr.LIBVCRUNTIME ref: 006D59DB
                                  • LeaveCriticalSection.KERNEL32(00000100,00000000,000002C0,000002C0,00000000,000002C0,00000001,?,006DA889,00000100,000002C0,000002C0,00000100), ref: 006D5C7E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave_wcschrlstrlen
                                  • String ID: *****$Failed to allocate buffer for format string.$Failed to allocate record.$Failed to allocate string.$Failed to allocate variable array.$Failed to append placeholder.$Failed to append string.$Failed to copy string.$Failed to determine variable visibility: '%ls'.$Failed to format placeholder string.$Failed to format record.$Failed to get formatted length.$Failed to get variable name.$Failed to reallocate variable array.$Failed to set record format string.$Failed to set record string.$Failed to set variable value.$[%d]$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 1026845265-680246530
                                  • Opcode ID: 44c0ce90d62dc3225a60070c8e2dc84fbd6e633a7bf7bafaf460b99e916f2b41
                                  • Instruction ID: 3fdcdd58c6972b97bfefc36ce4a822821a3cec5aaadff39269a9ab088bf298d4
                                  • Opcode Fuzzy Hash: 44c0ce90d62dc3225a60070c8e2dc84fbd6e633a7bf7bafaf460b99e916f2b41
                                  • Instruction Fuzzy Hash: 74F1C571D00625EBDB209FA48841EFF7B66AB04B50F15812BFD06AB780D7389E419FA4
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,?,00000000,00000018,00000001,?,00000000,?,?,006FD24A,?,?,?), ref: 006FCBC5
                                  • GetLastError.KERNEL32(?,?,006FD24A,?,?,?), ref: 006FCBD2
                                  • ReleaseMutex.KERNEL32(?), ref: 006FCE3A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCreateErrorEventLastMutexProcessRelease
                                  • String ID: %ls_mutex$%ls_send$Failed to MapViewOfFile for %ls.$Failed to allocate memory for NetFxChainer struct.$Failed to create event: %ls$Failed to create mutex: %ls$Failed to memory map cabinet file: %ls$c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp$failed to allocate memory for event name$failed to allocate memory for mutex name$failed to copy event name to shared memory structure.
                                  • API String ID: 3944734951-596133599
                                  • Opcode ID: 131de2d484d192578513d10234efe49c2b927fe70e365f1cab4b99d355930d2a
                                  • Instruction ID: 96f42d90cea7cf6ced55cc36d1859a9bcd9f674e530d4ac24a7ada064fd62717
                                  • Opcode Fuzzy Hash: 131de2d484d192578513d10234efe49c2b927fe70e365f1cab4b99d355930d2a
                                  • Instruction Fuzzy Hash: DF81F9B6A4172ABBD3214B688D59FAB7EA5BF04720F018165FE04AB381D778DD00D6E4
                                  APIs
                                    • Part of subcall function 007135AF: VariantInit.OLEAUT32(0071B594), ref: 007135C5
                                    • Part of subcall function 007135AF: SysAllocString.OLEAUT32(?), ref: 007135E1
                                    • Part of subcall function 007135AF: VariantClear.OLEAUT32(?), ref: 00713668
                                    • Part of subcall function 007135AF: SysFreeString.OLEAUT32(00000000), ref: 00713673
                                  • CompareStringW.KERNEL32(0000007F,00000000,000000FF,000000FF,Detect,000000FF,?,0071CB64,?,?,Action,?,?,?,00000000,?), ref: 006DEACA
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,Upgrade,000000FF), ref: 006DEB14
                                  Strings
                                  • Patch, xrefs: 006DEB94
                                  • Failed to get @Action., xrefs: 006DEC20
                                  • Failed to resize Detect code array in registration, xrefs: 006DEBE5
                                  • Failed to resize Addon code array in registration, xrefs: 006DEBF3
                                  • Failed to get next RelatedBundle element., xrefs: 006DEC27
                                  • Detect, xrefs: 006DEABB
                                  • cabinet.dll, xrefs: 006DEB71
                                  • Failed to get RelatedBundle nodes, xrefs: 006DEA29
                                  • Failed to resize Upgrade code array in registration, xrefs: 006DEBEC
                                  • RelatedBundle, xrefs: 006DEA07
                                  • Failed to get RelatedBundle element count., xrefs: 006DEA4E
                                  • Failed to get @Id., xrefs: 006DEC19
                                  • Upgrade, xrefs: 006DEB07
                                  • Failed to resize Patch code array in registration, xrefs: 006DEBFA
                                  • version.dll, xrefs: 006DEB27
                                  • Addon, xrefs: 006DEB51
                                  • Action, xrefs: 006DEA87
                                  • Invalid value for @Action: %ls, xrefs: 006DEC09
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$CompareVariant$AllocClearFreeInit
                                  • String ID: Action$Addon$Detect$Failed to get @Action.$Failed to get @Id.$Failed to get RelatedBundle element count.$Failed to get RelatedBundle nodes$Failed to get next RelatedBundle element.$Failed to resize Addon code array in registration$Failed to resize Detect code array in registration$Failed to resize Patch code array in registration$Failed to resize Upgrade code array in registration$Invalid value for @Action: %ls$Patch$RelatedBundle$Upgrade$cabinet.dll$version.dll
                                  • API String ID: 702752599-130283994
                                  • Opcode ID: a150bc62f50b180da840d3c46b0119d54a3a39c8a04f7d2360588b550749fc8d
                                  • Instruction ID: c747fa968db22cfef62303003a7c50c9e38920ac8dde6bc048f8b3778305be29
                                  • Opcode Fuzzy Hash: a150bc62f50b180da840d3c46b0119d54a3a39c8a04f7d2360588b550749fc8d
                                  • Instruction Fuzzy Hash: 9071B170E45626FBC720AB54C941EAEB776FB04724F204256E921AB3C1C735EE52CB90
                                  APIs
                                  • GetCurrentProcessId.KERNEL32(?,8000FFFF,feclient.dll,?,006E4B78,0071B4E8,?,feclient.dll,00000000,?,?), ref: 006E467C
                                  • ReadFile.KERNEL32(feclient.dll,feclient.dll,00000004,?,00000000,?,006E4B78,0071B4E8,?,feclient.dll,00000000,?,?), ref: 006E469D
                                  • GetLastError.KERNEL32(?,006E4B78,0071B4E8,?,feclient.dll,00000000,?,?), ref: 006E46A3
                                  • ReadFile.KERNEL32(feclient.dll,00000000,0071B518,?,00000000,00000000,0071B519,?,006E4B78,0071B4E8,?,feclient.dll,00000000,?,?), ref: 006E4731
                                  • GetLastError.KERNEL32(?,006E4B78,0071B4E8,?,feclient.dll,00000000,?,?), ref: 006E4737
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead$CurrentProcess
                                  • String ID: Failed to allocate buffer for verification secret.$Failed to inform parent process that child is running.$Failed to read size of verification secret from parent pipe.$Failed to read verification process id from parent pipe.$Failed to read verification secret from parent pipe.$Verification process id from parent does not match.$Verification secret from parent does not match.$Verification secret from parent is too big.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$feclient.dll$msasn1.dll
                                  • API String ID: 1233551569-195037519
                                  • Opcode ID: 45b326bada5bfc175b0344ea67c3c9adacec7466783c4f928000d785fc1d2665
                                  • Instruction ID: 246bc92f6a573c2157a84c205f6654778089a2aa9a6218eacff864fe7cdff6e6
                                  • Opcode Fuzzy Hash: 45b326bada5bfc175b0344ea67c3c9adacec7466783c4f928000d785fc1d2665
                                  • Instruction Fuzzy Hash: AF513777D42376B7DB219AA65C45FAF766AAF00B20F114119FE10BB280DB38DD0096E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: StringVariant$AllocClearFreeInit
                                  • String ID: DetectCondition$Failed to get @DetectCondition.$Failed to get @InstallArguments.$Failed to get @Protocol.$Failed to get @RepairArguments.$Failed to get @Repairable.$Failed to get @UninstallArguments.$Failed to parse command lines.$Failed to parse exit codes.$InstallArguments$Invalid protocol type: %ls$Protocol$RepairArguments$Repairable$UninstallArguments$burn$netfx4$none
                                  • API String ID: 760788290-1911311241
                                  • Opcode ID: 583eefe9592f8e99628b3c0ae665f90e2cc8d2354ed8dd39999257febd741dbe
                                  • Instruction ID: 5bb3760649efce6a1a5cf2d95f89b501d0ca57d1ed1a34b3f3f16fe0fb69285a
                                  • Opcode Fuzzy Hash: 583eefe9592f8e99628b3c0ae665f90e2cc8d2354ed8dd39999257febd741dbe
                                  • Instruction Fuzzy Hash: 66412D71A8477FF7C711B5649C52FBA775AAB10B30F200311FB20B62C2DB68AD055AD0
                                  APIs
                                  • GetStringTypeW.KERNEL32(00000001,560071DC,00000001,?,006D990B,?,00000000,00000000,?,?,006D98F3,?,?,00000000,?), ref: 006D8F7D
                                  Strings
                                  • Failed to parse condition "%ls". Unexpected character at position %d., xrefs: 006D912F
                                  • Failed to parse condition "%ls". Unterminated literal at position %d., xrefs: 006D9065
                                  • Failed to parse condition "%ls". Unexpected '~' operator at position %d., xrefs: 006D93D5
                                  • -, xrefs: 006D90E5
                                  • Failed to parse condition "%ls". Invalid version format, at position %d., xrefs: 006D920F
                                  • Failed to parse condition "%ls". Version can have a maximum of 4 parts, at position %d., xrefs: 006D91AB
                                  • NOT, xrefs: 006D92A8
                                  • Failed to parse condition "%ls". Constant too big, at position %d., xrefs: 006D934D
                                  • Failed to parse condition "%ls". Identifier cannot start at a digit, at position %d., xrefs: 006D9391
                                  • Failed to set symbol value., xrefs: 006D902D
                                  • AND, xrefs: 006D9289
                                  • c:\agent\_work\79\s\src\burn\engine\condition.cpp, xrefs: 006D9051, 006D911B, 006D9197, 006D91FB, 006D9339, 006D937D, 006D93C1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: StringType
                                  • String ID: -$AND$Failed to parse condition "%ls". Constant too big, at position %d.$Failed to parse condition "%ls". Identifier cannot start at a digit, at position %d.$Failed to parse condition "%ls". Invalid version format, at position %d.$Failed to parse condition "%ls". Unexpected '~' operator at position %d.$Failed to parse condition "%ls". Unexpected character at position %d.$Failed to parse condition "%ls". Unterminated literal at position %d.$Failed to parse condition "%ls". Version can have a maximum of 4 parts, at position %d.$Failed to set symbol value.$NOT$c:\agent\_work\79\s\src\burn\engine\condition.cpp
                                  • API String ID: 4177115715-2443282359
                                  • Opcode ID: 50472c8af6e208658dc88204f69b3e33f26939069eaf45ca7dc9260ab982f390
                                  • Instruction ID: 0b8f7b3716988e110b60c9df0c1fedc5878775501012c989cd2093f0eeac84d8
                                  • Opcode Fuzzy Hash: 50472c8af6e208658dc88204f69b3e33f26939069eaf45ca7dc9260ab982f390
                                  • Instruction Fuzzy Hash: 49F1E6B1D00215FBDB24CF54C849BFA7BA6FB05704F10814BF9019A385C3B9DA96DBA0
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,success,000000FF,?,Type,00000000,?,?,00000000,?,00000001,?), ref: 006F1A7D
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,error,000000FF), ref: 006F1A9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareHeapString$AllocateProcess
                                  • String ID: Code$ExitCode$Failed to allocate memory for exit code structs.$Failed to get @Code.$Failed to get @Type.$Failed to get exit code node count.$Failed to get next node.$Failed to parse @Code value: %ls$Failed to select exit code nodes.$Invalid exit code type: %ls$Type$c:\agent\_work\79\s\src\burn\engine\exeengine.cpp$error$forceReboot$scheduleReboot$success
                                  • API String ID: 2664528157-3285546140
                                  • Opcode ID: b140c248c101043c977e4fb3d9159b523bfd05a64164623a93afad53840eb65c
                                  • Instruction ID: 6b613f6a870ead8724a61cdb7ccb7c67545bb59b7eef5b9c628328f1c96c98e0
                                  • Opcode Fuzzy Hash: b140c248c101043c977e4fb3d9159b523bfd05a64164623a93afad53840eb65c
                                  • Instruction Fuzzy Hash: B261E170A0422AFBCB109B54CC45EBEBBB6AF52760F204255F624AF2D0E7749A41DB90
                                  APIs
                                    • Part of subcall function 006DD461: EnterCriticalSection.KERNEL32(000000D0,?,000000B8,00000000,?,006E6F34,000000B8,00000000,?,00000000,75A8B390), ref: 006DD470
                                    • Part of subcall function 006DD461: LeaveCriticalSection.KERNEL32(000000D0,?,006E6F34,000000B8,00000000,?,00000000,75A8B390), ref: 006DD493
                                  • ReleaseMutex.KERNEL32(00000000,?,00000000,crypt32.dll,00000000,00000001,00000000), ref: 006E6E83
                                  • CloseHandle.KERNEL32(00000000), ref: 006E6E8C
                                  • CloseHandle.KERNEL32(?,?,00000000,crypt32.dll,00000000,00000001,00000000), ref: 006E6EAC
                                    • Part of subcall function 006FBA1A: SetThreadExecutionState.KERNEL32(80000001), ref: 006FBA1F
                                  Strings
                                  • Another per-machine setup is already executing., xrefs: 006E6CC5
                                  • Failed to cache engine to working directory., xrefs: 006E6C65
                                  • Failed to elevate., xrefs: 006E6C8B
                                  • Engine cannot start apply because it is busy with another action., xrefs: 006E6B20
                                  • Failed to set initial apply variables., xrefs: 006E6BFB
                                  • c:\agent\_work\79\s\src\burn\engine\core.cpp, xrefs: 006E6B87, 006E6D58
                                  • Failed while caching, aborting execution., xrefs: 006E6D8A
                                  • UX aborted apply begin., xrefs: 006E6B91
                                  • Another per-user setup is already executing., xrefs: 006E6BD1
                                  • Failed to register bundle., xrefs: 006E6CE8
                                  • Failed to create cache thread., xrefs: 006E6D62
                                  • crypt32.dll, xrefs: 006E6BC3
                                  • oEm, xrefs: 006E6DBF, 006E6D0B, 006E6DC2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCriticalHandleSection$EnterExecutionLeaveMutexReleaseStateThread
                                  • String ID: Another per-machine setup is already executing.$Another per-user setup is already executing.$Engine cannot start apply because it is busy with another action.$Failed to cache engine to working directory.$Failed to create cache thread.$Failed to elevate.$Failed to register bundle.$Failed to set initial apply variables.$Failed while caching, aborting execution.$UX aborted apply begin.$c:\agent\_work\79\s\src\burn\engine\core.cpp$crypt32.dll$oEm
                                  • API String ID: 303827279-4291315641
                                  • Opcode ID: f82e0ae283a7cc917e9428b9f181cf9d90372be713c6bec2c04745b9d083d980
                                  • Instruction ID: 50388efb31b06a766dd8f47c79acc5cc7385a08208bf24db648c6c56a3ba62b1
                                  • Opcode Fuzzy Hash: f82e0ae283a7cc917e9428b9f181cf9d90372be713c6bec2c04745b9d083d980
                                  • Instruction Fuzzy Hash: 99C1E3B2D02365EBDF159F65CC85BEE37AAAF14740F04417AFD05AE281DB348940CB64
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,http://appsyndication.org/2006/appsyn,000000FF,00000000,00000000,000002C0,00000410), ref: 0071837A
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,application,000000FF), ref: 00718395
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,upgrade,000000FF), ref: 00718438
                                  • CompareStringW.KERNEL32(0000007F,00000000,00700079,000000FF,version,000000FF,000002D8,0071B518,00000000), ref: 00718477
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,exclusive,000000FF), ref: 007184CA
                                  • CompareStringW.KERNEL32(0000007F,00000000,0071B518,000000FF,true,000000FF), ref: 007184E8
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,version,000000FF), ref: 00718520
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,enclosure,000000FF), ref: 00718664
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: application$c:\agent\_work\79\s\src\libs\dutil\apuputil.cpp$enclosure$exclusive$http://appsyndication.org/2006/appsyn$true$type$upgrade$version
                                  • API String ID: 1825529933-3198828006
                                  • Opcode ID: 5ed4ee420eebfe88f3e4d9242ed4d13ea93d63a75be3728e2e9f96f6e3b61005
                                  • Instruction ID: c9a3a87f058209e8404ff37a1535add6642ee4890c7902cc92d804232bea0206
                                  • Opcode Fuzzy Hash: 5ed4ee420eebfe88f3e4d9242ed4d13ea93d63a75be3728e2e9f96f6e3b61005
                                  • Instruction Fuzzy Hash: B7B1C471544206ABDBA0CF5CCC41F9A77A6AF04730F218619F935AB2D2DF78E990CB05
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,rel,000000FF,?,?,?,00000000), ref: 00717A7A
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,href,000000FF), ref: 00717A9F
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,length,000000FF), ref: 00717ABF
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,title,000000FF), ref: 00717AF2
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,type,000000FF), ref: 00717B0E
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717B39
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717BB0
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717BFC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$Compare$Free
                                  • String ID: `)u$feclient.dll$href$length$msasn1.dll$msi.dll$rel$title$type$version.dll
                                  • API String ID: 318886736-2442510206
                                  • Opcode ID: 9d11e4aab3514a87a68717a17d6196ea9b5a2e07ed0453f44868aee656c1dda2
                                  • Instruction ID: 1a2374880a7ffae8dce563f9e4bf96fcb37cdb7f3a514ff562e4fad2e5c9ffea
                                  • Opcode Fuzzy Hash: 9d11e4aab3514a87a68717a17d6196ea9b5a2e07ed0453f44868aee656c1dda2
                                  • Instruction Fuzzy Hash: 16616375909119FBDF29DB98CC45EEDB7B8AF04721F2042A5F521A71E0D738AE80DB90
                                  APIs
                                    • Part of subcall function 006EE134: LoadBitmapW.USER32(?,00000001), ref: 006EE16A
                                    • Part of subcall function 006EE134: GetLastError.KERNEL32 ref: 006EE176
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 006EE2AC
                                  • RegisterClassW.USER32(?), ref: 006EE2C0
                                  • GetLastError.KERNEL32 ref: 006EE2CB
                                  • UnregisterClassW.USER32(WixBurnSplashScreen,?), ref: 006EE3D0
                                  • DeleteObject.GDI32(00000000), ref: 006EE3DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ClassErrorLastLoad$BitmapCursorDeleteObjectRegisterUnregister
                                  • String ID: Failed to create window.$Failed to load splash screen.$Failed to register window.$Unexpected return value from message pump.$WixBurnSplashScreen$c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp
                                  • API String ID: 164797020-3924656102
                                  • Opcode ID: 3d7a1a621d609c5a3fe9229bde788848cf6b25db6bded14a88fd994f43813fc6
                                  • Instruction ID: 31414a712bb881bd246b79ebc5782f7704b0ffa386fead53350c36871fb9f068
                                  • Opcode Fuzzy Hash: 3d7a1a621d609c5a3fe9229bde788848cf6b25db6bded14a88fd994f43813fc6
                                  • Instruction Fuzzy Hash: 3E41D272901729BFEB119BE9DD49EEEBB7AFF04700B108125FA01E6290E7359D108B91
                                  APIs
                                  • WaitForMultipleObjects.KERNEL32(00000001,006FB99A,00000000,000000FF,00000001,00000000,00000000,006FB99A,00000001,?), ref: 006F9B96
                                  • GetLastError.KERNEL32 ref: 006F9D06
                                  • GetExitCodeThread.KERNEL32(?,00000001), ref: 006F9D46
                                  • GetLastError.KERNEL32 ref: 006F9D50
                                  Strings
                                  • Failed to get cache thread exit code., xrefs: 006F9D81
                                  • Failed to execute MSU package., xrefs: 006F9C4B
                                  • Failed to execute MSI package., xrefs: 006F9BF6
                                  • Failed to execute EXE package., xrefs: 006F9BCD
                                  • Cache thread exited unexpectedly., xrefs: 006F9D97
                                  • c:\agent\_work\79\s\src\burn\engine\apply.cpp, xrefs: 006F9D2D, 006F9D77
                                  • Invalid execute action., xrefs: 006F9DA6
                                  • Failed to execute dependency action., xrefs: 006F9C86
                                  • Failed to execute MSP package., xrefs: 006F9C1B
                                  • Failed to execute package provider registration action., xrefs: 006F9C67
                                  • Failed to load compatible package on per-machine package., xrefs: 006F9CAC
                                  • Failed to wait for cache check-point., xrefs: 006F9D37
                                  • Failed to execute compatible package action., xrefs: 006F9CC3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeExitMultipleObjectsThreadWait
                                  • String ID: Cache thread exited unexpectedly.$Failed to execute EXE package.$Failed to execute MSI package.$Failed to execute MSP package.$Failed to execute MSU package.$Failed to execute compatible package action.$Failed to execute dependency action.$Failed to execute package provider registration action.$Failed to get cache thread exit code.$Failed to load compatible package on per-machine package.$Failed to wait for cache check-point.$Invalid execute action.$c:\agent\_work\79\s\src\burn\engine\apply.cpp
                                  • API String ID: 3703294532-3958039320
                                  • Opcode ID: 8450e8af2b822138d4c7661037a36e0770dfae95a27a9959a2085e3498b0d19c
                                  • Instruction ID: dde2c48742fba6c4e739b8210e1243e9b6b12e44ca016e23864f5b31bef8b0c8
                                  • Opcode Fuzzy Hash: 8450e8af2b822138d4c7661037a36e0770dfae95a27a9959a2085e3498b0d19c
                                  • Instruction Fuzzy Hash: D5714BB1A41629EBDB11CF64D941FBE7BBAEF05710F20416AFA05E7340D275AE019BA0
                                  APIs
                                    • Part of subcall function 00713D9B: GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00713DEA
                                  • RegCloseKey.ADVAPI32(00000000,?,00720F38,00020006,00000000,?,00000000,00000000,00000000,?,00000000,00000001,00000000,00000000), ref: 006DF3E7
                                    • Part of subcall function 0071178B: RegSetValueExW.ADVAPI32(?,00000005,00000000,00000004,?,00000004,00000001,?,006DF234,00720F38,Resume,00000005,?,00000000,00000000,00000000), ref: 007117A0
                                  Strings
                                  • Resume, xrefs: 006DF229
                                  • "%ls" /%ls, xrefs: 006DF28C
                                  • c:\agent\_work\79\s\src\burn\engine\registration.cpp, xrefs: 006DF36B, 006DF3B9
                                  • BundleResumeCommandLine, xrefs: 006DF2EF, 006DF382
                                  • Failed to format resume command line for RunOnce., xrefs: 006DF2A0
                                  • Failed to write Resume value., xrefs: 006DF23A
                                  • Failed to write resume command line value., xrefs: 006DF304
                                  • Failed to write run key value., xrefs: 006DF2E2
                                  • Failed to delete run key value., xrefs: 006DF375
                                  • Installed, xrefs: 006DF24C
                                  • burn.runonce, xrefs: 006DF281
                                  • Failed to write Installed value., xrefs: 006DF25D
                                  • Failed to create run key., xrefs: 006DF2C4
                                  • Failed to delete resume command line value., xrefs: 006DF3C3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseValueVersion
                                  • String ID: "%ls" /%ls$BundleResumeCommandLine$Failed to create run key.$Failed to delete resume command line value.$Failed to delete run key value.$Failed to format resume command line for RunOnce.$Failed to write Installed value.$Failed to write Resume value.$Failed to write resume command line value.$Failed to write run key value.$Installed$Resume$burn.runonce$c:\agent\_work\79\s\src\burn\engine\registration.cpp
                                  • API String ID: 2348918689-4238253642
                                  • Opcode ID: c9db4f1e873002824b785770beba7409f8929f5830752a2c49b1e32e46e96588
                                  • Instruction ID: 2e421ac175b0ed1b161bfa44d10f9b85a9ed976df0dd13c5242bd20d3da5a037
                                  • Opcode Fuzzy Hash: c9db4f1e873002824b785770beba7409f8929f5830752a2c49b1e32e46e96588
                                  • Instruction Fuzzy Hash: A151D372D4133AFBCF119BA59C06AEEB666BB10710F07413BF902B6391D7789A509BD0
                                  APIs
                                  • GetCurrentProcessId.KERNEL32(75918FB0,00000000,00000000), ref: 006FC99D
                                    • Part of subcall function 006E4D17: UuidCreate.RPCRT4(?), ref: 006E4D4A
                                  • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,08000000,00000000,00000000,?,006F21C2,?,?,00000000,?,?,?), ref: 006FCA7B
                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?), ref: 006FCA85
                                  • GetProcessId.KERNEL32(006F21C2,?,?,00000000,?,?,?,?), ref: 006FCABD
                                    • Part of subcall function 006E545A: lstrlenW.KERNEL32(?,?,00000000,?,?,00000000,75A8B390,?,006D457C,?,0071B500), ref: 006E547B
                                    • Part of subcall function 006E545A: GetCurrentProcessId.KERNEL32(?,006D457C,?,0071B500), ref: 006E5486
                                    • Part of subcall function 006E545A: SetNamedPipeHandleState.KERNEL32(?,000000FF,00000000,00000000,?,006D457C,?,0071B500), ref: 006E54BD
                                    • Part of subcall function 006E545A: ConnectNamedPipe.KERNEL32(?,00000000,?,006D457C,?,0071B500), ref: 006E54D2
                                    • Part of subcall function 006E545A: GetLastError.KERNEL32(?,006D457C,?,0071B500), ref: 006E54DC
                                    • Part of subcall function 006E545A: Sleep.KERNEL32(00000064,?,006D457C,?,0071B500), ref: 006E5511
                                    • Part of subcall function 006E545A: SetNamedPipeHandleState.KERNEL32(?,00000000,00000000,00000000,?,006D457C,?,0071B500), ref: 006E5534
                                    • Part of subcall function 006E545A: WriteFile.KERNEL32(?,crypt32.dll,00000004,00000000,00000000,?,006D457C,?,0071B500), ref: 006E554F
                                    • Part of subcall function 006E545A: WriteFile.KERNEL32(?,|Em,0071B500,00000000,00000000,?,006D457C,?,0071B500), ref: 006E556A
                                    • Part of subcall function 006E545A: WriteFile.KERNEL32(?,0071B4B8,00000004,feclient.dll,00000000,?,006D457C,?,0071B500), ref: 006E5585
                                    • Part of subcall function 00710D3E: WaitForSingleObject.KERNEL32(000000FF,?,00000000,?,006D4F5D,?,000000FF,?,?,?,?,?,00000000,?,?,?), ref: 00710D4A
                                    • Part of subcall function 00710D3E: GetLastError.KERNEL32(?,006D4F5D,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 00710D58
                                  • CloseHandle.KERNEL32(00000000,?,000000FF,00000000,?,006FC8F1,?,?,?,?,?,00000000,?,?,?,?), ref: 006FCB41
                                  • CloseHandle.KERNEL32(00000000,?,000000FF,00000000,?,006FC8F1,?,?,?,?,?,00000000,?,?,?,?), ref: 006FCB50
                                  • CloseHandle.KERNEL32(00000000,?,?,000000FF,00000000,?,006FC8F1,?,?,?,?,?,00000000,?,?,?), ref: 006FCB67
                                  Strings
                                  • Failed to create embedded pipe name and client token., xrefs: 006FCA00
                                  • Failed to allocate embedded command., xrefs: 006FCA54
                                  • Failed to create embedded pipe., xrefs: 006FCA27
                                  • %ls -%ls %ls %ls %u, xrefs: 006FCA40
                                  • Failed to wait for embedded executable: %ls, xrefs: 006FCB24
                                  • Failed to create embedded process at path: %ls, xrefs: 006FCAB3
                                  • burn.embedded, xrefs: 006FCA38
                                  • Failed to wait for embedded process to connect to pipe., xrefs: 006FCADF
                                  • Failed to process messages from embedded message., xrefs: 006FCB04
                                  • c:\agent\_work\79\s\src\burn\engine\embedded.cpp, xrefs: 006FCAA6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Handle$Process$CloseErrorFileLastNamedPipeWrite$CreateCurrentState$ConnectObjectSingleSleepUuidWaitlstrlen
                                  • String ID: %ls -%ls %ls %ls %u$Failed to allocate embedded command.$Failed to create embedded pipe name and client token.$Failed to create embedded pipe.$Failed to create embedded process at path: %ls$Failed to process messages from embedded message.$Failed to wait for embedded executable: %ls$Failed to wait for embedded process to connect to pipe.$burn.embedded$c:\agent\_work\79\s\src\burn\engine\embedded.cpp
                                  • API String ID: 875070380-43293018
                                  • Opcode ID: f6c1bacf40fe363b242eaa87e6d2f62c6c43735b1198c17c551ee42e319a46cd
                                  • Instruction ID: d746d1337742f411732f3a8249300067c68d4b8cd09c6cfa754a6a9c86a66846
                                  • Opcode Fuzzy Hash: f6c1bacf40fe363b242eaa87e6d2f62c6c43735b1198c17c551ee42e319a46cd
                                  • Instruction Fuzzy Hash: E2519172D4122DBBDF11DBA4CE06FEE7BBAAF04720F114115FA00B6291D774AA449BD4
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 006DEE01
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • SysFreeString.OLEAUT32(?), ref: 006DEDB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeHeapString$AllocateProcess
                                  • String ID: Failed to allocate memory for software tag structs.$Failed to convert SoftwareTag text to UTF-8$Failed to get @Filename.$Failed to get @Path.$Failed to get @Regid.$Failed to get SoftwareTag text.$Failed to get next node.$Failed to get software tag count.$Failed to select software tag nodes.$Filename$Path$Regid$SoftwareTag$`)u$c:\agent\_work\79\s\src\burn\engine\registration.cpp
                                  • API String ID: 336948655-3309293895
                                  • Opcode ID: 04a9cf0442e5dce60153847fefb9906ce9af125e599992a38dfc12fe39c617a3
                                  • Instruction ID: d0e8971e914b325e150530a1f093ad5c389acb3a48bd60385fc015fddffd1f37
                                  • Opcode Fuzzy Hash: 04a9cf0442e5dce60153847fefb9906ce9af125e599992a38dfc12fe39c617a3
                                  • Instruction Fuzzy Hash: AB51B475E41225EBDB21EF58C885EAEB776BF04B10B50416AF811AF390C775DE409760
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,msi.dll,000000FF,http://appsyndication.org/2006/appsyn,000000FF,00000000,00000000,000002C0,?,00718681,00000001,?), ref: 007181B7
                                  • CompareStringW.KERNEL32(0000007F,00000000,digest,000000FF,002E0069,000000FF,?,00718681,00000001,?), ref: 007181D2
                                  • CompareStringW.KERNEL32(0000007F,00000000,name,000000FF,002E0069,000000FF,?,00718681,00000001,?), ref: 007181ED
                                  • CompareStringW.KERNEL32(0000007F,00000000,algorithm,000000FF,?,000000FF,?,00718681,00000001,?), ref: 00718259
                                  • CompareStringW.KERNEL32(0000007F,00000001,md5,000000FF,?,000000FF,?,00718681,00000001,?), ref: 0071827D
                                  • CompareStringW.KERNEL32(0000007F,00000001,sha1,000000FF,?,000000FF,?,00718681,00000001,?), ref: 007182A1
                                  • CompareStringW.KERNEL32(0000007F,00000001,sha256,000000FF,?,000000FF,?,00718681,00000001,?), ref: 007182C1
                                  • lstrlenW.KERNEL32(006C0064,?,00718681,00000001,?), ref: 007182DC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString$lstrlen
                                  • String ID: algorithm$c:\agent\_work\79\s\src\libs\dutil\apuputil.cpp$digest$http://appsyndication.org/2006/appsyn$md5$msi.dll$name$sha1$sha256
                                  • API String ID: 1657112622-1078064088
                                  • Opcode ID: c2e909b7b2084562621bac50b5269353353280636600f59478993c62bf275c7f
                                  • Instruction ID: a5710baad7da384111067e398344145954f511448e6b5edc0d919f376a77cfdb
                                  • Opcode Fuzzy Hash: c2e909b7b2084562621bac50b5269353353280636600f59478993c62bf275c7f
                                  • Instruction Fuzzy Hash: 5951B971688A12BBEB614E4CCC56F957B61BB11730F308305F934AE2E5CB78E890D795
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DA076
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open@16
                                  • String ID: AssignmentType$Failed to change value type.$Failed to copy upgrade code.$Failed to enumerate related products for upgrade code.$Failed to format GUID string.$Failed to get product info.$Failed to set variable.$Language$MsiProductSearch failed: ID '%ls', HRESULT 0x%x$Product or related product not found: %ls$State$Trying per-machine extended info for property '%ls' for product: %ls$Trying per-user extended info for property '%ls' for product: %ls$Unsupported product search type: %u$VersionString
                                  • API String ID: 3613110473-2134270738
                                  • Opcode ID: 6ede35765dcba54361a4207b977c2a0dc40e5659918481c4e312db78bc775c82
                                  • Instruction ID: ce7a69ee54ae3cbbefd3f4587c562d31b6be7363441295b888a534c8d1b1c3a4
                                  • Opcode Fuzzy Hash: 6ede35765dcba54361a4207b977c2a0dc40e5659918481c4e312db78bc775c82
                                  • Instruction Fuzzy Hash: 4A610372E44118FBCB119EE8CD4ADEEBB7AAB04704F144066F904BB391D236DF819792
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?), ref: 006E4B07
                                  • GetLastError.KERNEL32 ref: 006E4B15
                                  • Sleep.KERNEL32(00000064), ref: 006E4B39
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateErrorFileLastSleep
                                  • String ID: Failed to allocate name of parent cache pipe.$Failed to allocate name of parent pipe.$Failed to open companion process with PID: %u$Failed to open parent pipe: %ls$Failed to verify parent pipe: %ls$\\.\pipe\%ls$\\.\pipe\%ls.Cache$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$feclient.dll
                                  • API String ID: 408151869-21451366
                                  • Opcode ID: a4e7acb3b86baa3f36a02d4b73f3c975fa649611fc1d96f3ff0dc8a2f1d9f390
                                  • Instruction ID: 28cf896388a11a7162665bda576f0e34964b5467ef910af751a68a849c9bc12b
                                  • Opcode Fuzzy Hash: a4e7acb3b86baa3f36a02d4b73f3c975fa649611fc1d96f3ff0dc8a2f1d9f390
                                  • Instruction Fuzzy Hash: AD412C76D43372FBD72157B59D46F9A7666AF04B20F214211FD00BB2C0DB68ED4096D8
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000,00000000,006E0475,InstallerVersion,InstallerVersion,00000000,006E0475,InstallerName,InstallerName,00000000,006E0475,Date,InstalledDate,00000000,006E0475,LogonUser), ref: 006DF6D6
                                    • Part of subcall function 007117D9: RegSetValueExW.ADVAPI32(00020006,00720F38,00000000,00000001,?,00000000,?,000000FF,00000000,00000000,?,?,006DF2DC,00000000,?,00020006), ref: 0071180C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseValue
                                  • String ID: Date$Failed to create the key for update registration.$Failed to get the formatted key path for update registration.$Failed to write %ls value.$InstalledBy$InstalledDate$InstallerName$InstallerVersion$LogonUser$PackageName$PackageVersion$Publisher$PublishingGroup$ReleaseType$ThisVersionInstalled
                                  • API String ID: 3132538880-2703781546
                                  • Opcode ID: f927d69b7c22c7810d9077f2a17539d36b1ae155cb1f5b78f9e078aab4c0722c
                                  • Instruction ID: 643f0e01c667e483f7c09ea432d09266fb551feef5315e94395f4769b7a2672a
                                  • Opcode Fuzzy Hash: f927d69b7c22c7810d9077f2a17539d36b1ae155cb1f5b78f9e078aab4c0722c
                                  • Instruction Fuzzy Hash: DD41C972E406B5F7CB1367A4EC02EAE7967AB10B10F110172F801B67B2D779DE51A6C4
                                  APIs
                                  • TlsSetValue.KERNEL32(?,?), ref: 006EE677
                                  • RegisterClassW.USER32(?), ref: 006EE6A3
                                  • GetLastError.KERNEL32 ref: 006EE6AE
                                  • CreateWindowExW.USER32(00000080,0072A1B4,00000000,90000000,80000000,00000008,00000000,00000000,00000000,00000000,?,?), ref: 006EE715
                                  • GetLastError.KERNEL32 ref: 006EE71F
                                  • UnregisterClassW.USER32(WixBurnMessageWindow,?), ref: 006EE7BD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ClassErrorLast$CreateRegisterUnregisterValueWindow
                                  • String ID: Failed to create window.$Failed to register window.$Unexpected return value from message pump.$WixBurnMessageWindow$c:\agent\_work\79\s\src\burn\engine\uithread.cpp
                                  • API String ID: 213125376-717246376
                                  • Opcode ID: dcbf2cb7313a035163352de8e26827ecbdc30e4da4ddfd986c87fa07e7a3a6ef
                                  • Instruction ID: 11545a58194166768851424a3f889c63e7d75bb7017e2eec994cfc82413f6749
                                  • Opcode Fuzzy Hash: dcbf2cb7313a035163352de8e26827ecbdc30e4da4ddfd986c87fa07e7a3a6ef
                                  • Instruction Fuzzy Hash: 46411776A01325BBCF208FA5DC48ACEBFB9FF08750F118125F915BA290E7359910CBA5
                                  Strings
                                  • Failed to allocate space for burn payload inside of related bundle struct, xrefs: 006FC6F3
                                  • Failed to copy filename for passthrough pseudo bundle., xrefs: 006FC6CA
                                  • Failed to recreate command-line arguments., xrefs: 006FC74F
                                  • c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp, xrefs: 006FC4B4, 006FC6AD, 006FC6E7
                                  • Failed to copy install arguments for passthrough bundle package, xrefs: 006FC76E
                                  • Failed to copy key for passthrough pseudo bundle payload., xrefs: 006FC6D1
                                  • Failed to copy cache id for passthrough pseudo bundle., xrefs: 006FC711
                                  • Failed to copy local source path for passthrough pseudo bundle., xrefs: 006FC6C3
                                  • Failed to copy related arguments for passthrough bundle package, xrefs: 006FC78E
                                  • Failed to copy uninstall arguments for passthrough bundle package, xrefs: 006FC7B8
                                  • Failed to allocate memory for pseudo bundle payload hash., xrefs: 006FC6B9
                                  • Failed to allocate space for burn package payload inside of passthrough bundle., xrefs: 006FC4C0
                                  • Failed to copy key for passthrough pseudo bundle., xrefs: 006FC694
                                  • Failed to copy download source for passthrough pseudo bundle., xrefs: 006FC69B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID: Failed to allocate memory for pseudo bundle payload hash.$Failed to allocate space for burn package payload inside of passthrough bundle.$Failed to allocate space for burn payload inside of related bundle struct$Failed to copy cache id for passthrough pseudo bundle.$Failed to copy download source for passthrough pseudo bundle.$Failed to copy filename for passthrough pseudo bundle.$Failed to copy install arguments for passthrough bundle package$Failed to copy key for passthrough pseudo bundle payload.$Failed to copy key for passthrough pseudo bundle.$Failed to copy local source path for passthrough pseudo bundle.$Failed to copy related arguments for passthrough bundle package$Failed to copy uninstall arguments for passthrough bundle package$Failed to recreate command-line arguments.$c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp
                                  • API String ID: 1357844191-3708701997
                                  • Opcode ID: 0880a51c34fdf78abe1c8879ad6124da6e14b27116b959dd301655f7e2b4f092
                                  • Instruction ID: 61cbcf2fe03618b4e350c4a3845d51b84c2dedfd2100a4d71bd0c2ebe0175920
                                  • Opcode Fuzzy Hash: 0880a51c34fdf78abe1c8879ad6124da6e14b27116b959dd301655f7e2b4f092
                                  • Instruction Fuzzy Hash: 46B18C71A4061AEFDB61DF28C991F65BBA2BF08320F10416AFE14AB351D775E921DB80
                                  APIs
                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,00000000,00000000,?), ref: 006FDB33
                                  Strings
                                  • Failed to set callback interface for BITS job., xrefs: 006FDC6B
                                  • Failed to download BITS job., xrefs: 006FDCCA
                                  • Failed to initialize BITS job callback., xrefs: 006FDC54
                                  • Falied to start BITS job., xrefs: 006FDCEB
                                  • Failed to set credentials for BITS job., xrefs: 006FDBE1
                                  • Failed to create BITS job., xrefs: 006FDBC2
                                  • Failed while waiting for BITS download., xrefs: 006FDCE4
                                  • c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp, xrefs: 006FDB49, 006FDC3C
                                  • Failed to complete BITS job., xrefs: 006FDCDD
                                  • Failed to create BITS job callback., xrefs: 006FDC46
                                  • Failed to add file to BITS job., xrefs: 006FDC00
                                  • Invalid BITS engine URL: %ls, xrefs: 006FDB55
                                  • Failed to copy download URL., xrefs: 006FDB7A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: Failed to add file to BITS job.$Failed to complete BITS job.$Failed to copy download URL.$Failed to create BITS job callback.$Failed to create BITS job.$Failed to download BITS job.$Failed to initialize BITS job callback.$Failed to set callback interface for BITS job.$Failed to set credentials for BITS job.$Failed while waiting for BITS download.$Falied to start BITS job.$Invalid BITS engine URL: %ls$c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp
                                  • API String ID: 1659193697-3636711892
                                  • Opcode ID: 458611f31ef9af7ed761470f09a15e0f6538938d9ff6587c1596206bbbf81df6
                                  • Instruction ID: cb57a9338124388400461ddeb159bf857ba030f055fd4d7a8a5b9359edbc984c
                                  • Opcode Fuzzy Hash: 458611f31ef9af7ed761470f09a15e0f6538938d9ff6587c1596206bbbf81df6
                                  • Instruction Fuzzy Hash: 8951C571A4022DEBDB119B54C985EBE7BBBAF04B10B124155FE04AB351D7B4FD40EB90
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DBCB0
                                  • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000200,00000000,?,00000044,?,?,?,?,?), ref: 006DBDBD
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 006DBDC7
                                  • WaitForInputIdle.USER32(?,?), ref: 006DBE1B
                                  • CloseHandle.KERNEL32(?,?,?), ref: 006DBE66
                                  • CloseHandle.KERNEL32(?,?,?), ref: 006DBE73
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle$CreateErrorIdleInputLastOpen@16ProcessWait
                                  • String ID: "%ls"$"%ls" %s$D$Failed to CreateProcess on path: %ls$Failed to create executable command.$Failed to create obfuscated executable command.$Failed to format argument string.$Failed to format obfuscated argument string.$c:\agent\_work\79\s\src\burn\engine\approvedexe.cpp
                                  • API String ID: 155678114-3929666505
                                  • Opcode ID: 38a8bc362aa4be1d46cec5888aa5a16d065d0f52d0be5aa80fb5c542f867f2f1
                                  • Instruction ID: f0a33e1737e576871793b21eb06f84540b9ad43350aa1d52668df077190736d4
                                  • Opcode Fuzzy Hash: 38a8bc362aa4be1d46cec5888aa5a16d065d0f52d0be5aa80fb5c542f867f2f1
                                  • Instruction Fuzzy Hash: C8517C72D0021AFBDF229FD4CC429EEBB7AFF14300B01416AEA04B6360D7359E609B95
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,?,?,00000000,?,?,?,?,?,?,?,?,006F6CAE,?), ref: 006F6798
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,006F6CAE,?,?,?), ref: 006F67A5
                                  • OpenServiceW.ADVAPI32(00000000,wuauserv,00000027,?,?,?,?,?,?,?,?,006F6CAE,?,?,?), ref: 006F67ED
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,006F6CAE,?,?,?), ref: 006F67F9
                                  • QueryServiceStatus.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,006F6CAE,?,?,?), ref: 006F6833
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,006F6CAE,?,?,?), ref: 006F683D
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 006F68F4
                                  • CloseServiceHandle.ADVAPI32(?), ref: 006F68FE
                                  Strings
                                  • Failed to query status of WU service., xrefs: 006F686B
                                  • c:\agent\_work\79\s\src\burn\engine\msuengine.cpp, xrefs: 006F67C9, 006F681D, 006F6861
                                  • Failed to read configuration for WU service., xrefs: 006F68A4
                                  • wuauserv, xrefs: 006F67E7
                                  • Failed to open WU service., xrefs: 006F6827
                                  • Failed to open service control manager., xrefs: 006F67D3
                                  • Failed to mark WU service to start on demand., xrefs: 006F68C5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Service$ErrorLast$CloseHandleOpen$ManagerQueryStatus
                                  • String ID: Failed to mark WU service to start on demand.$Failed to open WU service.$Failed to open service control manager.$Failed to query status of WU service.$Failed to read configuration for WU service.$c:\agent\_work\79\s\src\burn\engine\msuengine.cpp$wuauserv
                                  • API String ID: 971853308-2572658123
                                  • Opcode ID: 92bc90c7fca61aa8dad0e812859de326813c9d84869ba166be9d317306336236
                                  • Instruction ID: 4cb53d9e0e946117081441b1a9f62670938e07044bc5e43e7a56262d17f968f1
                                  • Opcode Fuzzy Hash: 92bc90c7fca61aa8dad0e812859de326813c9d84869ba166be9d317306336236
                                  • Instruction Fuzzy Hash: 41419776E003399BD7219B68CC45AFEB6A6AF04750B118529FE11BB341D778DC0086A4
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,?,006DBACA,00000008,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB1DF
                                  • GetLastError.KERNEL32(?,006DBACA,00000008,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 006DB1EB
                                  • _memcmp.LIBVCRUNTIME ref: 006DB293
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorHandleLastModule_memcmp
                                  • String ID: .wix$.wixburn$Bundle guid didn't match the guid in the PE Header in memory.$Failed to find Burn section.$Failed to find valid DOS image header in buffer.$Failed to find valid NT image header in buffer.$Failed to get module handle to process.$Failed to read section info, data to short: %u$Failed to read section info, unsupported version: %08x$burn$c:\agent\_work\79\s\src\burn\engine\section.cpp
                                  • API String ID: 3888311042-1220921555
                                  • Opcode ID: 69db54d1b9056fa69fb5c3a1d75c3a6b4a11e5ba100f08102b8052f175b4c7ee
                                  • Instruction ID: e067788da76934c66ee544bc4a403d29d5a92b8ceca7081e89a3fcdd692e4d00
                                  • Opcode Fuzzy Hash: 69db54d1b9056fa69fb5c3a1d75c3a6b4a11e5ba100f08102b8052f175b4c7ee
                                  • Instruction Fuzzy Hash: F8417B72A80220E7D72055498C42EFE2157AF41B21B27402BFD026F3C5D7ADCA8397AA
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,label,000000FF,?,?,?,7591DFD0,?,007174EF,?,?), ref: 00716FD3
                                  • SysFreeString.OLEAUT32(00000000), ref: 0071703E
                                  • SysFreeString.OLEAUT32(00000000), ref: 007170B6
                                  • SysFreeString.OLEAUT32(00000000), ref: 007170F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$Free$Compare
                                  • String ID: `)u$feclient.dll$label$scheme$term$tq$tq
                                  • API String ID: 1324494773-1945504176
                                  • Opcode ID: 08781087ef608115537287047c695f12294b763b2e12078fbb4197b563917add
                                  • Instruction ID: 71a7afac26e280eea09d8c676d998e7a98f1de366ba7d8152c8512baca874ce3
                                  • Opcode Fuzzy Hash: 08781087ef608115537287047c695f12294b763b2e12078fbb4197b563917add
                                  • Instruction Fuzzy Hash: 9A516175905219FBCB29DB98CC45FEEBB78AF08721F214294E511B71E0DB399E80DB50
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DA271
                                  • RegCloseKey.ADVAPI32(00000000,00000100,00000000,000002C0,?,00000001,00000000,00000000,?,00000000,?,000002C0,000002C0,?,00000000,00000000), ref: 006DA3C5
                                  Strings
                                  • Registry key not found. Key = '%ls', xrefs: 006DA2B2
                                  • c:\agent\_work\79\s\src\burn\engine\search.cpp, xrefs: 006DA349
                                  • Failed to format value string., xrefs: 006DA2FD
                                  • Failed to query registry key value., xrefs: 006DA353
                                  • Registry value not found. Key = '%ls', Value = '%ls', xrefs: 006DA360
                                  • Failed to open registry key. Key = '%ls', xrefs: 006DA2C6
                                  • RegistrySearchExists failed: ID '%ls', HRESULT 0x%x, xrefs: 006DA39D
                                  • Failed to format key string., xrefs: 006DA27C
                                  • Failed to set variable., xrefs: 006DA388
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseOpen@16
                                  • String ID: Failed to format key string.$Failed to format value string.$Failed to open registry key. Key = '%ls'$Failed to query registry key value.$Failed to set variable.$Registry key not found. Key = '%ls'$Registry value not found. Key = '%ls', Value = '%ls'$RegistrySearchExists failed: ID '%ls', HRESULT 0x%x$c:\agent\_work\79\s\src\burn\engine\search.cpp
                                  • API String ID: 1561904661-2790297598
                                  • Opcode ID: 9f31bfa0952692201a9ca8c976bf1d8c1e30a8277db135283a7500e6af221354
                                  • Instruction ID: 79bee17642d8f122f1fa9d423c68f11c21a547b0d1002ab0b4470b1a9b842f3a
                                  • Opcode Fuzzy Hash: 9f31bfa0952692201a9ca8c976bf1d8c1e30a8277db135283a7500e6af221354
                                  • Instruction Fuzzy Hash: 4C41B172D04124FBDB125EE8CC06EEE7A67AF04710F164166FC04E6391E6758E509B92
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,ntdll,?), ref: 006D69AF
                                  • GetLastError.KERNEL32 ref: 006D69B9
                                  • GetProcAddress.KERNEL32(?,RtlGetVersion), ref: 006D69FC
                                  • GetLastError.KERNEL32 ref: 006D6A06
                                  • FreeLibrary.KERNEL32(00000000,00000000,?), ref: 006D6B17
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressFreeHandleLibraryModuleProc
                                  • String ID: Failed to get OS info.$Failed to locate NTDLL.$Failed to locate RtlGetVersion.$Failed to set variant value.$RtlGetVersion$c:\agent\_work\79\s\src\burn\engine\variable.cpp$ntdll
                                  • API String ID: 3057421322-29314153
                                  • Opcode ID: f6ff7767c5c8a23549f26e85fd7916e9b57ea2240b0dfeef32aaf8eec932d04f
                                  • Instruction ID: 4d1410df9b79bb240618b211406e0bb7bd2627397636e204b6bc709e7a63fe5a
                                  • Opcode Fuzzy Hash: f6ff7767c5c8a23549f26e85fd7916e9b57ea2240b0dfeef32aaf8eec932d04f
                                  • Instruction Fuzzy Hash: BD41D972D4023967D7319B69CC05BEE7AB5AB09710F01419AF948F6381D778DE84CF94
                                  APIs
                                  • GetTempPathW.KERNEL32(00000104,?,?,00000000,crypt32.dll), ref: 006E3B28
                                  • GetLastError.KERNEL32(?,00000000,crypt32.dll), ref: 006E3B32
                                  • GetCurrentProcessId.KERNEL32(?,?,?,00000104,?,?,00000000,crypt32.dll), ref: 006E3B9B
                                  • ProcessIdToSessionId.KERNEL32(00000000,?,00000000,crypt32.dll), ref: 006E3BA2
                                  • CompareStringW.KERNEL32(00000000,00000000,?,?,?,?,?,7FFFFFFF,?,?,?,?,?,00000000,crypt32.dll), ref: 006E3C2C
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\logging.cpp, xrefs: 006E3B56
                                  • Failed to get length of session id string., xrefs: 006E3BF7
                                  • Failed to get temp folder., xrefs: 006E3B60
                                  • %u\, xrefs: 006E3BBC
                                  • Failed to get length of temp folder., xrefs: 006E3B8C
                                  • Failed to format session id as a string., xrefs: 006E3BD0
                                  • Failed to copy temp folder., xrefs: 006E3C55
                                  • crypt32.dll, xrefs: 006E3AE7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Process$CompareCurrentErrorLastPathSessionStringTemp
                                  • String ID: %u\$Failed to copy temp folder.$Failed to format session id as a string.$Failed to get length of session id string.$Failed to get length of temp folder.$Failed to get temp folder.$c:\agent\_work\79\s\src\burn\engine\logging.cpp$crypt32.dll
                                  • API String ID: 2407829081-2226602420
                                  • Opcode ID: 21d96ceb849d86a0ca2ceb0b051dc54c7e9913049b18dd30cd5e8a2fb0dd3f11
                                  • Instruction ID: 0b59b11b50ba1a7ac0fb1652c8f3963cf23ad511bd3c7a3b4178987fbf410d61
                                  • Opcode Fuzzy Hash: 21d96ceb849d86a0ca2ceb0b051dc54c7e9913049b18dd30cd5e8a2fb0dd3f11
                                  • Instruction Fuzzy Hash: CC41E372D8233DABCB219B559C4DEDA77BAAF20B10F110195F809B7380D6749F808F94
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000), ref: 006D7FBF
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006D81E7
                                  Strings
                                  • Failed to get numeric., xrefs: 006D81B9
                                  • Failed to get string., xrefs: 006D81B2
                                  • Failed to write variable name., xrefs: 006D81CE
                                  • Failed to write included flag., xrefs: 006D81D5
                                  • Failed to write literal flag., xrefs: 006D81C0
                                  • feclient.dll, xrefs: 006D809A, 006D80F0, 006D8131
                                  • Failed to write variable value as number., xrefs: 006D8191
                                  • Failed to get version., xrefs: 006D8198
                                  • Failed to write variable count., xrefs: 006D7FDA
                                  • Failed to write variable value type., xrefs: 006D81C7
                                  • Failed to write variable value as string., xrefs: 006D81AB
                                  • Unsupported variable type., xrefs: 006D81A4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to get numeric.$Failed to get string.$Failed to get version.$Failed to write included flag.$Failed to write literal flag.$Failed to write variable count.$Failed to write variable name.$Failed to write variable value as number.$Failed to write variable value as string.$Failed to write variable value type.$Unsupported variable type.$feclient.dll
                                  • API String ID: 3168844106-2118673349
                                  • Opcode ID: 84ea9e236cc3cd4280e8221870b329529224e3b1cca6dd5ce4c37586d3460948
                                  • Instruction ID: 95ec0c87a1951ecec4775c23ec93467bffcdea879395ba0da1279235fc59d279
                                  • Opcode Fuzzy Hash: 84ea9e236cc3cd4280e8221870b329529224e3b1cca6dd5ce4c37586d3460948
                                  • Instruction Fuzzy Hash: 0C719271D0061AEFCB22DE68CD49AEE7BA6BB04310F114163F911A7391DB34DD5A9B90
                                  APIs
                                  • TlsAlloc.KERNEL32(?,00000001,00000001,00000000,00000000,?,?,?,006D54A3,?,?,?,?), ref: 006D4967
                                  • GetLastError.KERNEL32(?,?,?,006D54A3,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 006D4978
                                  • ReleaseMutex.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006D4AB5
                                  • CloseHandle.KERNEL32(?,?,?,?,006D54A3,?,?,?,?,?,?,?,?,?,?,?), ref: 006D4ABE
                                  Strings
                                  • Failed to create the message window., xrefs: 006D4A13
                                  • Failed to allocate thread local storage for logging., xrefs: 006D49A6
                                  • c:\agent\_work\79\s\src\burn\engine\engine.cpp, xrefs: 006D499C, 006D49E5
                                  • Failed to connect to unelevated process., xrefs: 006D495D
                                  • Failed to set elevated pipe into thread local storage for logging., xrefs: 006D49EF
                                  • Failed to pump messages from parent process., xrefs: 006D4A89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AllocCloseErrorHandleLastMutexRelease
                                  • String ID: Failed to allocate thread local storage for logging.$Failed to connect to unelevated process.$Failed to create the message window.$Failed to pump messages from parent process.$Failed to set elevated pipe into thread local storage for logging.$c:\agent\_work\79\s\src\burn\engine\engine.cpp
                                  • API String ID: 687263955-2314437895
                                  • Opcode ID: 6932d60e10eb92befea0076a80e897f150017326d797e543a1c2fa777977ad8f
                                  • Instruction ID: d9ccbf52120279d791641b28dc976626be16fb3ed3e7e4b48df318929f3a644e
                                  • Opcode Fuzzy Hash: 6932d60e10eb92befea0076a80e897f150017326d797e543a1c2fa777977ad8f
                                  • Instruction Fuzzy Hash: 3741F473E40629BBD7119BA98C45EDFB76EBF04710F054227FA05A6280DF74AD5087E4
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000005,00000000,00000003,08000000,00000000,?,00000000,?,006EA739,?,00000000,00000000,00000000,?), ref: 006E96C0
                                  • GetLastError.KERNEL32(?,006EA739,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 006E96D0
                                    • Part of subcall function 00714385: Sleep.KERNEL32(?,00000000,?,006E84E4,?,?,00000001,00000003,000007D0,?,?,?,?,?,?,006D4DFD), ref: 0071439C
                                  • CloseHandle.KERNEL32(00000000,?,00000001,00000003,000007D0,00000000,00000000), ref: 006E97DC
                                  Strings
                                  • %ls payload from working path '%ls' to path '%ls', xrefs: 006E9787
                                  • Failed to verify payload signature: %ls, xrefs: 006E972B
                                  • Failed to open payload in working path: %ls, xrefs: 006E96FF
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E96F4
                                  • Failed to copy %ls to %ls, xrefs: 006E97CA
                                  • Moving, xrefs: 006E9772
                                  • Failed to move %ls to %ls, xrefs: 006E97B4
                                  • Failed to verify payload hash: %ls, xrefs: 006E9768
                                  • Copying, xrefs: 006E977B, 006E9786
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLastSleep
                                  • String ID: %ls payload from working path '%ls' to path '%ls'$Copying$Failed to copy %ls to %ls$Failed to move %ls to %ls$Failed to open payload in working path: %ls$Failed to verify payload hash: %ls$Failed to verify payload signature: %ls$Moving$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 1275171361-1089431899
                                  • Opcode ID: dffeffda9e8ce996081c39f502aac2700da268fddffcafe0eb2f583a2d5b69b0
                                  • Instruction ID: ac9ca9739d51ae126b9d80b76c428c8e3c917335e9ac06e7b819a595db6e726c
                                  • Opcode Fuzzy Hash: dffeffda9e8ce996081c39f502aac2700da268fddffcafe0eb2f583a2d5b69b0
                                  • Instruction Fuzzy Hash: 2E31E4B29527B5BBDB221A1A9C4AFEB3A2E9F51F60F010119FD007B381D6689D40C6F5
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000), ref: 006D6618
                                    • Part of subcall function 00710DDC: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,006D5EE0,00000000), ref: 00710DF0
                                    • Part of subcall function 00710DDC: GetProcAddress.KERNEL32(00000000), ref: 00710DF7
                                    • Part of subcall function 00710DDC: GetLastError.KERNEL32(?,?,?,006D5EE0,00000000), ref: 00710E0E
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 006D6644
                                  • GetLastError.KERNEL32 ref: 006D6652
                                  • GetSystemWow64DirectoryW.KERNEL32(?,00000104,00000000), ref: 006D668A
                                  • GetLastError.KERNEL32 ref: 006D6694
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 006D66D7
                                  • GetLastError.KERNEL32 ref: 006D66E1
                                  Strings
                                  • Failed to get 64-bit system folder., xrefs: 006D6680
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D6676, 006D66B8
                                  • Failed to backslash terminate system folder., xrefs: 006D6724
                                  • Failed to set system folder variant value., xrefs: 006D6740
                                  • Failed to get 32-bit system folder., xrefs: 006D66C2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$DirectorySystem$AddressCurrentHandleModuleProcProcessWow64
                                  • String ID: Failed to backslash terminate system folder.$Failed to get 32-bit system folder.$Failed to get 64-bit system folder.$Failed to set system folder variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 325818893-2857900824
                                  • Opcode ID: 610a6cbb148deeab0a91131947ac56e6cd3bb320c24be708859a5aa2eb209c84
                                  • Instruction ID: 2dd25d31f19bbcc78db6dac73eac2a8b4cd8f699fd7fe743c6d87663635d544e
                                  • Opcode Fuzzy Hash: 610a6cbb148deeab0a91131947ac56e6cd3bb320c24be708859a5aa2eb209c84
                                  • Instruction Fuzzy Hash: AE31F6B2D41239A7D7305798CC4DBDA7669AF04754F01816AFD04B73C1E778ED808AE5
                                  APIs
                                    • Part of subcall function 006E3A29: RegCloseKey.ADVAPI32(00000000,SOFTWARE\Policies\Microsoft\Windows\Installer,00020019,00000000,?,?,?,?,006E3F39,feclient.dll,?,00000000,?,?,?,006D4B57), ref: 006E3ACA
                                  • Sleep.KERNEL32(000007D0,00000001,feclient.dll,?,00000000,?,?,?,006D4B57,?,?,0071B488,?,00000001,00000000,00000000), ref: 006E3FD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseSleep
                                  • String ID: Failed to copy full log path to prefix.$Failed to copy log extension to extension.$Failed to copy log path to prefix.$Failed to get current directory.$Failed to get non-session specific TEMP folder.$Failed to open log: %ls$Setup$clbcatq.dll$crypt32.dll$feclient.dll$log$msasn1.dll
                                  • API String ID: 2834455192-2673269691
                                  • Opcode ID: 0e38aeea6a8395cdd075d056e2b4e21ff510dfbbcd3dcec0685ca1f233ca32cc
                                  • Instruction ID: 830892e4c4bbbf5a78ae2fb651dc0b3ee6760f51492dabc428d68e6be586c15f
                                  • Opcode Fuzzy Hash: 0e38aeea6a8395cdd075d056e2b4e21ff510dfbbcd3dcec0685ca1f233ca32cc
                                  • Instruction Fuzzy Hash: F161D671A013A6BFDF159B76C845BB677BAEF10340B048529F901DB380EB74EE9087A1
                                  APIs
                                  • ___free_lconv_mon.LIBCMT ref: 00708C28
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 00708768
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070877A
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070878C
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070879E
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 007087B0
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 007087C2
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 007087D4
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 007087E6
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 007087F8
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070880A
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070881C
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 0070882E
                                    • Part of subcall function 0070874B: _free.LIBCMT ref: 00708840
                                  • _free.LIBCMT ref: 00708C1D
                                    • Part of subcall function 00705F5F: HeapFree.KERNEL32(00000000,00000000,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?), ref: 00705F75
                                    • Part of subcall function 00705F5F: GetLastError.KERNEL32(?,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?,?), ref: 00705F87
                                  • _free.LIBCMT ref: 00708C3F
                                  • _free.LIBCMT ref: 00708C54
                                  • _free.LIBCMT ref: 00708C5F
                                  • _free.LIBCMT ref: 00708C81
                                  • _free.LIBCMT ref: 00708C94
                                  • _free.LIBCMT ref: 00708CA2
                                  • _free.LIBCMT ref: 00708CAD
                                  • _free.LIBCMT ref: 00708CE5
                                  • _free.LIBCMT ref: 00708CEC
                                  • _free.LIBCMT ref: 00708D09
                                  • _free.LIBCMT ref: 00708D21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                  • String ID:
                                  • API String ID: 161543041-0
                                  • Opcode ID: 4d186880d5021a66c786a451b800d982fb7df1b23f8f533c187f1f528a824f77
                                  • Instruction ID: bd333bfbaa638d85e5e23c97ec112916ae19c30ebb401e4229f75b2021279784
                                  • Opcode Fuzzy Hash: 4d186880d5021a66c786a451b800d982fb7df1b23f8f533c187f1f528a824f77
                                  • Instruction Fuzzy Hash: F7315E71604605DFEB60AA38D849B5773E9EF00310F1446A9E599D72E2DF7CFD448A31
                                  APIs
                                  • CompareStringW.KERNEL32(00000000,00000001,006C0064,000000FF,00007070,000000FF,?,00000000,?,wininet.dll,?,crypt32.dll,?,?,?,00000000), ref: 006E2C80
                                  Strings
                                  • Failed to check for remaining dependents during planning., xrefs: 006E2E26
                                  • Failed to add dependents ignored from command-line., xrefs: 006E2D35
                                  • Failed to add self-dependent to ignore dependents., xrefs: 006E2D04
                                  • Failed to add registration action for self dependent., xrefs: 006E2F4D
                                  • Failed to add registration action for dependent related bundle., xrefs: 006E2F82
                                  • Failed to create the string dictionary., xrefs: 006E2CB9
                                  • wininet.dll, xrefs: 006E2ECD
                                  • Failed to allocate registration action., xrefs: 006E2CE9
                                  • crypt32.dll, xrefs: 006E2CCB, 006E2DC5, 006E2EBA, 006E2F2F
                                  • Failed to add dependent bundle provider key to ignore dependents., xrefs: 006E2DEA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: Failed to add dependent bundle provider key to ignore dependents.$Failed to add dependents ignored from command-line.$Failed to add registration action for dependent related bundle.$Failed to add registration action for self dependent.$Failed to add self-dependent to ignore dependents.$Failed to allocate registration action.$Failed to check for remaining dependents during planning.$Failed to create the string dictionary.$crypt32.dll$wininet.dll
                                  • API String ID: 1825529933-1705955799
                                  • Opcode ID: 2759e980d10aefca88651232fef0f70ef94ab9ad03cda45cee20e30c734b58d2
                                  • Instruction ID: 013c7b06330e1b534bac0ee80110d04930922d59e61bf469d90d14f89287782a
                                  • Opcode Fuzzy Hash: 2759e980d10aefca88651232fef0f70ef94ab9ad03cda45cee20e30c734b58d2
                                  • Instruction Fuzzy Hash: 79B19D70A4136BEBCF258F56C851AAE7BBBBF04710F108169F915AA251D330DDA1CB90
                                  APIs
                                  • IsWindow.USER32(?), ref: 006D4CA9
                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006D4CBA
                                  Strings
                                  • WixBundleLayoutDirectory, xrefs: 006D4C3A
                                  • Failed to open log., xrefs: 006D4B5D
                                  • Failed to set registration variables., xrefs: 006D4C23
                                  • Failed while running , xrefs: 006D4C6F
                                  • Failed to create the message window., xrefs: 006D4BDD
                                  • Failed to set layout directory variable to value provided from command-line., xrefs: 006D4C4B
                                  • Failed to check global conditions, xrefs: 006D4B8E
                                  • Failed to query registration., xrefs: 006D4BF3
                                  • Failed to set action variables., xrefs: 006D4C09
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: MessagePostWindow
                                  • String ID: Failed to check global conditions$Failed to create the message window.$Failed to open log.$Failed to query registration.$Failed to set action variables.$Failed to set layout directory variable to value provided from command-line.$Failed to set registration variables.$Failed while running $WixBundleLayoutDirectory
                                  • API String ID: 3618638489-3051724725
                                  • Opcode ID: abbc8452d89749d027c323147c4641dbe44d4b0a3eb5a2d90fe9228f2d5e8f47
                                  • Instruction ID: 97df58fc373d94bb6f8dd624889eb97010d922ed92f67300b6def5ea7c63d3c6
                                  • Opcode Fuzzy Hash: abbc8452d89749d027c323147c4641dbe44d4b0a3eb5a2d90fe9228f2d5e8f47
                                  • Instruction Fuzzy Hash: 8241E271E02A26BBDB265A24CC45FFAB66EBF04750F00422BF905A6390DF70ED5487D4
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • EnterCriticalSection.KERNEL32(?,00000014,00000001), ref: 006EEEDB
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006EF008
                                  Strings
                                  • Engine is active, cannot change engine state., xrefs: 006EEEF6
                                  • Failed to post launch approved exe message., xrefs: 006EEFF3
                                  • Failed to copy the arguments., xrefs: 006EEF9A
                                  • Failed to copy the id., xrefs: 006EEF6D
                                  • UX requested unknown approved exe with id: %ls, xrefs: 006EEF3B
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EEFE9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                  • String ID: Engine is active, cannot change engine state.$Failed to copy the arguments.$Failed to copy the id.$Failed to post launch approved exe message.$UX requested unknown approved exe with id: %ls$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 1367039788-1366309959
                                  • Opcode ID: a04f24bc1140579cd0e3571770f489c00bb37481fb1223737727e757c3d0fd7a
                                  • Instruction ID: 7c377c215a9ac15e89a16ad509a030dbbb20cd671b1a23ae4468976dbc00115f
                                  • Opcode Fuzzy Hash: a04f24bc1140579cd0e3571770f489c00bb37481fb1223737727e757c3d0fd7a
                                  • Instruction Fuzzy Hash: 4B31F772A51365BFD7219F69DC09E9A37AAEF00720B018565FC04EB391E776DD008794
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000005,00000000,00000003,08000000,00000000,?,00000000,?,006EA6CC,?,00000000,00000000,00000000,?), ref: 006E95AB
                                  • GetLastError.KERNEL32(?,006EA6CC,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 006E95B9
                                    • Part of subcall function 00714385: Sleep.KERNEL32(?,00000000,?,006E84E4,?,?,00000001,00000003,000007D0,?,?,?,?,?,?,006D4DFD), ref: 0071439C
                                  • CloseHandle.KERNEL32(00000000,?,00000001,00000003,000007D0,00000000,00000000), ref: 006E9697
                                  Strings
                                  • Failed to open container in working path: %ls, xrefs: 006E95E8
                                  • %ls container from working path '%ls' to path '%ls', xrefs: 006E9642
                                  • Failed to verify container hash: %ls, xrefs: 006E961A
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E95DD
                                  • Failed to copy %ls to %ls, xrefs: 006E9685
                                  • Moving, xrefs: 006E962D
                                  • Failed to move %ls to %ls, xrefs: 006E966F
                                  • Copying, xrefs: 006E9636, 006E9641
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLastSleep
                                  • String ID: %ls container from working path '%ls' to path '%ls'$Copying$Failed to copy %ls to %ls$Failed to move %ls to %ls$Failed to open container in working path: %ls$Failed to verify container hash: %ls$Moving$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 1275171361-3053955464
                                  • Opcode ID: 4fbc612fb35142e3b696a374d20d8f34ad04efaac564d5f244030e3d5264d737
                                  • Instruction ID: 1c8621dd267a2348626df0141464a127a5d4962e328771b94d95f0d52f351a86
                                  • Opcode Fuzzy Hash: 4fbc612fb35142e3b696a374d20d8f34ad04efaac564d5f244030e3d5264d737
                                  • Instruction Fuzzy Hash: 1C213A72A4277477E3221A2A9C4AFEF271EDF11B60F014015FD057A3C0E6A89D51C5F5
                                  APIs
                                    • Part of subcall function 00710841: EnterCriticalSection.KERNEL32(0073C6EC,00000000,?,?,?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?), ref: 00710851
                                    • Part of subcall function 00710841: LeaveCriticalSection.KERNEL32(0073C6EC,?,?,0073C6E4,?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?), ref: 00710998
                                  • OpenEventLogW.ADVAPI32(00000000,Application), ref: 006E419A
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 006E41A6
                                  • ReportEventW.ADVAPI32(00000000,00000001,00000001,00000001,00000000,00000001,00000000,H<r,00000000), ref: 006E41F3
                                  • CloseEventLog.ADVAPI32(00000000), ref: 006E41FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Event$CriticalSection$CloseEnterErrorLastLeaveOpenReport
                                  • String ID: Application$Failed to open Application event log$H<r$Setup$_Failed$c:\agent\_work\79\s\src\burn\engine\logging.cpp$txt
                                  • API String ID: 1844635321-3199939508
                                  • Opcode ID: 3db3ceef04f8cb3687d22d39eb0d5997dca0712a4fb452826bf286b6a81d8ae9
                                  • Instruction ID: 648eef33bc80bce183b75883a623ce8d8e86c2f66b7268d7255e7efc708f3bfe
                                  • Opcode Fuzzy Hash: 3db3ceef04f8cb3687d22d39eb0d5997dca0712a4fb452826bf286b6a81d8ae9
                                  • Instruction Fuzzy Hash: C8F08172B423717A6721222B6D0DDFB587EDA86F617014018FD10F62C0EA4C9A4185F5
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 006D6FC1
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006D71CD
                                  Strings
                                  • Failed to read variable count., xrefs: 006D6FE1
                                  • Failed to read variable value type., xrefs: 006D71AF
                                  • Failed to read variable value as string., xrefs: 006D719A
                                  • Failed to set variable value., xrefs: 006D7180
                                  • Failed to read variable literal flag., xrefs: 006D71A8
                                  • Failed to read variable included flag., xrefs: 006D71BD
                                  • Failed to set variable., xrefs: 006D71A1
                                  • Failed to read variable value as number., xrefs: 006D7187
                                  • Failed to read variable name., xrefs: 006D71B6
                                  • Unsupported variable type., xrefs: 006D7193
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to read variable count.$Failed to read variable included flag.$Failed to read variable literal flag.$Failed to read variable name.$Failed to read variable value as number.$Failed to read variable value as string.$Failed to read variable value type.$Failed to set variable value.$Failed to set variable.$Unsupported variable type.
                                  • API String ID: 3168844106-528957463
                                  • Opcode ID: 5cbbcc5acfcb38e2108a832081bd024451a5814a2b6aa28d36e98d8406550fb1
                                  • Instruction ID: 06ec06b3498ff16e60ffa57f138846800764a66af9c37283f34e7fbc870b1a2a
                                  • Opcode Fuzzy Hash: 5cbbcc5acfcb38e2108a832081bd024451a5814a2b6aa28d36e98d8406550fb1
                                  • Instruction Fuzzy Hash: 0F717071D0421EFBDB21DEA4CC45EEEBBBAEF00710F144226F900A6290E774DE459BA1
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000005,00000000,00000003,08000080,00000000,?,?,00000000,?,00000000,?,?,?), ref: 007147D0
                                  • GetLastError.KERNEL32 ref: 007147E6
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00714836
                                  • GetLastError.KERNEL32 ref: 00714840
                                  • SetFilePointer.KERNEL32(00000000,?,?,00000001), ref: 00714894
                                  • GetLastError.KERNEL32 ref: 0071489F
                                  • ReadFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,00000001), ref: 0071498E
                                  • CloseHandle.KERNEL32(?), ref: 00714A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: File$ErrorLast$CloseCreateHandlePointerReadSize
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 3286166115-3405085980
                                  • Opcode ID: fb6c6aedb1247eee6eca69368c1bbb535b71e175ae3b395bf85b38cdb2c590a0
                                  • Instruction ID: d1a9e3f76a3232e5db6fb314d9100701c5126a22e8b218481a268fe55bf2d2ac
                                  • Opcode Fuzzy Hash: fb6c6aedb1247eee6eca69368c1bbb535b71e175ae3b395bf85b38cdb2c590a0
                                  • Instruction Fuzzy Hash: C9810672A40266EBDB318E6D8C45BEB66A8AF40720F11412AFD54EF2C0D77CDD80D699
                                  APIs
                                  • GetTempPathW.KERNEL32(00000104,?,00000000,00000000,00000000), ref: 006D2F5C
                                  • GetLastError.KERNEL32 ref: 006D2F66
                                  • GetLocalTime.KERNEL32(?,?,?,?,?,?), ref: 006D3006
                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000001,00000080,00000000), ref: 006D3093
                                  • GetLastError.KERNEL32 ref: 006D30A0
                                  • Sleep.KERNEL32(00000064), ref: 006D30B4
                                  • CloseHandle.KERNEL32(?), ref: 006D311C
                                  Strings
                                  • %ls_%04u%02u%02u%02u%02u%02u%ls%ls%ls, xrefs: 006D3063
                                  • 7Um, xrefs: 006D2EBC
                                  • c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp, xrefs: 006D2F8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CloseCreateFileHandleLocalPathSleepTempTime
                                  • String ID: %ls_%04u%02u%02u%02u%02u%02u%ls%ls%ls$7Um$c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp
                                  • API String ID: 3480017824-1046398564
                                  • Opcode ID: c94cd2c2324fe158776e07fc24717e2d11f2cc92f5f6e897438bc3e5f7be5250
                                  • Instruction ID: 988fa732f96875ed7a1af75d654ed5af073611b52447ebc29702e1766bef13ac
                                  • Opcode Fuzzy Hash: c94cd2c2324fe158776e07fc24717e2d11f2cc92f5f6e897438bc3e5f7be5250
                                  • Instruction Fuzzy Hash: F171A572D41239ABDB709B68DD49BEEB3BAAB18710F004196F904E7390D7349E81CF55
                                  APIs
                                  • UuidCreate.RPCRT4(?), ref: 006E4D4A
                                  • StringFromGUID2.OLE32(?,?,00000027), ref: 006E4D79
                                  • UuidCreate.RPCRT4(?), ref: 006E4DC4
                                  • StringFromGUID2.OLE32(?,?,00000027), ref: 006E4DF0
                                  Strings
                                  • Failed to allocate pipe secret., xrefs: 006E4E19
                                  • Failed to allocate pipe name., xrefs: 006E4DB9
                                  • Failed to create pipe guid., xrefs: 006E4D57
                                  • c:\agent\_work\79\s\src\burn\engine\pipe.cpp, xrefs: 006E4D8A, 006E4DD7
                                  • BurnPipe.%s, xrefs: 006E4DA5
                                  • Failed to convert pipe guid into string., xrefs: 006E4D96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateFromStringUuid
                                  • String ID: BurnPipe.%s$Failed to allocate pipe name.$Failed to allocate pipe secret.$Failed to convert pipe guid into string.$Failed to create pipe guid.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 4041566446-1432765067
                                  • Opcode ID: 19fc2fd176944c6dd90245f1db7347767a71c9dbd846bc1be78c735ac1ca40a2
                                  • Instruction ID: 9451711c4d7033b2c2a637a1cf734c4dfaca302f94431ea0fdca03cc310253d3
                                  • Opcode Fuzzy Hash: 19fc2fd176944c6dd90245f1db7347767a71c9dbd846bc1be78c735ac1ca40a2
                                  • Instruction Fuzzy Hash: 4141BD72D01358EBDB50DBF6DC45EDEB7BAAF44710F20412AE905FB290DA789A05CB90
                                  APIs
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,?,006D54CB,?,?), ref: 006EE913
                                  • GetLastError.KERNEL32(?,006D54CB,?,?), ref: 006EE920
                                  • CreateThread.KERNEL32(00000000,00000000,006EE631,?,00000000,00000000), ref: 006EE979
                                  • GetLastError.KERNEL32(?,006D54CB,?,?), ref: 006EE986
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,006D54CB,?,?), ref: 006EE9C1
                                  • CloseHandle.KERNEL32(00000000,?,006D54CB,?,?), ref: 006EE9E0
                                  • CloseHandle.KERNEL32(?,?,006D54CB,?,?), ref: 006EE9ED
                                  Strings
                                  • Failed to create initialization event., xrefs: 006EE94B
                                  • Failed to create the UI thread., xrefs: 006EE9B1
                                  • c:\agent\_work\79\s\src\burn\engine\uithread.cpp, xrefs: 006EE941, 006EE9A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorHandleLast$EventMultipleObjectsThreadWait
                                  • String ID: Failed to create initialization event.$Failed to create the UI thread.$c:\agent\_work\79\s\src\burn\engine\uithread.cpp
                                  • API String ID: 2351989216-563379454
                                  • Opcode ID: da31a17baa6503b0435744bb06d38aeed9d55437a9c31d9e0ebff90b2d8a957f
                                  • Instruction ID: 7bd2dd37057a8e423cf43db80aff1939eb61dcafa0ef7577a0cf652a47d551bf
                                  • Opcode Fuzzy Hash: da31a17baa6503b0435744bb06d38aeed9d55437a9c31d9e0ebff90b2d8a957f
                                  • Instruction Fuzzy Hash: DC31B576D01329BBD7119F9E8C85ADFBAF9BF04750F11402AF904F7281D7359E008AA1
                                  APIs
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,00000000,?,?,006D54CB,?,?), ref: 006EE4E7
                                  • GetLastError.KERNEL32(?,?,006D54CB,?,?), ref: 006EE4F4
                                  • CreateThread.KERNEL32(00000000,00000000,006EE24B,00000000,00000000,00000000), ref: 006EE553
                                  • GetLastError.KERNEL32(?,?,006D54CB,?,?), ref: 006EE560
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,?,006D54CB,?,?), ref: 006EE59B
                                  • CloseHandle.KERNEL32(?,?,?,006D54CB,?,?), ref: 006EE5AF
                                  • CloseHandle.KERNEL32(?,?,?,006D54CB,?,?), ref: 006EE5BC
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp, xrefs: 006EE515, 006EE581
                                  • Failed to create modal event., xrefs: 006EE51F
                                  • Failed to create UI thread., xrefs: 006EE58B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorHandleLast$EventMultipleObjectsThreadWait
                                  • String ID: Failed to create UI thread.$Failed to create modal event.$c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp
                                  • API String ID: 2351989216-3353660416
                                  • Opcode ID: 057c96808a7a254a9f283d73424fda3d9778117ac45c570be87eb9b62b856e39
                                  • Instruction ID: 7a45d77908d10bc025d5a76a7f91baaa7fe148797b9e8845be7d54fc009f54c6
                                  • Opcode Fuzzy Hash: 057c96808a7a254a9f283d73424fda3d9778117ac45c570be87eb9b62b856e39
                                  • Instruction Fuzzy Hash: 9131D376D01329BBD7208F9A8C04DEFBBB9AB44710F10812AFD10F7290F7399A008A91
                                  APIs
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,75922F60,?,?), ref: 006F12CF
                                  • GetLastError.KERNEL32 ref: 006F12E2
                                  • GetExitCodeThread.KERNEL32(0071B488,00000000), ref: 006F1324
                                  • GetLastError.KERNEL32 ref: 006F1332
                                  • ResetEvent.KERNEL32(0071B460), ref: 006F136D
                                  • GetLastError.KERNEL32 ref: 006F1377
                                  Strings
                                  • Failed to reset operation complete event., xrefs: 006F13A8
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F1309, 006F1359, 006F139E
                                  • Failed to wait for operation complete event., xrefs: 006F1313
                                  • Failed to get extraction thread exit code., xrefs: 006F1363
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeEventExitMultipleObjectsResetThreadWait
                                  • String ID: Failed to get extraction thread exit code.$Failed to reset operation complete event.$Failed to wait for operation complete event.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2979751695-503364381
                                  • Opcode ID: 1537d86cb17768e1ab09e60642b59c63b441ec6c4d73a58c93b754052983a899
                                  • Instruction ID: 9730ef98efdbbab5507005b5f66cf5c448e5c4dfdeb30f1f52475d25a13cd447
                                  • Opcode Fuzzy Hash: 1537d86cb17768e1ab09e60642b59c63b441ec6c4d73a58c93b754052983a899
                                  • Instruction Fuzzy Hash: 4C31B471B4031AFBE700DB698D05BFE76E9AB05741F108119FA05EE6A0E778DA009B55
                                  APIs
                                  • SetEvent.KERNEL32(0071B478,?,00000000,?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000,?), ref: 006F13E2
                                  • GetLastError.KERNEL32(?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000,?,006D54C6,FFF9E89D,006D54C6), ref: 006F13EC
                                  • WaitForSingleObject.KERNEL32(0071B488,000000FF,?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000,?,006D54C6), ref: 006F1426
                                  • GetLastError.KERNEL32(?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000,?,006D54C6,FFF9E89D,006D54C6), ref: 006F1430
                                  • CloseHandle.KERNEL32(00000000,006D54C6,?,00000000,?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000), ref: 006F147B
                                  • CloseHandle.KERNEL32(00000000,006D54C6,?,00000000,?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000), ref: 006F148A
                                  • CloseHandle.KERNEL32(00000000,006D54C6,?,00000000,?,006DC198,?,006D53FA,00000000,?,006E7753,?,006D56AA,006D54B6,006D54B6,00000000), ref: 006F1499
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F1410, 006F1454
                                  • Failed to wait for thread to terminate., xrefs: 006F145E
                                  • Failed to set begin operation event., xrefs: 006F141A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle$ErrorLast$EventObjectSingleWait
                                  • String ID: Failed to set begin operation event.$Failed to wait for thread to terminate.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 1206859064-1896208893
                                  • Opcode ID: 942d87d4b0ee4ab4a38ab3da56405e24be48aedf9697c4d60b40d4b083179132
                                  • Instruction ID: 374e772430b7b2fd899bdbd5176c7abfb3c24726b695cd4c2045609df88cff21
                                  • Opcode Fuzzy Hash: 942d87d4b0ee4ab4a38ab3da56405e24be48aedf9697c4d60b40d4b083179132
                                  • Instruction Fuzzy Hash: 1F210C33A0053AF7D3215B65DC457A6F6E2BF45762F014215EA0869ED0D37CE850CAD9
                                  APIs
                                  • GetLastError.KERNEL32(000007D0,000007D0,00000000,00000000,?,00000000,00000000,00000003,00000000,00000000), ref: 006E9393
                                  • GetLastError.KERNEL32(000007D0,000007D0,00000000,00000000,000007D0,00000001), ref: 006E93BB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: $$0$Could not close verify handle.$Could not verify file %ls.$Failed to allocate memory$Failed to allocate string.$Failed to encode file hash.$Failed to get file hash.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 1452528299-3673993098
                                  • Opcode ID: da0c2925484da48d19acd65fc4c6d2878c6630c9e8193967b9fa96b8b681e258
                                  • Instruction ID: 4c36057aedadc5500127c402b45961b60d2fa4da1172df6eb12f707a77c7e950
                                  • Opcode Fuzzy Hash: da0c2925484da48d19acd65fc4c6d2878c6630c9e8193967b9fa96b8b681e258
                                  • Instruction Fuzzy Hash: 6B81A372D01369ABDB21DBA5C845BEEB7F5AF08710F10012AF914BB380E7389D41CBA1
                                  APIs
                                  • GetWindowLongW.USER32(?,000000EB), ref: 006EE3F8
                                  • DefWindowProcW.USER32(?,00000082,?,?), ref: 006EE436
                                  • SetWindowLongW.USER32(?,000000EB,00000000), ref: 006EE443
                                  • SetWindowLongW.USER32(?,000000EB,?), ref: 006EE452
                                  • DefWindowProcW.USER32(?,?,?,?), ref: 006EE460
                                  • CreateCompatibleDC.GDI32(?), ref: 006EE46C
                                  • SelectObject.GDI32(00000000,00000000), ref: 006EE47D
                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 006EE49F
                                  • SelectObject.GDI32(00000000,00000000), ref: 006EE4A7
                                  • DeleteDC.GDI32(00000000), ref: 006EE4AA
                                  • PostQuitMessage.USER32(00000000), ref: 006EE4B8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Window$Long$ObjectProcSelect$CompatibleCreateDeleteMessagePostQuitStretch
                                  • String ID:
                                  • API String ID: 409979828-0
                                  • Opcode ID: d30a611c408b3c302a21419b7df27156f2a84d2e843d0c0a85bfa86c4c6b92bb
                                  • Instruction ID: 54606895cbcc250debf72bc63e9812cee4bb842d55d3b65d6ce1f8b54663895d
                                  • Opcode Fuzzy Hash: d30a611c408b3c302a21419b7df27156f2a84d2e843d0c0a85bfa86c4c6b92bb
                                  • Instruction Fuzzy Hash: AA217A32100244FFDB155F699C0CEAB3BAAEB49720B15C618F626961E0C73698109B64
                                  Strings
                                  • WixBundleLayoutDirectory, xrefs: 006EA15E
                                  • Failed to get current process directory., xrefs: 006EA0E4
                                  • WixBundleOriginalSource, xrefs: 006EA0A5
                                  • Failed to get bundle layout directory property., xrefs: 006EA179
                                  • Failed to combine layout source with source., xrefs: 006EA198
                                  • WixBundleLastUsedSource, xrefs: 006EA08A
                                  • Failed to copy source path., xrefs: 006EA212
                                  • Failed to combine last source with source., xrefs: 006EA103
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirstlstrlen
                                  • String ID: Failed to combine last source with source.$Failed to combine layout source with source.$Failed to copy source path.$Failed to get bundle layout directory property.$Failed to get current process directory.$WixBundleLastUsedSource$WixBundleLayoutDirectory$WixBundleOriginalSource
                                  • API String ID: 2767606509-3003062821
                                  • Opcode ID: 9657b9b85b6d67bb736cd700cb9ffa9580dd1b9a723240af3b7f4af1118800d8
                                  • Instruction ID: 14d793386a48c1f76e96cf88c89fc08e5ce1675b1cfc1ff380f667f7b10c0879
                                  • Opcode Fuzzy Hash: 9657b9b85b6d67bb736cd700cb9ffa9580dd1b9a723240af3b7f4af1118800d8
                                  • Instruction Fuzzy Hash: DA814E71D01369AFDF11DFD9D8419EEBBB6AF08710F14412AE910B7350D735AE018B96
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,FFFEB88D,000000FF,00000001,000000FF,?,00000001,006D53FA,00000000,006D54C6,006D5482,WixBundleUILevel,840F01E8,?,00000001), ref: 006DCBD9
                                  Strings
                                  • Failed to find embedded payload: %ls, xrefs: 006DCC05
                                  • Failed to extract file., xrefs: 006DCCA4
                                  • Failed to ensure directory exists, xrefs: 006DCCAB
                                  • c:\agent\_work\79\s\src\burn\engine\payload.cpp, xrefs: 006DCCDA
                                  • Failed to concat file paths., xrefs: 006DCCB9
                                  • Failed to get next stream., xrefs: 006DCCC0
                                  • Payload was not found in container: %ls, xrefs: 006DCCE6
                                  • Failed to get directory portion of local file path, xrefs: 006DCCB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: Failed to concat file paths.$Failed to ensure directory exists$Failed to extract file.$Failed to find embedded payload: %ls$Failed to get directory portion of local file path$Failed to get next stream.$Payload was not found in container: %ls$c:\agent\_work\79\s\src\burn\engine\payload.cpp
                                  • API String ID: 1825529933-1810486150
                                  • Opcode ID: b7c82e65bd6f49b35ff8fd7f50b38c990480bfe370949ec596815cff3618fdd5
                                  • Instruction ID: e2b732b6295cd50bcedad330883d85073f3414042f718e485b9129776550b43e
                                  • Opcode Fuzzy Hash: b7c82e65bd6f49b35ff8fd7f50b38c990480bfe370949ec596815cff3618fdd5
                                  • Instruction Fuzzy Hash: CE41C131D1122AEBCF259F48CD41AAEBB77AF40720B10816BE915AB391C6749D41DB90
                                  APIs
                                  • PeekMessageW.USER32(00000000,00000000,00000400,00000400,00000000), ref: 006D4804
                                  • GetCurrentThreadId.KERNEL32 ref: 006D480A
                                  • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006D4898
                                  Strings
                                  • Failed to load UX., xrefs: 006D484D
                                  • Failed to create engine for UX., xrefs: 006D4824
                                  • wininet.dll, xrefs: 006D4837
                                  • c:\agent\_work\79\s\src\burn\engine\engine.cpp, xrefs: 006D48E4
                                  • Unexpected return value from message pump., xrefs: 006D48EE
                                  • Failed to start bootstrapper application., xrefs: 006D4866
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Message$CurrentPeekThread
                                  • String ID: Failed to create engine for UX.$Failed to load UX.$Failed to start bootstrapper application.$Unexpected return value from message pump.$c:\agent\_work\79\s\src\burn\engine\engine.cpp$wininet.dll
                                  • API String ID: 673430819-3694138465
                                  • Opcode ID: c07ecee2bcc0a557796b82f0e464ff72494624b344fb089e078450f5a5753da7
                                  • Instruction ID: 24c0e1ca20ef364c665fa9d8311d589572506ff711fd93d296d0e1caddbbed49
                                  • Opcode Fuzzy Hash: c07ecee2bcc0a557796b82f0e464ff72494624b344fb089e078450f5a5753da7
                                  • Instruction Fuzzy Hash: F541EFB1E00255BBEB109BA8CC85EFA736EEF08754F10412AF905EB390DB34ED4597A4
                                  APIs
                                  • SetFileAttributesW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?,?,006FAD5B,?,00000001,00000000), ref: 006F9A61
                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,006FAD5B,?,00000001,00000000,00000000,00000000,00000001,00000000), ref: 006F9A6B
                                  • CopyFileExW.KERNEL32(00000000,00000000,006F98AF,?,?,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 006F9AB9
                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,006FAD5B,?,00000001,00000000,00000000,00000000,00000001,00000000), ref: 006F9AE8
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\apply.cpp, xrefs: 006F9A8F, 006F9AD3, 006F9B0C
                                  • Failed attempt to copy payload from: '%ls' to: %ls., xrefs: 006F9B1A
                                  • BA aborted copy of payload from: '%ls' to: %ls., xrefs: 006F9AE1
                                  • Failed to clear readonly bit on payload destination path: %ls, xrefs: 006F9A9A
                                  • copy, xrefs: 006F9A2F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$AttributesCopy
                                  • String ID: BA aborted copy of payload from: '%ls' to: %ls.$Failed attempt to copy payload from: '%ls' to: %ls.$Failed to clear readonly bit on payload destination path: %ls$c:\agent\_work\79\s\src\burn\engine\apply.cpp$copy
                                  • API String ID: 1969131206-1952161024
                                  • Opcode ID: 7afcb66d406fb5248085973d058c1cf31b86b4e17d6be302efc7d9fe97455df5
                                  • Instruction ID: a3c5ee1216c4e36b047a17c98966758406ab12d12aa1a2ac4ca04805ecc20682
                                  • Opcode Fuzzy Hash: 7afcb66d406fb5248085973d058c1cf31b86b4e17d6be302efc7d9fe97455df5
                                  • Instruction Fuzzy Hash: 5D311772B4112AF7EB204A5A9C45FFB776BEF41B50B158129FE05EB391E238CD0186B0
                                  APIs
                                  • LocalFree.KERNEL32(00000000,?,00000001,80000005,?,00000000,00000000,00000000,00000003,000007D0), ref: 006E8EEF
                                  Strings
                                  • Failed to create ACL to secure cache path: %ls, xrefs: 006E8EA3
                                  • Failed to allocate access for SYSTEM group to path: %ls, xrefs: 006E8E18
                                  • Failed to allocate access for Administrators group to path: %ls, xrefs: 006E8DF7
                                  • Failed to allocate access for Everyone group to path: %ls, xrefs: 006E8E39
                                  • Failed to secure cache path: %ls, xrefs: 006E8ED2
                                  • Failed to allocate access for Users group to path: %ls, xrefs: 006E8E5A
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E8E98
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeLocal
                                  • String ID: Failed to allocate access for Administrators group to path: %ls$Failed to allocate access for Everyone group to path: %ls$Failed to allocate access for SYSTEM group to path: %ls$Failed to allocate access for Users group to path: %ls$Failed to create ACL to secure cache path: %ls$Failed to secure cache path: %ls$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 2826327444-3744430260
                                  • Opcode ID: 3d836ff3e60b6e1cfd1e27b1d8ec02e1e060c162cf210610956d96341eaa602d
                                  • Instruction ID: ac7a1ac4f5cd4bb21d4ee549de52aff94d3d0c30c25bf2dddf3fb35883b873d5
                                  • Opcode Fuzzy Hash: 3d836ff3e60b6e1cfd1e27b1d8ec02e1e060c162cf210610956d96341eaa602d
                                  • Instruction Fuzzy Hash: BA311972A42379BFDB3197569C06FEF766AAB40B10F104055FA08BB2C0DE74AD45C794
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,name,000000FF,00000000,00000000,00000000,?,7591DFD0), ref: 00716EB7
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,email,000000FF), ref: 00716ED4
                                  • SysFreeString.OLEAUT32(00000000), ref: 00716F12
                                  • SysFreeString.OLEAUT32(00000000), ref: 00716F56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$CompareFree
                                  • String ID: `)u$email$name$uri
                                  • API String ID: 3589242889-2762311025
                                  • Opcode ID: 49acfb09ee6af75da6f59f1c623af638d85e058404df84ef45ee61414bffd7e2
                                  • Instruction ID: 1d5b25508ca9790fa9b473157503f0fd30b0565d48d61442f8c2c45a537ba057
                                  • Opcode Fuzzy Hash: 49acfb09ee6af75da6f59f1c623af638d85e058404df84ef45ee61414bffd7e2
                                  • Instruction Fuzzy Hash: C7416D75905219FBCF21DB98DC45FEEBB78AF00721F2042A4E921AA1E1C7389E85DB50
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DF42F
                                    • Part of subcall function 006D415F: CreateDirectoryW.KERNELBASE(?,840F01E8,00000000,00000000,?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?), ref: 006D416D
                                    • Part of subcall function 006D415F: GetLastError.KERNEL32(?,006E9FD1,00000000,00000000,?,00000000,006D53FA,00000000,?,?,006DD561,?,00000000,00000000), ref: 006D417B
                                  • lstrlenA.KERNEL32(002E0032,00000000,00000094,00000000,00000094,crypt32.dll,crypt32.dll,006E0455,swidtag,00000094,0071B500,00330074,006E0455,00000000,crypt32.dll,00000000), ref: 006DF482
                                    • Part of subcall function 0071501B: CreateFileW.KERNEL32(002E0032,40000000,00000001,00000000,00000002,00000080,00000000,006E0455,00000000,?,006DF499,0071B500,00000080,002E0032,00000000), ref: 00715033
                                    • Part of subcall function 0071501B: GetLastError.KERNEL32(?,006DF499,0071B500,00000080,002E0032,00000000,?,006E0455,crypt32.dll,00000094,?,?,?,?,?,00000000), ref: 00715040
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateErrorLast$DirectoryFileOpen@16lstrlen
                                  • String ID: Failed to allocate regid file path.$Failed to allocate regid folder path.$Failed to create regid folder: %ls$Failed to format tag folder path.$Failed to write tag xml to file: %ls$crypt32.dll$swidtag
                                  • API String ID: 904508749-2959304021
                                  • Opcode ID: efadb26d20a0019620b07a51e43f94cb80e4c9f7fb760dbc3604c0665e6c7cdd
                                  • Instruction ID: 34a58859ee2418930bd390dd015e6738b9b967638353e3d9543c1acc4a44ad1f
                                  • Opcode Fuzzy Hash: efadb26d20a0019620b07a51e43f94cb80e4c9f7fb760dbc3604c0665e6c7cdd
                                  • Instruction Fuzzy Hash: 9531AE72D00229FBCB519F94DC41B9EBBF6BF04710F108176F815AA352D7759A419B90
                                  APIs
                                  • LoadBitmapW.USER32(?,00000001), ref: 006EE16A
                                  • GetLastError.KERNEL32 ref: 006EE176
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 006EE1BD
                                  • GetCursorPos.USER32(?), ref: 006EE1DE
                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 006EE1F0
                                  • GetMonitorInfoW.USER32(00000000,?), ref: 006EE206
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp, xrefs: 006EE19A
                                  • Failed to load splash screen bitmap., xrefs: 006EE1A4
                                  • (, xrefs: 006EE1FD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Monitor$BitmapCursorErrorFromInfoLastLoadObjectPoint
                                  • String ID: ($Failed to load splash screen bitmap.$c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp
                                  • API String ID: 2342928100-2146028690
                                  • Opcode ID: 17177862e0b13b31a786d4e3b05de94df5f2caef62ee73349a8778c1d11e0989
                                  • Instruction ID: 60cf43503f6f00ef5528e85bcd0059e99c144242be4bce808c408de5732404e3
                                  • Opcode Fuzzy Hash: 17177862e0b13b31a786d4e3b05de94df5f2caef62ee73349a8778c1d11e0989
                                  • Instruction Fuzzy Hash: 49314371A013159FDB10CFB9D949ADEBBB5EF08710F04C115E914EB280D774E9008B94
                                  APIs
                                  • GetCurrentProcessId.KERNEL32(?,00000000,?,?,0071B500), ref: 006E5059
                                  • GetProcessId.KERNEL32(000000FF,?,?,open,00000000,00000000,?,000000FF,?,?), ref: 006E50F7
                                  • CloseHandle.KERNEL32(00000000), ref: 006E5110
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Process$CloseCurrentHandle
                                  • String ID: -q -%ls %ls %ls %u$Failed to allocate parameters for elevated process.$Failed to launch elevated child process: %ls$burn.elevated$open$runas
                                  • API String ID: 2815245435-1352204306
                                  • Opcode ID: d55f45d8eece0cb0e88eeda5f69966134792d6006f05fb913e71313f22464446
                                  • Instruction ID: a131a36c5eca25f9b6483a7b37cd9f492744bedcb422aba84f0bebbf51bb4a6a
                                  • Opcode Fuzzy Hash: d55f45d8eece0cb0e88eeda5f69966134792d6006f05fb913e71313f22464446
                                  • Instruction Fuzzy Hash: D021BCB1D01619FFCB119F99DC858EEBBB9EF04318B00806AF812A2250D7389E50DFD0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(msi,DllGetVersion), ref: 006D68C2
                                  • GetProcAddress.KERNEL32(00000000), ref: 006D68C9
                                  • GetLastError.KERNEL32 ref: 006D68D3
                                  Strings
                                  • DllGetVersion, xrefs: 006D68B4
                                  • Failed to get msi.dll version info., xrefs: 006D691B
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D68F7
                                  • Failed to set variant value., xrefs: 006D693F
                                  • msi, xrefs: 006D68B9
                                  • Failed to find DllGetVersion entry point in msi.dll., xrefs: 006D6901
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorHandleLastModuleProc
                                  • String ID: DllGetVersion$Failed to find DllGetVersion entry point in msi.dll.$Failed to get msi.dll version info.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp$msi
                                  • API String ID: 4275029093-2015055865
                                  • Opcode ID: b4109ae8fc626efc696345b0d11f48b00ebc436a01acce8c63a0a0034080cce6
                                  • Instruction ID: b7af79fbb1f9db21ecbb99df8b26b2f0f4c8e6a94d962bb59fff465ff42aeeff
                                  • Opcode Fuzzy Hash: b4109ae8fc626efc696345b0d11f48b00ebc436a01acce8c63a0a0034080cce6
                                  • Instruction Fuzzy Hash: F711DA72E40736A6D720A76CCC56AFF76A5EB08B10B014519FE01FA3C1D678ED4485E5
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008,00000000,?,006D4847,00000000,00000000,wininet.dll,?,00000000,00000000,?,?,006D54CB,?), ref: 006DD684
                                  • GetLastError.KERNEL32(?,006D4847,00000000,00000000,wininet.dll,?,00000000,00000000,?,?,006D54CB,?,?), ref: 006DD691
                                  • GetProcAddress.KERNEL32(00000000,BootstrapperApplicationCreate), ref: 006DD6C9
                                  • GetLastError.KERNEL32(?,006D4847,00000000,00000000,wininet.dll,?,00000000,00000000,?,?,006D54CB,?,?), ref: 006DD6D5
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\userexperience.cpp, xrefs: 006DD6B2, 006DD6F6
                                  • Failed to get BootstrapperApplicationCreate entry-point, xrefs: 006DD700
                                  • Failed to load UX DLL., xrefs: 006DD6BC
                                  • BootstrapperApplicationCreate, xrefs: 006DD6C3
                                  • Failed to create UX., xrefs: 006DD719
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressLibraryLoadProc
                                  • String ID: BootstrapperApplicationCreate$Failed to create UX.$Failed to get BootstrapperApplicationCreate entry-point$Failed to load UX DLL.$c:\agent\_work\79\s\src\burn\engine\userexperience.cpp
                                  • API String ID: 1866314245-53642260
                                  • Opcode ID: ca0c6021032edb978c9361583ad8151bc8af08b185fc1c0aca9404dbb908f873
                                  • Instruction ID: 32fa38ba778d278a4aa68347578891c9a7540f91c9e966d3d094224fa93cb48d
                                  • Opcode Fuzzy Hash: ca0c6021032edb978c9361583ad8151bc8af08b185fc1c0aca9404dbb908f873
                                  • Instruction Fuzzy Hash: CE112773E40736ABD7212A989C05F9F2A966B04B60F02811AFE04FB3C1D668DC004AE4
                                  APIs
                                  • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D1184
                                  • GetModuleHandleW.KERNEL32(kernel32,?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D118F
                                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 006D119D
                                  • GetLastError.KERNEL32(?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D11B8
                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 006D11C0
                                  • GetLastError.KERNEL32(?,?,?,?,?,006D111A,cabinet.dll,00000009,?,?,00000000), ref: 006D11D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorLastProc$HandleHeapInformationModule
                                  • String ID: SetDefaultDllDirectories$SetDllDirectoryW$kernel32
                                  • API String ID: 3104334766-1824683568
                                  • Opcode ID: 1f5864f9bd8a19d96dff5428d36270c4a4ab4886e4c838e56ebe85b75c874748
                                  • Instruction ID: d9784480a08a188a0b80832abf9954ab00178132b70829dd06033328d9f93d11
                                  • Opcode Fuzzy Hash: 1f5864f9bd8a19d96dff5428d36270c4a4ab4886e4c838e56ebe85b75c874748
                                  • Instruction Fuzzy Hash: 7E01D471700316BB97106BAA9C49DEF3B6EFF857607008016FA15A6390E7B4DA458BB4
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 006EF4B0
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006EF62B
                                  Strings
                                  • UX requested unknown container with id: %ls, xrefs: 006EF555
                                  • Engine is active, cannot change engine state., xrefs: 006EF4CA
                                  • Failed to set download password., xrefs: 006EF5D9
                                  • Failed to set download user., xrefs: 006EF5B3
                                  • UX did not provide container or payload id., xrefs: 006EF61A
                                  • UX requested unknown payload with id: %ls, xrefs: 006EF505
                                  • UX denied while trying to set download URL on embedded payload: %ls, xrefs: 006EF51B
                                  • Failed to set download URL., xrefs: 006EF58A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Engine is active, cannot change engine state.$Failed to set download URL.$Failed to set download password.$Failed to set download user.$UX denied while trying to set download URL on embedded payload: %ls$UX did not provide container or payload id.$UX requested unknown container with id: %ls$UX requested unknown payload with id: %ls
                                  • API String ID: 3168844106-2615595102
                                  • Opcode ID: 55f0666d443ad2c36b6f470166a1f199ab1ff63055d80a2c234f4bc4044343b7
                                  • Instruction ID: 9403cc381ef34e3edb58b6d902c23eac3ff851d69af7618d362b48e8dcaf39b2
                                  • Opcode Fuzzy Hash: 55f0666d443ad2c36b6f470166a1f199ab1ff63055d80a2c234f4bc4044343b7
                                  • Instruction Fuzzy Hash: 5B41F771902352ABDB619F26D805EAA73BAEF20710F15813AF804E7390EB75DE50C7A4
                                  APIs
                                  • _free.LIBCMT ref: 00705999
                                    • Part of subcall function 00705F5F: HeapFree.KERNEL32(00000000,00000000,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?), ref: 00705F75
                                    • Part of subcall function 00705F5F: GetLastError.KERNEL32(?,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?,?), ref: 00705F87
                                  • _free.LIBCMT ref: 007059A5
                                  • _free.LIBCMT ref: 007059B0
                                  • _free.LIBCMT ref: 007059BB
                                  • _free.LIBCMT ref: 007059C6
                                  • _free.LIBCMT ref: 007059D1
                                  • _free.LIBCMT ref: 007059DC
                                  • _free.LIBCMT ref: 007059E7
                                  • _free.LIBCMT ref: 007059F2
                                  • _free.LIBCMT ref: 00705A00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: e4e6257df5d1c872b8fd693512697b340bc4af56c364618bab52e279dbc8defa
                                  • Instruction ID: 46887731c79c465bd74949b320425a65e2101dd9659f2f7a83c639e08cdf5e1f
                                  • Opcode Fuzzy Hash: e4e6257df5d1c872b8fd693512697b340bc4af56c364618bab52e279dbc8defa
                                  • Instruction Fuzzy Hash: EA21A9B6900509EFCB01EF94C885DDE7BBAAF08350F0142A5B6199B162DB79EB548F80
                                  APIs
                                  • CreateFileW.KERNEL32(000000FF,C0000000,00000004,00000000,00000004,00000080,00000000,00000000,00000000,00000000,00000078,00000410,000000FF,?,00000000,00000000), ref: 00715CE2
                                  • GetLastError.KERNEL32 ref: 00715CF0
                                  • VirtualAlloc.KERNEL32(00000000,00010000,00003000,00000004), ref: 00715D31
                                  • GetLastError.KERNEL32 ref: 00715D3E
                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00715EB1
                                  • CloseHandle.KERNEL32(?), ref: 00715EC0
                                  Strings
                                  • GET, xrefs: 00715DE5
                                  • c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp, xrefs: 00715D14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastVirtual$AllocCloseCreateFileFreeHandle
                                  • String ID: GET$c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp
                                  • API String ID: 2028584396-1081731170
                                  • Opcode ID: 17d129ae5fe09a85e9c6900bbd9b5fad49ab949aef7537ea311ad75cfe22311f
                                  • Instruction ID: c9093d2eef0990943651ddd6b194251a48c8f9547c4d50365690b73f25d78d80
                                  • Opcode Fuzzy Hash: 17d129ae5fe09a85e9c6900bbd9b5fad49ab949aef7537ea311ad75cfe22311f
                                  • Instruction Fuzzy Hash: 0E617071E0061AEBDB25CFA8CC85BEE7BB5AF88750F114119FD14AB290D738D9809B94
                                  APIs
                                    • Part of subcall function 006E0FB0: CompareStringW.KERNEL32(00000000,00000000,feclient.dll,000000FF,00000000,000000FF,00000000,00000000,?,?,006E0C03,?,00000000,?,00000000,00000000), ref: 006E0FDF
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,00000000,?,00000000,00000001,?,?,00000000,?,00000000), ref: 006E0D87
                                  • GetLastError.KERNEL32 ref: 006E0D94
                                  Strings
                                  • Failed to create syncpoint event., xrefs: 006E0DC2
                                  • c:\agent\_work\79\s\src\burn\engine\plan.cpp, xrefs: 006E0DB8
                                  • Failed to append package start action., xrefs: 006E0C29
                                  • Failed to append payload cache action., xrefs: 006E0D3E
                                  • Failed to append rollback cache action., xrefs: 006E0C63
                                  • Failed to append cache action., xrefs: 006E0CDE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareCreateErrorEventLastString
                                  • String ID: Failed to append cache action.$Failed to append package start action.$Failed to append payload cache action.$Failed to append rollback cache action.$Failed to create syncpoint event.$c:\agent\_work\79\s\src\burn\engine\plan.cpp
                                  • API String ID: 801187047-1222730087
                                  • Opcode ID: b698f9e57b8be2a40ac22d11a689589b03ff747ec2bad24813d7eb1d28d35737
                                  • Instruction ID: d7ff84107707843b60d377a61515c38f73a7da7467be4562a4554b923ce95523
                                  • Opcode Fuzzy Hash: b698f9e57b8be2a40ac22d11a689589b03ff747ec2bad24813d7eb1d28d35737
                                  • Instruction Fuzzy Hash: 8961AFB5501744EFDB01DF55C880AAABBFAFF88310F218459E9059B302EB71EE82DB50
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,7591DFD0,000000FF,type,000000FF,?,7591DFD0,7591DFD0,7591DFD0), ref: 00717180
                                  • SysFreeString.OLEAUT32(00000000), ref: 007171CB
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717247
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717293
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$Free$Compare
                                  • String ID: `)u$type$url
                                  • API String ID: 1324494773-3139739812
                                  • Opcode ID: 20cb0a1b34923922e0378ba942ffc88be4b89f03593d5c6c261b057821366d62
                                  • Instruction ID: 8ba615b51546525e8578ee9705631de03931fea78cb753a2dd0358e0152e293d
                                  • Opcode Fuzzy Hash: 20cb0a1b34923922e0378ba942ffc88be4b89f03593d5c6c261b057821366d62
                                  • Instruction Fuzzy Hash: 3F514C75905219FBCF19DB98C849EEEBBB8BF04721F144299F811EB1A0D7399E80DB50
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9EAF
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9ED4
                                  Strings
                                  • MsiComponentSearch failed: ID '%ls', HRESULT 0x%x, xrefs: 006D9FC8
                                  • Failed to format component id string., xrefs: 006D9EBA
                                  • Failed to get component path: %d, xrefs: 006D9F38
                                  • Failed to set variable., xrefs: 006D9FB8
                                  • Failed to format product code string., xrefs: 006D9EDF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open@16
                                  • String ID: Failed to format component id string.$Failed to format product code string.$Failed to get component path: %d$Failed to set variable.$MsiComponentSearch failed: ID '%ls', HRESULT 0x%x
                                  • API String ID: 3613110473-1671347822
                                  • Opcode ID: b761029f2e26ff36abd552245bde1d8ba6bc6b7277589e6c3b79d9c1ddf36b5a
                                  • Instruction ID: ea6d8afbcb1a9dab7ab5fcc815377443ccbe66f5dfba6b4b72de3b110d142f37
                                  • Opcode Fuzzy Hash: b761029f2e26ff36abd552245bde1d8ba6bc6b7277589e6c3b79d9c1ddf36b5a
                                  • Instruction Fuzzy Hash: 6D41E272D04205BACB259BAC8D46FFEB67BAF04310F244657F500E23D1E7319A90DBA1
                                  APIs
                                  • ReadFile.KERNEL32(00000000,00000001,00000008,?,00000000,?,00000000,00000000,00000001,00000000,?,?,?,00000000,crypt32.dll,00000000), ref: 006E48E1
                                  • GetLastError.KERNEL32 ref: 006E48EE
                                  • ReadFile.KERNEL32(?,00000000,?,?,00000000,?,00000000), ref: 006E4999
                                  • GetLastError.KERNEL32 ref: 006E49A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID: Failed to allocate data for message.$Failed to read data for message.$Failed to read message from pipe.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 1948546556-2758242248
                                  • Opcode ID: fefd358366d30dfdd985aeb57bd9156f7b0a3657f8c211f4beb08d55e7bbfae0
                                  • Instruction ID: fcb8361b397415f00d487b757aa6505e7311a73277fb05e0e78be7b802e922fc
                                  • Opcode Fuzzy Hash: fefd358366d30dfdd985aeb57bd9156f7b0a3657f8c211f4beb08d55e7bbfae0
                                  • Instruction Fuzzy Hash: CD31C672D4133ABBD7109A769C05BAFB76AAB04711F11812AFC41B6381DB789E00CBD5
                                  APIs
                                  • lstrlenW.KERNEL32(?,?,00000000,00000000,BundleUpgradeCode), ref: 007118BD
                                  • lstrlenW.KERNEL32(?,00000002,00000001,?,00000002,00000001,00000000,00000000,BundleUpgradeCode), ref: 0071191F
                                  • lstrlenW.KERNEL32(?), ref: 0071192B
                                  • RegSetValueExW.ADVAPI32(?,?,00000000,00000007,?,?,00000001,?,?,00000002,00000001,00000000,00000000,BundleUpgradeCode), ref: 0071196E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: lstrlen$Value
                                  • String ID: ,ms$,ms$BundleUpgradeCode$c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 198323757-1301082760
                                  • Opcode ID: 336d3c133693c3f8fbd08dbaeac484fe51e51a46c5fcd4334d1dbc6f74be3de1
                                  • Instruction ID: 8bebc9a4b6bcea893f8070598b54814f4395fada94fe09a013df798593a54610
                                  • Opcode Fuzzy Hash: 336d3c133693c3f8fbd08dbaeac484fe51e51a46c5fcd4334d1dbc6f74be3de1
                                  • Instruction Fuzzy Hash: 6231C172D00229AFCB119F9898819DEBBB9EB40750F454069FE50AF250C734ED519BE0
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,0002BF20,?,F0000003,00000000,00000000,?,00000000,00000000,00000000,006D54CB,00000000,00000000,?,00000000), ref: 006E540B
                                  • GetLastError.KERNEL32(?,?,?,006D4CA6,?,?,00000000,?,?,?,?,?,?,0071B4A0,?,?), ref: 006E5416
                                  Strings
                                  • Failed to post terminate message to child process cache thread., xrefs: 006E53DA
                                  • Failed to wait for child process exit., xrefs: 006E5444
                                  • c:\agent\_work\79\s\src\burn\engine\pipe.cpp, xrefs: 006E543A
                                  • Failed to post terminate message to child process., xrefs: 006E53F6
                                  • Failed to write exit code to message buffer., xrefs: 006E5386
                                  • Failed to write restart to message buffer., xrefs: 006E53AE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastObjectSingleWait
                                  • String ID: Failed to post terminate message to child process cache thread.$Failed to post terminate message to child process.$Failed to wait for child process exit.$Failed to write exit code to message buffer.$Failed to write restart to message buffer.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 1211598281-2106699056
                                  • Opcode ID: d999d7cafaf0aeaab78bd946fe5c552e99905fed8fcf7eb3411dea9bc33c1ca8
                                  • Instruction ID: 1bc992a81961f1f17770ba44dcb49c407263424a8ba3316953ef82655eb0ab41
                                  • Opcode Fuzzy Hash: d999d7cafaf0aeaab78bd946fe5c552e99905fed8fcf7eb3411dea9bc33c1ca8
                                  • Instruction Fuzzy Hash: 93214873802B79FBCB124A55DC05EDE77AAEF00325F114211F901B61D0E778EE409AD0
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000005,00000000,00000003,08000000,00000000,00000000,00000101,?,006E9DED,00000003,000007D0,00000003,?,000007D0), ref: 006E8F98
                                  • GetLastError.KERNEL32(?,006E9DED,00000003,000007D0,00000003,?,000007D0,?,000007D0,00000000,00000003,00000000,00000003,000007D0,00000001,?), ref: 006E8FA5
                                  • CloseHandle.KERNEL32(00000000,?,006E9DED,00000003,000007D0,00000003,?,000007D0,?,000007D0,00000000,00000003,00000000,00000003,000007D0,00000001), ref: 006E906D
                                  Strings
                                  • Failed to verify signature of payload: %ls, xrefs: 006E9015
                                  • Failed to open payload at path: %ls, xrefs: 006E8FE9
                                  • Failed to verify catalog signature of payload: %ls, xrefs: 006E9034
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E8FDC
                                  • Failed to verify hash of payload: %ls, xrefs: 006E9058
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLast
                                  • String ID: Failed to open payload at path: %ls$Failed to verify catalog signature of payload: %ls$Failed to verify hash of payload: %ls$Failed to verify signature of payload: %ls$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 2528220319-954720915
                                  • Opcode ID: e22a731cd1b7f3e9f77f7ee81ff0f663cd19c16fae5e8a66b074202380890b32
                                  • Instruction ID: 1fced8f016732e1dc7d6b4b2ef2dbdc8560c42a42c9615504f516b1b4bfc0a21
                                  • Opcode Fuzzy Hash: e22a731cd1b7f3e9f77f7ee81ff0f663cd19c16fae5e8a66b074202380890b32
                                  • Instruction Fuzzy Hash: E3214932942775BBDB331A6A9C49FDB7A1BBF007B0F104219FC10262D093359DA0DAE4
                                  APIs
                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 006D6B7B
                                  • GetLastError.KERNEL32 ref: 006D6B85
                                  • GetVolumePathNameW.KERNEL32(?,?,00000104), ref: 006D6BC9
                                  • GetLastError.KERNEL32 ref: 006D6BD3
                                  Strings
                                  • Failed to get volume path name., xrefs: 006D6C01
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D6BA9, 006D6BF7
                                  • Failed to set variant value., xrefs: 006D6C1D
                                  • Failed to get windows directory., xrefs: 006D6BB3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$DirectoryNamePathVolumeWindows
                                  • String ID: Failed to get volume path name.$Failed to get windows directory.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 124030351-1828470348
                                  • Opcode ID: e2e3b19970559746c743036c6ae91dfc6b104f2b268ef2a0470fd6902101736e
                                  • Instruction ID: 207cafc7f39b36b197698fc9af54755ddccb0fa495cb085449e4969e34ae53e1
                                  • Opcode Fuzzy Hash: e2e3b19970559746c743036c6ae91dfc6b104f2b268ef2a0470fd6902101736e
                                  • Instruction Fuzzy Hash: A921EAB3E4123973D73096588C05FDB766D9F44B10F01816BFE04F7381EA38AE4046A9
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9C46
                                  • GetFileAttributesW.KERNEL32(00000000,000002C0,?,00000000,00000000,000002C0,00000100,000002C0,?,006DA86A,00000100,000002C0,000002C0,?,000002C0,00000100), ref: 006D9C5E
                                  • GetLastError.KERNEL32(?,006DA86A,00000100,000002C0,000002C0,?,000002C0,00000100,000002C0,000002C0,00000100), ref: 006D9C6B
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\search.cpp, xrefs: 006D9C9B
                                  • Failed get to file attributes. '%ls', xrefs: 006D9CA8
                                  • Failed to format variable string., xrefs: 006D9C51
                                  • File search: %ls, did not find path: %ls, xrefs: 006D9CBD
                                  • Failed to set variable., xrefs: 006D9CF4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLastOpen@16
                                  • String ID: Failed get to file attributes. '%ls'$Failed to format variable string.$Failed to set variable.$File search: %ls, did not find path: %ls$c:\agent\_work\79\s\src\burn\engine\search.cpp
                                  • API String ID: 1811509786-1797638888
                                  • Opcode ID: add57fca6f8e5df1a548561b7b35578e198829a30e913fc2888c5e76288b9342
                                  • Instruction ID: e05555f2abe0f8a79f90375e916abbd217fe42f17be0baa3575267110ed127ea
                                  • Opcode Fuzzy Hash: add57fca6f8e5df1a548561b7b35578e198829a30e913fc2888c5e76288b9342
                                  • Instruction Fuzzy Hash: 56212933E50121F7DB1166688D0BFDEB6A7AF00720F114126FD01A73D0E7759D50A6E5
                                  APIs
                                  • TlsSetValue.KERNEL32(?,?), ref: 006EAC3E
                                  • GetLastError.KERNEL32 ref: 006EAC48
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 006EAC87
                                  • CoUninitialize.OLE32(?,006EC5DF,?,?), ref: 006EACC4
                                  Strings
                                  • Failed to set elevated cache pipe into thread local storage for logging., xrefs: 006EAC76
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 006EAC6C
                                  • Failed to initialize COM., xrefs: 006EAC93
                                  • Failed to pump messages in child process., xrefs: 006EACB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorInitializeLastUninitializeValue
                                  • String ID: Failed to initialize COM.$Failed to pump messages in child process.$Failed to set elevated cache pipe into thread local storage for logging.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 876858697-3953973340
                                  • Opcode ID: d3ba049e5b418075aed07953f8c33e533fb5009289da65b6925be4f362254c04
                                  • Instruction ID: b21a3b54ab5ceb9853d0b97f8dabf1e80b475c5ca519c0886d618a7df36554b2
                                  • Opcode Fuzzy Hash: d3ba049e5b418075aed07953f8c33e533fb5009289da65b6925be4f362254c04
                                  • Instruction Fuzzy Hash: 6E113673942371BB9711179A9D099CBBE6AEF04F207224119FD01B7280EB68BE00C6D5
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,CommonFilesDir,?,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00020119,00000000), ref: 006D5D9A
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00711426
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0071145E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: QueryValue$Close
                                  • String ID: +$CommonFilesDir$Failed to ensure path was backslash terminated.$Failed to open Windows folder key.$Failed to read folder path for '%ls'.$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
                                  • API String ID: 1979452859-3209209246
                                  • Opcode ID: 461d2a402d6449e2973bec2c3271918a125bcff18ea62e85ab17574f16c5ec09
                                  • Instruction ID: f82b0ae5b4b46799ddc366ed5ff87dd1c8b0c5ff5c07ab41ca0870554624f947
                                  • Opcode Fuzzy Hash: 461d2a402d6449e2973bec2c3271918a125bcff18ea62e85ab17574f16c5ec09
                                  • Instruction Fuzzy Hash: 84019672D00538FBCB325A5C9C0AEDE766ADF11760F114116F90676390D6B88E80DAE8
                                  APIs
                                  • GetConsoleCP.KERNEL32(Y[p,00000000,00000000), ref: 0070C5FA
                                  • __fassign.LIBCMT ref: 0070C7D9
                                  • __fassign.LIBCMT ref: 0070C7F6
                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0070C83E
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0070C87E
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0070C92A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FileWrite__fassign$ConsoleErrorLast
                                  • String ID: Y[p
                                  • API String ID: 4031098158-2506504590
                                  • Opcode ID: 62e3adf0c990c643839127ca8af2b0b0a50d22fdcd40e7bcc47ed8b43fb700c6
                                  • Instruction ID: 0c466c0f959ae98ebe0d9895a2e5f40bf33210f5bb3bbfbc364ee0c3f7526c88
                                  • Opcode Fuzzy Hash: 62e3adf0c990c643839127ca8af2b0b0a50d22fdcd40e7bcc47ed8b43fb700c6
                                  • Instruction Fuzzy Hash: 48D18A71D00258DFDB16CFA8C8809EDBBF5FF48314F28426AE855BB282D735A946CB54
                                  APIs
                                  • SetFileAttributesW.KERNEL32(?,00000000,?,00000000,?,?,?,00000000,00000000,?), ref: 006FA092
                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,?), ref: 006FA09C
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\apply.cpp, xrefs: 006FA0C0
                                  • :, xrefs: 006FA115
                                  • Failed to clear readonly bit on payload destination path: %ls, xrefs: 006FA0CB
                                  • download, xrefs: 006FA05C
                                  • Failed attempt to download URL: '%ls' to: '%ls', xrefs: 006FA179
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLast
                                  • String ID: :$Failed attempt to download URL: '%ls' to: '%ls'$Failed to clear readonly bit on payload destination path: %ls$c:\agent\_work\79\s\src\burn\engine\apply.cpp$download
                                  • API String ID: 1799206407-2052441727
                                  • Opcode ID: 711b52cc839f243402373a28dc64f27f76579fba3b9120ff9ece5642f8d2dad2
                                  • Instruction ID: 3b2fdeb16460c8b40fcd16f0e600b4c2475b286192e50eee9e20644f79fbcd81
                                  • Opcode Fuzzy Hash: 711b52cc839f243402373a28dc64f27f76579fba3b9120ff9ece5642f8d2dad2
                                  • Instruction Fuzzy Hash: 4B519EB1A0021DABDB10DFA8C841AFEB7B6FF14714F118169EA09EB350E775DA41CB91
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,http://appsyndication.org/2006/appsyn,000000FF,00000010,00000001,00000000,00000000,00000410,?,?,006F8DC0,000002C0,00000100), ref: 0071870C
                                  • CompareStringW.KERNEL32(0000007F,00000000,?,000000FF,application,000000FF,?,?,006F8DC0,000002C0,00000100,000002C0,000002C0,00000100,000002C0,00000410), ref: 00718727
                                  Strings
                                  • type, xrefs: 0071874E
                                  • c:\agent\_work\79\s\src\libs\dutil\apuputil.cpp, xrefs: 007187C2
                                  • application, xrefs: 00718719
                                  • http://appsyndication.org/2006/appsyn, xrefs: 007186FF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareHeapString$AllocateProcess
                                  • String ID: application$c:\agent\_work\79\s\src\libs\dutil\apuputil.cpp$http://appsyndication.org/2006/appsyn$type
                                  • API String ID: 2664528157-1835457522
                                  • Opcode ID: 753ff7dd8732e624208a9945a4c5bdfd6fc3b61bfa46045e5f000fc776bf0ef7
                                  • Instruction ID: 11b0a02175c1fcb8969a45efa33b7bb317443d879baeac4e21ed436221406186
                                  • Opcode Fuzzy Hash: 753ff7dd8732e624208a9945a4c5bdfd6fc3b61bfa46045e5f000fc776bf0ef7
                                  • Instruction Fuzzy Hash: D451E671A40301ABEBA49F5CCC82F9A77A5AF00770F248119F965AB3D5DB78ED80CB15
                                  APIs
                                  • GetLastError.KERNEL32 ref: 00716750
                                  • DeleteFileW.KERNEL32(00000410,00000000,00000000,?,?,00000078,000000FF,00000410,?,?,?,00000078,000000FF,?,?,00000078), ref: 00716847
                                  • CloseHandle.KERNEL32(000000FF,00000000,00000000,?,?,00000078,000000FF,00000410,?,?,?,00000078,000000FF,?,?,00000078), ref: 00716856
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseDeleteErrorFileHandleLast
                                  • String ID: Burn$DownloadTimeout$WiX\Burn$c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp
                                  • API String ID: 3522763407-926787482
                                  • Opcode ID: 444bad2607c462988550bd859c89b9893a3b394cbee352e82543c4670dd65c77
                                  • Instruction ID: ce189c33792b96f19e7e704e73c153940d41b55f4f45094cb0c857426cc906d2
                                  • Opcode Fuzzy Hash: 444bad2607c462988550bd859c89b9893a3b394cbee352e82543c4670dd65c77
                                  • Instruction Fuzzy Hash: C151FE76D00219FFDF119FE88D45EEEBBB9AF08710F008155FA14E6190E7399A519BA0
                                  APIs
                                  • _memcmp.LIBVCRUNTIME ref: 006E91F9
                                    • Part of subcall function 00715922: GetLastError.KERNEL32(?,?,006E921E,62206465,00000003,006D54C6,?), ref: 00715941
                                  • _memcmp.LIBVCRUNTIME ref: 006E9233
                                  • GetLastError.KERNEL32 ref: 006E92AB
                                  Strings
                                  • Failed to read certificate thumbprint., xrefs: 006E929F
                                  • Failed to get certificate public key identifier., xrefs: 006E92D9
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E92CF
                                  • Failed to find expected public key in certificate chain., xrefs: 006E926E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast_memcmp
                                  • String ID: Failed to find expected public key in certificate chain.$Failed to get certificate public key identifier.$Failed to read certificate thumbprint.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 3428363238-3586228532
                                  • Opcode ID: 0de1b138009e9526a7bec69f615939c1cc4b52227cbcc4eef0a7e943a6f8c03f
                                  • Instruction ID: 1c840a0edebe8a67a20eebd9943289971ba9e86de28dbcee2fe87681313f09ac
                                  • Opcode Fuzzy Hash: 0de1b138009e9526a7bec69f615939c1cc4b52227cbcc4eef0a7e943a6f8c03f
                                  • Instruction Fuzzy Hash: 47413D72E11315AFDB10DAA9C841AEAB7BABF08710F014169EA05BB341D674EE40CBA4
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000001,00000000,?,?,00020006,00000000,?,00000001,00000000,?), ref: 006E0667
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000001,00000000,?,?,00020006,00000000,?,00000001,00000000,?), ref: 006E0676
                                    • Part of subcall function 00710EF7: RegCreateKeyExW.ADVAPI32(00000001,00000000,00000000,00000000,00000000,00000001,00000000,?,00000000,00000001,?,?,006E05AE,?,00000000,00020006), ref: 00710F1C
                                  Strings
                                  • Failed to delete registration key: %ls, xrefs: 006E0615
                                  • %ls.RebootRequired, xrefs: 006E0584
                                  • Failed to open registration key., xrefs: 006E06AC
                                  • Failed to update resume mode., xrefs: 006E064B
                                  • Failed to write volatile reboot required registry key., xrefs: 006E05B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close$Create
                                  • String ID: %ls.RebootRequired$Failed to delete registration key: %ls$Failed to open registration key.$Failed to update resume mode.$Failed to write volatile reboot required registry key.
                                  • API String ID: 359002179-2517785395
                                  • Opcode ID: 4954f07efaf1c0a7d74a726ba945afcff118b312d13ee5598cc7238a02410aee
                                  • Instruction ID: bd2dc299ec82a0372cbf3955608f9289f7aedfc07a97084334df69cc6012ab1f
                                  • Opcode Fuzzy Hash: 4954f07efaf1c0a7d74a726ba945afcff118b312d13ee5598cc7238a02410aee
                                  • Instruction Fuzzy Hash: AF41B271801354FBEF22AFA6DC06EAF7BBBAF90700F104019F50162151D7B59AA0DF51
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,00000000,00000000), ref: 0071065C
                                  • GetComputerNameW.KERNEL32(?,?), ref: 007106B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Name$ComputerFileModule
                                  • String ID: --- logging level: %hs ---$=== Logging started: %ls ===$Computer : %ls$Executable: %ls v%d.%d.%d.%d$js
                                  • API String ID: 2577110986-4168519870
                                  • Opcode ID: 84947d56feaa3627d54eb481b744860c8564059ff9fdfc02d5c800dc59dfad39
                                  • Instruction ID: 921a728ca3adfae0bb52206e204ad9899d804b8ed33b05ac4b7b3dd25847f396
                                  • Opcode Fuzzy Hash: 84947d56feaa3627d54eb481b744860c8564059ff9fdfc02d5c800dc59dfad39
                                  • Instruction Fuzzy Hash: 2A4156F590011CABDF109B68DD49AEA77BCEB44340F4481A9F605E3192D778AEC48FE8
                                  APIs
                                  • RegCloseKey.ADVAPI32(?,?,?,00000001,?,?,?,00000001,00000000,?,00000000,?,?,?,00000000,?), ref: 006DF8E1
                                  • RegCloseKey.ADVAPI32(00000000,?,?,00000001,?,?,?,00000001,00000000,?,00000000,?,?,?,00000000,?), ref: 006DF8EE
                                  Strings
                                  • Resume, xrefs: 006DF855
                                  • %ls.RebootRequired, xrefs: 006DF7CE
                                  • Failed to open registration key., xrefs: 006DF84A
                                  • Failed to format pending restart registry key to read., xrefs: 006DF7E5
                                  • Failed to read Resume value., xrefs: 006DF877
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close
                                  • String ID: %ls.RebootRequired$Failed to format pending restart registry key to read.$Failed to open registration key.$Failed to read Resume value.$Resume
                                  • API String ID: 3535843008-3890505273
                                  • Opcode ID: 02cd87363c8ff18bcf9233421383201a3bf8832eff2b04a38de120a496e5b5cd
                                  • Instruction ID: edb597a519c04a6643406214bed39ca260568a7a8b6ae6fca3be17b60c85f531
                                  • Opcode Fuzzy Hash: 02cd87363c8ff18bcf9233421383201a3bf8832eff2b04a38de120a496e5b5cd
                                  • Instruction Fuzzy Hash: E8413871D04219FFDB119F98D881AE9BBB6FF04314F158177E812AB350C375AE81AB82
                                  APIs
                                  • EnterCriticalSection.KERNEL32(0073C6EC,00000000,?,?,?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?), ref: 00710851
                                  • CreateFileW.KERNEL32(40000000,00000001,00000000,00000000,00000080,00000000,?,00000000,?,?,?,0073C6E4,?,006E418F,00000000,Setup), ref: 007108F5
                                  • GetLastError.KERNEL32(?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?,?,?), ref: 00710905
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?), ref: 0071093F
                                    • Part of subcall function 006D2EBC: GetLocalTime.KERNEL32(?,?,?,?,?,?), ref: 006D3006
                                  • LeaveCriticalSection.KERNEL32(0073C6EC,?,?,0073C6E4,?,006E418F,00000000,Setup,_Failed,txt,00000000,00000000,00000000,00000001,006D5537,?), ref: 00710998
                                  Strings
                                  • 7Um, xrefs: 0071086E
                                  • c:\agent\_work\79\s\src\libs\dutil\logutil.cpp, xrefs: 00710924
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalFileSection$CreateEnterErrorLastLeaveLocalPointerTime
                                  • String ID: 7Um$c:\agent\_work\79\s\src\libs\dutil\logutil.cpp
                                  • API String ID: 4111229724-3527942410
                                  • Opcode ID: 78b70ab5eda178fed53a6adb9fcf3def70030c79339bb51516e30534f5e644f7
                                  • Instruction ID: 8bbaa066de2ed3218c90e68c517aacff52b7a326ffa07c6bf64a5ff2d306d50d
                                  • Opcode Fuzzy Hash: 78b70ab5eda178fed53a6adb9fcf3def70030c79339bb51516e30534f5e644f7
                                  • Instruction Fuzzy Hash: 6331B672900229EFFB125FB89D66AEE3669AB00751F00D126F900F6292D7B9DDC097D4
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006F37B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open@16
                                  • String ID: %s%="%s"$Failed to append property string part.$Failed to escape string.$Failed to format property string part.$Failed to format property value.$feclient.dll
                                  • API String ID: 3613110473-656185529
                                  • Opcode ID: 0ce8ee4a139df5ee80f4b9208944a5783f3729ae2bda3521a2aebbb3c80526fd
                                  • Instruction ID: 4a6eedb92a4c88dae52f4a7b3836cfd9fc329669e787f1c3a227e17749816d08
                                  • Opcode Fuzzy Hash: 0ce8ee4a139df5ee80f4b9208944a5783f3729ae2bda3521a2aebbb3c80526fd
                                  • Instruction Fuzzy Hash: 9E31B0B1D0023AFBDB15AE94DC41EAEBB7AAF00750F10016AFA1166351E774EF10DB94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to determine length of relative path.$Failed to determine length of source path.$Failed to set last source.$Failed to trim source folder.$WixBundleLastUsedSource
                                  • API String ID: 0-660234312
                                  • Opcode ID: f9fd11d62cdb5f17b246476a44d42522b50553e1e12cc66c1d83f75dbfaad40f
                                  • Instruction ID: e8dcf4ee407b9c691d3345d7c520dd9b75a7a7f373fa418b3f384c4f0b3b80b7
                                  • Opcode Fuzzy Hash: f9fd11d62cdb5f17b246476a44d42522b50553e1e12cc66c1d83f75dbfaad40f
                                  • Instruction Fuzzy Hash: A931EA31D51369BBCF229BD9CC41E9E7BBBEB00720F214226F410B72D2D670AE41C691
                                  APIs
                                  • CoCreateInstance.OLE32(007311A0,00000000,00000017,007311B0,?,?,00000000,00000000,?,?,?,?,?,006FDBB9,00000000,00000000), ref: 006FD5CB
                                  Strings
                                  • Failed to create BITS job., xrefs: 006FD605
                                  • Failed to create IBackgroundCopyManager., xrefs: 006FD5D7
                                  • WixBurn, xrefs: 006FD5F6
                                  • Failed to set BITS job to foreground., xrefs: 006FD64C
                                  • Failed to set progress timeout., xrefs: 006FD635
                                  • Failed to set notification flags for BITS job., xrefs: 006FD61D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID: Failed to create BITS job.$Failed to create IBackgroundCopyManager.$Failed to set BITS job to foreground.$Failed to set notification flags for BITS job.$Failed to set progress timeout.$WixBurn
                                  • API String ID: 542301482-468763447
                                  • Opcode ID: b385613da50c594002ace1562ed58eb0b3d0a38c913c8a47656995add99feea1
                                  • Instruction ID: 9806d5be02a93ca37cbffb20452c95d781bdc3274a61524ef9c84f05923a3354
                                  • Opcode Fuzzy Hash: b385613da50c594002ace1562ed58eb0b3d0a38c913c8a47656995add99feea1
                                  • Instruction Fuzzy Hash: 153182B1A0021DAFD715DBA8C845EBFBBB6AF48714F104159FA05EB391CA34EC028B90
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,C0000000,00000004,00000000,00000004,00000080,00000000,00000000,?,?,?,?,?,WiX\Burn,DownloadTimeout,00000078), ref: 0071603B
                                  • GetLastError.KERNEL32 ref: 00716048
                                  • ReadFile.KERNEL32(00000000,00000008,00000008,?,00000000), ref: 0071608F
                                  • GetLastError.KERNEL32 ref: 007160C3
                                  • CloseHandle.KERNEL32(00000000,c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp,000000C8,00000000), ref: 007160F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$CloseCreateHandleRead
                                  • String ID: %ls.R$c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp
                                  • API String ID: 3160720760-1867622455
                                  • Opcode ID: 9b5d141a3ac1c6346132c2aeacd5db032a0969ab67b0306a3b8654e8720f4c1b
                                  • Instruction ID: 3ce52b3836cf96ee789f306b3936369a9d18ddbdaf3777f8a966d8db09ee544f
                                  • Opcode Fuzzy Hash: 9b5d141a3ac1c6346132c2aeacd5db032a0969ab67b0306a3b8654e8720f4c1b
                                  • Instruction Fuzzy Hash: 2431FB72941225ABE7208F5CCC45FEE7AA4AF09721F118259FE10EB2C1D7789D40D6A5
                                  APIs
                                    • Part of subcall function 006DCD19: CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,006DE3EA,000000FF,00000000,00000000,006DE3EA,?,?,006DDB91,?,?,?,?), ref: 006DCD44
                                  • CreateFileW.KERNEL32(E90071BA,80000000,00000005,00000000,00000003,08000000,00000000,006D5402,?,00000000,840F01E8,E0680A79,00000001,006D53FA,00000000,006D54C6), ref: 006DC915
                                  • GetLastError.KERNEL32(?,?,?,006E770F,006D56AA,006D54B6,006D54B6,00000000,?,006D54C6,FFF9E89D,006D54C6,006D54FA,006D5482,?,006D5482), ref: 006DC95A
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\catalog.cpp, xrefs: 006DC97B
                                  • Failed to open catalog in working path: %ls, xrefs: 006DC988
                                  • Failed to find payload for catalog file., xrefs: 006DC99F
                                  • Failed to verify catalog signature: %ls, xrefs: 006DC953
                                  • Failed to get catalog local file path, xrefs: 006DC998
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareCreateErrorFileLastString
                                  • String ID: Failed to find payload for catalog file.$Failed to get catalog local file path$Failed to open catalog in working path: %ls$Failed to verify catalog signature: %ls$c:\agent\_work\79\s\src\burn\engine\catalog.cpp
                                  • API String ID: 1774366664-2195853170
                                  • Opcode ID: b1950cb864911289c1873d850e12312f570c89d9e2e3cd840d0b121152e9c34b
                                  • Instruction ID: c42f898f3905c5f19d019265b7b9c81a2e63a1c607f7980c8a62d7f150cc1abd
                                  • Opcode Fuzzy Hash: b1950cb864911289c1873d850e12312f570c89d9e2e3cd840d0b121152e9c34b
                                  • Instruction Fuzzy Hash: 9F31D572D0062ABFD7219B68CC15F9ABB66AF04760F118226F904FF380E674E950CBD4
                                  APIs
                                  • CreateProcessW.KERNEL32(00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,00000000), ref: 00710CC3
                                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,00000000), ref: 00710CCD
                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00000000,00000000), ref: 00710D16
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,00000000,00000000), ref: 00710D23
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle$CreateErrorLastProcess
                                  • String ID: "%ls" %ls$D$c:\agent\_work\79\s\src\libs\dutil\procutil.cpp
                                  • API String ID: 161867955-3306605438
                                  • Opcode ID: 63d4cbdab2c7d86d1485df107da2ee568a2740adba72ca1661bd28c7b9485d67
                                  • Instruction ID: 4213415908b78aacbbfe22b4df34abab77fe9c817342af646f5dd33148f7fbc3
                                  • Opcode Fuzzy Hash: 63d4cbdab2c7d86d1485df107da2ee568a2740adba72ca1661bd28c7b9485d67
                                  • Instruction Fuzzy Hash: 14214F71D0021EABDB119FE8DD419EEBBB9EF04710F11402AEA01B6290D7B49E809BE5
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,759230B0,00000000,?,?,?,006FD334,?), ref: 006FD057
                                  • ReleaseMutex.KERNEL32(?,?,?,006FD334,?), ref: 006FD06B
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006FD0B0
                                  • ReleaseMutex.KERNEL32(?), ref: 006FD0C3
                                  • SetEvent.KERNEL32(?), ref: 006FD0CC
                                  Strings
                                  • Failed to get message from netfx chainer., xrefs: 006FD0ED
                                  • Failed to send files in use message from netfx chainer., xrefs: 006FD110
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: MutexObjectReleaseSingleWait$Event
                                  • String ID: Failed to get message from netfx chainer.$Failed to send files in use message from netfx chainer.
                                  • API String ID: 2608678126-3424578679
                                  • Opcode ID: 12ec05b0e71cae7b5008aad377088aad2771ad892bf2261fb36e40baf3b59421
                                  • Instruction ID: 47cb0d7916f24c86896a9c9af6316f8d26eab1b16ef581bd6e8d04e76677a6d4
                                  • Opcode Fuzzy Hash: 12ec05b0e71cae7b5008aad377088aad2771ad892bf2261fb36e40baf3b59421
                                  • Instruction Fuzzy Hash: AC31E87290011EBFCB018F68CC45EFDBBBABF15324F148265F514A2291CB74E9549B90
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9B75
                                  • GetFileAttributesW.KERNEL32(00000000,000002C0,?,00000000,00000000,000002C0,00000100,00000000,?,006DA880,00000100,000002C0,000002C0,00000100), ref: 006D9B95
                                  • GetLastError.KERNEL32(?,006DA880,00000100,000002C0,000002C0,00000100), ref: 006D9BA0
                                  Strings
                                  • Failed to format variable string., xrefs: 006D9B80
                                  • Failed while searching directory search: %ls, for path: %ls, xrefs: 006D9BF6
                                  • Directory search: %ls, did not find path: %ls, reason: 0x%x, xrefs: 006D9C0C
                                  • Failed to set directory search path variable., xrefs: 006D9BD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLastOpen@16
                                  • String ID: Directory search: %ls, did not find path: %ls, reason: 0x%x$Failed to format variable string.$Failed to set directory search path variable.$Failed while searching directory search: %ls, for path: %ls
                                  • API String ID: 1811509786-2966038646
                                  • Opcode ID: f97e183a922998eb6e99d9ec62289a70a610adab0babeda08a6261239ed7aa7b
                                  • Instruction ID: 42c463ed276d263d0477af4c83bab34c74770d7222eeac396198020ee33d7614
                                  • Opcode Fuzzy Hash: f97e183a922998eb6e99d9ec62289a70a610adab0babeda08a6261239ed7aa7b
                                  • Instruction Fuzzy Hash: 40112632C40125F7CB121A8C9D06FDEBA67AF00320F224213FC05763A0D7299E90AAE5
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9D2A
                                  • GetFileAttributesW.KERNEL32(00000000,000002C0,?,00000000,00000000,000002C0,00000100,000002C0,?,006DA858,00000100,000002C0,000002C0,?,000002C0,00000100), ref: 006D9D4A
                                  • GetLastError.KERNEL32(?,006DA858,00000100,000002C0,000002C0,?,000002C0,00000100,000002C0,000002C0,00000100), ref: 006D9D55
                                  Strings
                                  • Failed to format variable string., xrefs: 006D9D35
                                  • Failed to set variable to file search path., xrefs: 006D9DAD
                                  • File search: %ls, did not find path: %ls, xrefs: 006D9DB9
                                  • Failed while searching file search: %ls, for path: %ls, xrefs: 006D9D83
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLastOpen@16
                                  • String ID: Failed to format variable string.$Failed to set variable to file search path.$Failed while searching file search: %ls, for path: %ls$File search: %ls, did not find path: %ls
                                  • API String ID: 1811509786-3425311760
                                  • Opcode ID: c84efeb0fec47aa7e1cc9042a5acecf0dfcd0fce9f190c63cbe7d679020a4e1f
                                  • Instruction ID: 7b07c72ef7218e72cf96f44f7fe01011c601dd76efbcb330bc3b6e3f4b5c8975
                                  • Opcode Fuzzy Hash: c84efeb0fec47aa7e1cc9042a5acecf0dfcd0fce9f190c63cbe7d679020a4e1f
                                  • Instruction Fuzzy Hash: 1E11E433D40925FBDB226A988C06BDDBA37AF15720F214113FC00B63A1D7759E50ABE5
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 006D9A85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: BTm$Condition$Failed to copy condition string from BSTR$Failed to get Condition inner text.$Failed to select condition node.$`)u
                                  • API String ID: 3341692771-3360982573
                                  • Opcode ID: a1142484d0ad95f14dbf7bdef5f047944199f9a61b4a376e83acff4514a99f56
                                  • Instruction ID: 51dfdca9864e3df68f9cdb92e264218e0697d8ec56978c0b5a49c936b01e2257
                                  • Opcode Fuzzy Hash: a1142484d0ad95f14dbf7bdef5f047944199f9a61b4a376e83acff4514a99f56
                                  • Instruction Fuzzy Hash: 8511A572E40224FBDB25A798DC06BEE7B769F00710F150156F801B6394D7759F409BA0
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000493E0,00000000,?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3), ref: 006ECDEF
                                  • GetLastError.KERNEL32(?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3,?,?,?), ref: 006ECDF9
                                  • GetExitCodeThread.KERNEL32(?,?,?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3,?), ref: 006ECE35
                                  • GetLastError.KERNEL32(?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3,?,?,?), ref: 006ECE3F
                                  Strings
                                  • Failed to get cache thread exit code., xrefs: 006ECE6D
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 006ECE1D, 006ECE63
                                  • Failed to wait for cache thread to terminate., xrefs: 006ECE27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeExitObjectSingleThreadWait
                                  • String ID: Failed to get cache thread exit code.$Failed to wait for cache thread to terminate.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 3686190907-4103082216
                                  • Opcode ID: 2739f0c5e8c791f28389a8ca877597ae8a74db7af90ccd7f1052722fbed4a216
                                  • Instruction ID: 75cca603a3e8abfc23c40fa21e2d71eb84af9dfcf08c424b0a4102f557e6647e
                                  • Opcode Fuzzy Hash: 2739f0c5e8c791f28389a8ca877597ae8a74db7af90ccd7f1052722fbed4a216
                                  • Instruction Fuzzy Hash: 9A01F5B3E42371A3E220575A5D0AB9F7956BF04BA1B028125FD01BB2C0E76CDD1195E9
                                  APIs
                                  • WaitForSingleObject.KERNEL32(00000001,000000FF,00000000,?,006E6DE6,?,?,00000000,crypt32.dll,00000000,00000001), ref: 006E68B8
                                  • GetLastError.KERNEL32(?,006E6DE6,?,?,00000000,crypt32.dll,00000000,00000001), ref: 006E68C2
                                  • GetExitCodeThread.KERNEL32(00000001,00000000,?,006E6DE6,?,?,00000000,crypt32.dll,00000000,00000001), ref: 006E6901
                                  • GetLastError.KERNEL32(?,006E6DE6,?,?,00000000,crypt32.dll,00000000,00000001), ref: 006E690B
                                  Strings
                                  • Failed to get cache thread exit code., xrefs: 006E693C
                                  • Failed to wait for cache thread to terminate., xrefs: 006E68F3
                                  • c:\agent\_work\79\s\src\burn\engine\core.cpp, xrefs: 006E68E9, 006E6932
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeExitObjectSingleThreadWait
                                  • String ID: Failed to get cache thread exit code.$Failed to wait for cache thread to terminate.$c:\agent\_work\79\s\src\burn\engine\core.cpp
                                  • API String ID: 3686190907-2215413561
                                  • Opcode ID: 084b19a2c9f0886cd09877d58a6334ac8b28eb76310bf332b7f3ad6871273e9b
                                  • Instruction ID: b0dbca513a78b2b08ffab41dc0083a3a73f32f5224da85465ddd516de1d5df7b
                                  • Opcode Fuzzy Hash: 084b19a2c9f0886cd09877d58a6334ac8b28eb76310bf332b7f3ad6871273e9b
                                  • Instruction Fuzzy Hash: 3C11CC7074135BFBE700DF66DD06BAF36AAAB20750F108069F800DA291DB7DDA009B68
                                  APIs
                                  • GetLastError.KERNEL32(006D54C6,000000FF,006D5482,006E770F,006D53FA,00000000,?), ref: 006EAB7F
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,006D54C6,000000FF,006D5482,006E770F,006D53FA,00000000,?), ref: 006EABC3
                                    • Part of subcall function 006E916B: _memcmp.LIBVCRUNTIME ref: 006E91F9
                                    • Part of subcall function 006E916B: _memcmp.LIBVCRUNTIME ref: 006E9233
                                  Strings
                                  • Failed to verify expected payload against actual certificate chain., xrefs: 006EAC07
                                  • Failed to get signer chain from authenticode certificate., xrefs: 006EABF1
                                  • Failed authenticode verification of payload: %ls, xrefs: 006EAB60
                                  • Failed to get provider state from authenticode certificate., xrefs: 006EABAD
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006EAB55, 006EABA3, 006EABE7
                                  • 0, xrefs: 006EAAFB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast_memcmp
                                  • String ID: 0$Failed authenticode verification of payload: %ls$Failed to get provider state from authenticode certificate.$Failed to get signer chain from authenticode certificate.$Failed to verify expected payload against actual certificate chain.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 3428363238-2984648607
                                  • Opcode ID: ce3ff0c62f4e70ce17e8d4622688e23509475027b204e341149b590524b9b3ea
                                  • Instruction ID: db05a900e62d95dea2b2044c5cabda9792f35667e54e72515a00a65c4b9c0aaa
                                  • Opcode Fuzzy Hash: ce3ff0c62f4e70ce17e8d4622688e23509475027b204e341149b590524b9b3ea
                                  • Instruction Fuzzy Hash: 8841C7B2D013699BDB14DBD5D945ADEBBB9AF04710F11422EF801BB380E778AD048BE5
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 006EF64E
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006EF75B
                                  Strings
                                  • UX requested unknown container with id: %ls, xrefs: 006EF71A
                                  • Engine is active, cannot change engine state., xrefs: 006EF668
                                  • Failed to set source path for payload., xrefs: 006EF6EA
                                  • UX denied while trying to set source on embedded payload: %ls, xrefs: 006EF6D0
                                  • UX requested unknown payload with id: %ls, xrefs: 006EF6BA
                                  • Failed to set source path for container., xrefs: 006EF740
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Engine is active, cannot change engine state.$Failed to set source path for container.$Failed to set source path for payload.$UX denied while trying to set source on embedded payload: %ls$UX requested unknown container with id: %ls$UX requested unknown payload with id: %ls
                                  • API String ID: 3168844106-4121889706
                                  • Opcode ID: 1885716cb879abb7284a4b2a3e13cd14feb0dab8aa8b75532b5a57059dc36b34
                                  • Instruction ID: bfd9483979bc7e456723e17c0e8c498fadfe0983f407eb98f2e409e4e4936bd4
                                  • Opcode Fuzzy Hash: 1885716cb879abb7284a4b2a3e13cd14feb0dab8aa8b75532b5a57059dc36b34
                                  • Instruction Fuzzy Hash: 663137729013A5BBCF119F5AEC45D9B73BE9F14720715802AF804E7340DB74ED418794
                                  APIs
                                  • lstrlenW.KERNEL32(00000000), ref: 006D721D
                                  Strings
                                  • Failed to format escape sequence., xrefs: 006D72B7
                                  • Failed to append escape sequence., xrefs: 006D72B0
                                  • Failed to append characters., xrefs: 006D72A9
                                  • Failed to allocate buffer for escaped string., xrefs: 006D7234
                                  • []{}, xrefs: 006D7247
                                  • [\%c], xrefs: 006D727C
                                  • Failed to copy string., xrefs: 006D72D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: Failed to allocate buffer for escaped string.$Failed to append characters.$Failed to append escape sequence.$Failed to copy string.$Failed to format escape sequence.$[\%c]$[]{}
                                  • API String ID: 1659193697-3250950999
                                  • Opcode ID: e04e5c54d062d032aac467feea57925bb67484b5affe70a3dc309cafe53ab241
                                  • Instruction ID: 5432c4b3188accd6508d66a7f01e1408a3d1823a72ccb502f5370e8b34f0cd33
                                  • Opcode Fuzzy Hash: e04e5c54d062d032aac467feea57925bb67484b5affe70a3dc309cafe53ab241
                                  • Instruction Fuzzy Hash: 12210C72D08255F6DB3196988C46FEE77AA9F14760F200117F800B6380FB78AF4196D9
                                  APIs
                                  • CompareStringW.KERNEL32(00000000,00000000,0071B500,000000FF,feclient.dll,000000FF,00000000,00000000,?,?,?,006F656D,?,00000001,?,00000000), ref: 006F59E2
                                  Strings
                                  • Failed grow array of ordered patches., xrefs: 006F5A7B
                                  • Failed to copy target product code., xrefs: 006F5B13
                                  • feclient.dll, xrefs: 006F59D8, 006F5B00
                                  • Failed to insert execute action., xrefs: 006F5A37
                                  • Failed to plan action for target product., xrefs: 006F5A8D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: Failed grow array of ordered patches.$Failed to copy target product code.$Failed to insert execute action.$Failed to plan action for target product.$feclient.dll
                                  • API String ID: 1825529933-3477540455
                                  • Opcode ID: f6c7ada922889857e12327347b8e36fd82f0bbadfc2da4fd248e823c96377b7f
                                  • Instruction ID: cbaeeacb9a5a9496568c3e7b049476a4684999e8b355fcfb64a905155599346c
                                  • Opcode Fuzzy Hash: f6c7ada922889857e12327347b8e36fd82f0bbadfc2da4fd248e823c96377b7f
                                  • Instruction Fuzzy Hash: 688116B560475ADFCB14CF58C880AAA77A6FF08324B118669FE169B352D770EC61CF90
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,?,00000001,0071B500,?,00000001,000000FF,?,?,00000000,00000000,00000001,00000000,?,006E73CB), ref: 006ED408
                                  Strings
                                  • Failed to elevate., xrefs: 006ED3EA
                                  • Failed to connect to elevated child process., xrefs: 006ED3F1
                                  • UX aborted elevation requirement., xrefs: 006ED310
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 006ED306
                                  • Failed to create pipe and cache pipe., xrefs: 006ED358
                                  • Failed to create pipe name and client token., xrefs: 006ED33C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID: Failed to connect to elevated child process.$Failed to create pipe and cache pipe.$Failed to create pipe name and client token.$Failed to elevate.$UX aborted elevation requirement.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 2962429428-1168911150
                                  • Opcode ID: ba804d241910e56f1090b889061a64d07b189878e34b9ba2d7ce762030b0d660
                                  • Instruction ID: a28928953313fd4a66e78a7c363e4d614a0869945efafe19d5846b7afb961e65
                                  • Opcode Fuzzy Hash: ba804d241910e56f1090b889061a64d07b189878e34b9ba2d7ce762030b0d660
                                  • Instruction Fuzzy Hash: 17315D72A467B1BBE7256261DC46FEF625FEF01720F20420AF905B72C1DB75AD0086D6
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000001,00000001,crypt32.dll,00000000,00000001,0071B500,00000000,00000001,00000000,00020019,00000001,00000000,00000000,00020019,00000000,00000001), ref: 007197A2
                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,crypt32.dll,00000000,00000001,0071B500,00000000,00000001,00000000,00020019), ref: 007197DD
                                  • RegCloseKey.ADVAPI32(00000001,00000001,00020019,00000000,00000000,00000000,00000000,00000000,crypt32.dll), ref: 007197F9
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00020019,00000000,00000000,00000000,00000000,00000000,crypt32.dll), ref: 00719806
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00020019,00000000,00000000,00000000,00000000,00000000,crypt32.dll), ref: 00719813
                                    • Part of subcall function 007112D8: RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0071978F,00000001), ref: 007112F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close$InfoOpenQuery
                                  • String ID: crypt32.dll
                                  • API String ID: 796878624-1661610138
                                  • Opcode ID: 39832066080d09919c6ac9abf4bb1cf61dda055288d01e11aaa78797bd51e3c5
                                  • Instruction ID: aa5e108ca9cac88707d7f0715f0d054355d82b2f9e75d5f65cbb532549e679ef
                                  • Opcode Fuzzy Hash: 39832066080d09919c6ac9abf4bb1cf61dda055288d01e11aaa78797bd51e3c5
                                  • Instruction Fuzzy Hash: 47413872C0012DFFCF21AFD898918EDFA79FF04754F25416AEA10761A0D3394E81AA90
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,006EAC27,00000001,00000000,00000000), ref: 006ED188
                                  • GetLastError.KERNEL32(?,?,?,006D54A3,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 006ED194
                                    • Part of subcall function 006ECDDD: WaitForSingleObject.KERNEL32(?,000493E0,00000000,?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3), ref: 006ECDEF
                                    • Part of subcall function 006ECDDD: GetLastError.KERNEL32(?,?,006ED204,00000000,?,?,006EC687,?,?,?,?,?,006D54A3,?,?,?), ref: 006ECDF9
                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,006EC687,?,?,?,?,?,006D54A3,?,?,?,?), ref: 006ED215
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 006ED1B8
                                  • Failed to create elevated cache thread., xrefs: 006ED1C2
                                  • Failed to pump messages in child process., xrefs: 006ED1EC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CloseCreateHandleObjectSingleThreadWait
                                  • String ID: Failed to create elevated cache thread.$Failed to pump messages in child process.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 3606931770-1134900366
                                  • Opcode ID: 0a08a02116e6351e5c0f96f9541b6d940a9fe09ff68bac2d9c8bd1216fa9dc31
                                  • Instruction ID: fc5b33d29ca47ecb9b543977278339097e978d36dd7139ff16336012af789590
                                  • Opcode Fuzzy Hash: 0a08a02116e6351e5c0f96f9541b6d940a9fe09ff68bac2d9c8bd1216fa9dc31
                                  • Instruction Fuzzy Hash: AF4107B6D01219AF8B41DFA9D8819DEBBF5BF0C710F11812AF908E7340E73499418FA4
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717D14
                                  • SysFreeString.OLEAUT32(?), ref: 00717D1F
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717D2A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeString$Heap$AllocateProcess
                                  • String ID: 6~q$`)u$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp
                                  • API String ID: 2724874077-996679331
                                  • Opcode ID: e46a49e66cdb6cf903d57a08555e3ae9501df90546955c4e66b4764cf53bb163
                                  • Instruction ID: 5deb9684562bfc8f836def73ed93219dd9a50d7453007da1024ac03a0140e475
                                  • Opcode Fuzzy Hash: e46a49e66cdb6cf903d57a08555e3ae9501df90546955c4e66b4764cf53bb163
                                  • Instruction Fuzzy Hash: 3731C432D0412ABBDB259F58C855BDEBB79AF40B20F114155FD00BB290D7789E84DBE0
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,00000000,00000000,?,?,?,006D5966,00000100,00000100,00000000,?,00000001,00000000,00000100), ref: 006D7349
                                  • LeaveCriticalSection.KERNEL32(00000000,00000000,00000100,00000000,?,?,?,006D5966,00000100,00000100,00000000,?,00000001,00000000,00000100), ref: 006D7428
                                  Strings
                                  • Failed to get value as string for variable: %ls, xrefs: 006D7417
                                  • Failed to get variable: %ls, xrefs: 006D738A
                                  • Failed to format value '%ls' of variable: %ls, xrefs: 006D73F2
                                  • Failed to get unformatted string., xrefs: 006D73B9
                                  • *****, xrefs: 006D73E4, 006D73F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: *****$Failed to format value '%ls' of variable: %ls$Failed to get unformatted string.$Failed to get value as string for variable: %ls$Failed to get variable: %ls
                                  • API String ID: 3168844106-2873099529
                                  • Opcode ID: b5c9799d51cacf04c701bc418e8e5ee914c6eccef370be304858c836a2c103e2
                                  • Instruction ID: 430a0ff3db01e7c1c099fe6187b6cb48a6aef809bdf128b45a0b045aebd35456
                                  • Opcode Fuzzy Hash: b5c9799d51cacf04c701bc418e8e5ee914c6eccef370be304858c836a2c103e2
                                  • Instruction Fuzzy Hash: 5B31CF32C44519FBDF235A94CC0AFEEBAA6AF10324F114156F804A6390E375DAA1DBC5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 0-537541572
                                  • Opcode ID: f9658eeabd799c804d2bca3fb544110e83a31d6deae600caa35d9f2e24f0f559
                                  • Instruction ID: 5b6567c81733dae4685f92028e6431183a192170506b260e4fc379c87d739730
                                  • Opcode Fuzzy Hash: f9658eeabd799c804d2bca3fb544110e83a31d6deae600caa35d9f2e24f0f559
                                  • Instruction Fuzzy Hash: F3210831A01216E7D7619A389C44A6B77DAAF11760F254310FD85E72D0DF78FD0086D2
                                  APIs
                                  • InitializeAcl.ADVAPI32(?,00000008,00000002,0000001A,?,?,00000000,00000000,?,?,?), ref: 006E8D21
                                  • GetLastError.KERNEL32 ref: 006E8D2B
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,00000001,20000004,00000000,00000000,?,00000000,00000003,000007D0,?,00000000,00000000,?,?), ref: 006E8D8B
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E8D4F
                                  • Failed to initialize ACL., xrefs: 006E8D59
                                  • Failed to allocate administrator SID., xrefs: 006E8D07
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileInitializeLast
                                  • String ID: Failed to allocate administrator SID.$Failed to initialize ACL.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 669721577-2446333966
                                  • Opcode ID: f850ef1ee43bf72a96e8360d66464d7c78792be88e14cf7d53b15f537322f942
                                  • Instruction ID: 459eb174658741b2b0352f83abc83e40748e537c899a475ebcf156c5b3e5db0f
                                  • Opcode Fuzzy Hash: f850ef1ee43bf72a96e8360d66464d7c78792be88e14cf7d53b15f537322f942
                                  • Instruction Fuzzy Hash: 7C21DD76E41324BFDB215BDA9C85FDEB77AAF50710F114029F908BB2C0EA749E019694
                                  APIs
                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?,00000000,crypt32.dll,?,?,006E3FAC,00000001,feclient.dll,?,00000000,?,?,?,006D4B57), ref: 006D429E
                                  • GetLastError.KERNEL32(?,?,006E3FAC,00000001,feclient.dll,?,00000000,?,?,?,006D4B57,?,?,0071B488,?,00000001), ref: 006D42AA
                                  • GetCurrentDirectoryW.KERNEL32(00000000,?,?,00000000,?,?,006E3FAC,00000001,feclient.dll,?,00000000,?,?,?,006D4B57,?), ref: 006D42E5
                                  • GetLastError.KERNEL32(?,?,006E3FAC,00000001,feclient.dll,?,00000000,?,?,?,006D4B57,?,?,0071B488,?,00000001), ref: 006D42EF
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\dirutil.cpp, xrefs: 006D4313
                                  • crypt32.dll, xrefs: 006D4267
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CurrentDirectoryErrorLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dirutil.cpp$crypt32.dll
                                  • API String ID: 152501406-585930255
                                  • Opcode ID: d68584ad2e8ecc4ad5894a9bc7e89db846cc966581d2f547f7cfc195db5f08ef
                                  • Instruction ID: 78942fd3e6b2ddcc5f5ebbedb4d2bafa554e22fbe260efd177d315d4b93475d2
                                  • Opcode Fuzzy Hash: d68584ad2e8ecc4ad5894a9bc7e89db846cc966581d2f547f7cfc195db5f08ef
                                  • Instruction Fuzzy Hash: 9B11D673E01636AB97214ADE4844A9FB6999F05754B13413BFD00FB340EF74DD008AE4
                                  APIs
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F09F9
                                  • Unexpected call to CabWrite()., xrefs: 006F098F
                                  • Failed to write during cabinet extraction., xrefs: 006F0A03
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite_memcpy_s
                                  • String ID: Failed to write during cabinet extraction.$Unexpected call to CabWrite().$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 1970631241-1882036103
                                  • Opcode ID: b0b3e12927a71d498163afe98e04c52a528217cb89ca6d6c2ab570bbc4a01a10
                                  • Instruction ID: ac05e1c381c0e4390ee751964ee4b9aa0c5c3ce6cffad212342ea402e8f7f194
                                  • Opcode Fuzzy Hash: b0b3e12927a71d498163afe98e04c52a528217cb89ca6d6c2ab570bbc4a01a10
                                  • Instruction Fuzzy Hash: E221D1B6600209ABEB00CF6CD985DAA77AAFF84724B114059FB04D7357E775D900CB64
                                  APIs
                                  • SysAllocString.OLEAUT32(0071B4E8), ref: 00713516
                                  • VariantInit.OLEAUT32(?), ref: 00713522
                                  • VariantClear.OLEAUT32(?), ref: 00713596
                                  • SysFreeString.OLEAUT32(00000000), ref: 007135A1
                                    • Part of subcall function 0071374E: SysAllocString.OLEAUT32(?), ref: 00713763
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$AllocVariant$ClearFreeInit
                                  • String ID: `)u$msasn1.dll
                                  • API String ID: 347726874-2799367386
                                  • Opcode ID: cd95cb4c05cc7191c5ebf1a8ca16c73b29115d32ecb971c52567e8ad97cc9d9f
                                  • Instruction ID: f3251b1f28c1938e3e11fabba7d49322b49cda856e461b77ae4f5dac5e4d3e8d
                                  • Opcode Fuzzy Hash: cd95cb4c05cc7191c5ebf1a8ca16c73b29115d32ecb971c52567e8ad97cc9d9f
                                  • Instruction Fuzzy Hash: 62217F71901219EFCB10DFA8C849EEEBBB9EF44B16F004158E801A72A0D734DF54CB90
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9AB8
                                  • GetFileAttributesW.KERNEL32(00000000,000002C0,?,00000000,00000000,000002C0,00000100,00000000,?,006DA889,00000100,000002C0,000002C0,00000100), ref: 006D9ACD
                                  • GetLastError.KERNEL32(?,006DA889,00000100,000002C0,000002C0,00000100), ref: 006D9ADA
                                  Strings
                                  • Failed to format variable string., xrefs: 006D9AC3
                                  • Failed while searching directory search: %ls, for path: %ls, xrefs: 006D9B1A
                                  • Failed to set variable., xrefs: 006D9B3F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesErrorFileLastOpen@16
                                  • String ID: Failed to format variable string.$Failed to set variable.$Failed while searching directory search: %ls, for path: %ls
                                  • API String ID: 1811509786-402580132
                                  • Opcode ID: 834241a07d76b72f8d14cd640405508c3b4979ff943dff2c5091e813148e83d0
                                  • Instruction ID: 98b79b880b2573d98773698582f8782ce315aea5d160e90240a580d3d8603c71
                                  • Opcode Fuzzy Hash: 834241a07d76b72f8d14cd640405508c3b4979ff943dff2c5091e813148e83d0
                                  • Instruction Fuzzy Hash: 6E113633E00021BBCB226668DC06FEFB667AF05320F224217FC01A63D0D7759E50AAE1
                                  APIs
                                  • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 006F0A90
                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006F0AA2
                                  • SetFileTime.KERNEL32(?,?,?,?), ref: 006F0AB5
                                  • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?,?,?,?,006F0685,?,?), ref: 006F0AC4
                                  Strings
                                  • Invalid operation for this state., xrefs: 006F0A69
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F0A5F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Time$File$CloseDateHandleLocal
                                  • String ID: Invalid operation for this state.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 609741386-1590348330
                                  • Opcode ID: 81933422f810ca69065a1e332db8304a41d753460f3204f2951905b785ee58ca
                                  • Instruction ID: bd864c2375e3bd3b6bfd325c11c36ff19d4a21eb884ec05b9d38358cf7c51392
                                  • Opcode Fuzzy Hash: 81933422f810ca69065a1e332db8304a41d753460f3204f2951905b785ee58ca
                                  • Instruction Fuzzy Hash: BF21817280061EBB9710DFAC89088FA7BAEFE04710754C216F511E66D2D778D951CB90
                                  APIs
                                  • GetLastError.KERNEL32 ref: 00718BA3
                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00718BCB
                                  • GetLastError.KERNEL32 ref: 00718BD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastTime$FileSystem
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\inetutil.cpp$feclient.dll$gq
                                  • API String ID: 1528435940-2721692173
                                  • Opcode ID: c3e624c1643137027bc64e566157d93c4dd086f2fc71490afa1cf36a5aeac2cf
                                  • Instruction ID: 81caf46c98340183c9e4ea451aae309cb6d86d7bf2ee477d4e4c21afb92a0f15
                                  • Opcode Fuzzy Hash: c3e624c1643137027bc64e566157d93c4dd086f2fc71490afa1cf36a5aeac2cf
                                  • Instruction Fuzzy Hash: 2A11B9B7E05139A7E7709BAD8D45BEFBBA8AF04750F014519EE01F7280EA389D0486E5
                                  APIs
                                    • Part of subcall function 007088B2: _free.LIBCMT ref: 007088D7
                                  • _free.LIBCMT ref: 00708938
                                    • Part of subcall function 00705F5F: HeapFree.KERNEL32(00000000,00000000,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?), ref: 00705F75
                                    • Part of subcall function 00705F5F: GetLastError.KERNEL32(?,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?,?), ref: 00705F87
                                  • _free.LIBCMT ref: 00708943
                                  • _free.LIBCMT ref: 0070894E
                                  • _free.LIBCMT ref: 007089A2
                                  • _free.LIBCMT ref: 007089AD
                                  • _free.LIBCMT ref: 007089B8
                                  • _free.LIBCMT ref: 007089C3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 168201354b2e5533fa0f7f046aa2c7ffc8fc0175796946e774c258da5b176dd2
                                  • Instruction ID: 6c46bfc879dcba4ad8a208c433133a4ea4f15bc782dc44a4dfb06992122a1d48
                                  • Opcode Fuzzy Hash: 168201354b2e5533fa0f7f046aa2c7ffc8fc0175796946e774c258da5b176dd2
                                  • Instruction Fuzzy Hash: A8112C71551B04EAE660BBB0CC0BFCB77DC5F40700F808E15B39E662E2DB6DB5455A51
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • _memcpy_s.LIBCMT ref: 006E461C
                                  • _memcpy_s.LIBCMT ref: 006E462F
                                  • _memcpy_s.LIBCMT ref: 006E464A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _memcpy_s$Heap$AllocateProcess
                                  • String ID: Failed to allocate memory for message.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$crypt32.dll
                                  • API String ID: 886498622-720575634
                                  • Opcode ID: 733d510fb016d657a28302c264319f0c3eda9b43273d71405e1eca8b904ecbc1
                                  • Instruction ID: dad85bbeb66c338ace190286f6a5ec290d6946f127235dcff39702193f07ac4c
                                  • Opcode Fuzzy Hash: 733d510fb016d657a28302c264319f0c3eda9b43273d71405e1eca8b904ecbc1
                                  • Instruction Fuzzy Hash: B41182B2941319ABDB01DEA4CC82CDB73ADAF15710B00451BFA14DB241DA74D65487E5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseErrorExecuteHandleLastShell
                                  • String ID: <$PDGu$c:\agent\_work\79\s\src\libs\dutil\shelutil.cpp
                                  • API String ID: 3023784893-2524152726
                                  • Opcode ID: 0bbbfe6826f29f837398f5099aa473f4de5d0d7971b6c6a4fdddf507535342c5
                                  • Instruction ID: 3b3d8b896285dfcfc8a299ee2ffdf547b1bf62ff24c4de67c9733f6f1705f0a7
                                  • Opcode Fuzzy Hash: 0bbbfe6826f29f837398f5099aa473f4de5d0d7971b6c6a4fdddf507535342c5
                                  • Instruction Fuzzy Hash: 9921A5B5E11229ABDB10CF99D944ADEBBF8AB08750F10805AF915F7340D7789A418B94
                                  APIs
                                  • WaitForSingleObject.KERNEL32(000000FF,?,00000000,?,006D4F5D,?,000000FF,?,?,?,?,?,00000000,?,?,?), ref: 00710D4A
                                  • GetLastError.KERNEL32(?,006D4F5D,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 00710D58
                                  • GetExitCodeProcess.KERNEL32(000000FF,?), ref: 00710D9D
                                  • GetLastError.KERNEL32(?,006D4F5D,?,000000FF,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 00710DA7
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\procutil.cpp, xrefs: 00710D7C
                                  • ]Om, xrefs: 00710DCD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeExitObjectProcessSingleWait
                                  • String ID: ]Om$c:\agent\_work\79\s\src\libs\dutil\procutil.cpp
                                  • API String ID: 590199018-3738807459
                                  • Opcode ID: a2eb40a7468822f1cb041bfc0bbdd7dd11121653d663de342fcea99f67e6b53f
                                  • Instruction ID: cb39a6f46840e7aae8387d98943bab9c539b7c69b344ab38d0c4d34563744a5b
                                  • Opcode Fuzzy Hash: a2eb40a7468822f1cb041bfc0bbdd7dd11121653d663de342fcea99f67e6b53f
                                  • Instruction Fuzzy Hash: 7501A136B00535A7C7205ADDAD08ADB7A55AF08770F028115FD94AB2D0E7BCECC09AD4
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,006D5EE0,00000000), ref: 00710DF0
                                  • GetProcAddress.KERNEL32(00000000), ref: 00710DF7
                                  • GetLastError.KERNEL32(?,?,?,006D5EE0,00000000), ref: 00710E0E
                                  Strings
                                  • kernel32, xrefs: 00710DE8
                                  • IsWow64Process, xrefs: 00710DE1
                                  • c:\agent\_work\79\s\src\libs\dutil\procutil.cpp, xrefs: 00710E2F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorHandleLastModuleProc
                                  • String ID: IsWow64Process$c:\agent\_work\79\s\src\libs\dutil\procutil.cpp$kernel32
                                  • API String ID: 4275029093-2315433296
                                  • Opcode ID: 92f411aa091047acee663a87e6b164bed412c19783d7626530a723ebdeb4df4a
                                  • Instruction ID: db6eac0dbb78637991fbfe8a1680e5a333042c75e64ac940e2b43f1c4f718e09
                                  • Opcode Fuzzy Hash: 92f411aa091047acee663a87e6b164bed412c19783d7626530a723ebdeb4df4a
                                  • Instruction Fuzzy Hash: A4F06D72A00235B7D7205BAADD059DF7A54DB05B50B018515BD05AB2C0E7BCDE84D6D4
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0070444A,?,?,00704412,00000000,80004004,?), ref: 0070446A
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0070447D
                                  • FreeLibrary.KERNEL32(00000000,?,?,0070444A,?,?,00704412,00000000,80004004,?), ref: 007044A0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$Xo$mscoree.dll
                                  • API String ID: 4061214504-3349585267
                                  • Opcode ID: d156e17b3c60746fa98aca33fb07dd1e55aaeeccd9de24d4c95c023834c003dd
                                  • Instruction ID: c0cc503c5796e3104b30df58d04520a3a712a945fd6cc630378125f310283135
                                  • Opcode Fuzzy Hash: d156e17b3c60746fa98aca33fb07dd1e55aaeeccd9de24d4c95c023834c003dd
                                  • Instruction Fuzzy Hash: ECF08271940318FBDB119B94DC09BDE7BA8EB00762F41C150FD09A21E0CB798E10EB94
                                  APIs
                                  • Sleep.KERNEL32(000007D0,00000000,00000000), ref: 006E8C04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: Failed to calculate cache path.$Failed to get %hs package cache root directory.$Failed to get old %hs package cache root directory.$per-machine$per-user
                                  • API String ID: 3472027048-398165853
                                  • Opcode ID: fec62723ab92e657ca726cefd22f2b7ddb8b2df8b76b8dc6095d27a2dbc10a10
                                  • Instruction ID: 5fdd5208e2ec27dce86e46f609357dcc64ec4e7ede3442756712a19bbe4b0da0
                                  • Opcode Fuzzy Hash: fec62723ab92e657ca726cefd22f2b7ddb8b2df8b76b8dc6095d27a2dbc10a10
                                  • Instruction Fuzzy Hash: 3B312472D027A4BFEB12A7A58D82FBF626E9B01F10F200025FD09F7351EA748E4056B5
                                  APIs
                                  • DefWindowProcW.USER32(?,00000082,?,?), ref: 006EE7FB
                                  • SetWindowLongW.USER32(?,000000EB,00000000), ref: 006EE80A
                                  • SetWindowLongW.USER32(?,000000EB,?), ref: 006EE81E
                                  • DefWindowProcW.USER32(?,?,?,?), ref: 006EE82E
                                  • GetWindowLongW.USER32(?,000000EB), ref: 006EE848
                                  • PostQuitMessage.USER32(00000000), ref: 006EE8A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Window$Long$Proc$MessagePostQuit
                                  • String ID:
                                  • API String ID: 3812958022-0
                                  • Opcode ID: cd0bfd2be9d5b661baf40dc05db85f8f71195560a2ad507e46c8672b9ad8066c
                                  • Instruction ID: 0012072dc91a5c3b53366e0312cfd110afbc28c5d3d64bf72c5a31239ec9577c
                                  • Opcode Fuzzy Hash: cd0bfd2be9d5b661baf40dc05db85f8f71195560a2ad507e46c8672b9ad8066c
                                  • Instruction Fuzzy Hash: 2B218E35105214BFDB155F68DC49EAA3B66EF49710F14C228F91A9A2B0D732DD20DB60
                                  APIs
                                    • Part of subcall function 0070C5B2: GetConsoleCP.KERNEL32(Y[p,00000000,00000000), ref: 0070C5FA
                                  • WriteFile.KERNEL32(?,00000000,00000000,Lp,00000000,?,00000000,00000000), ref: 0070CF70
                                  • GetLastError.KERNEL32 ref: 0070CF7A
                                  • __dosmaperr.LIBCMT ref: 0070CFBF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorFileLastWrite__dosmaperr
                                  • String ID: Y[p$Lp
                                  • API String ID: 251514795-1849395628
                                  • Opcode ID: df52c4f5409747b8fc32e03b73347e2cf94692876c10b2d92ffb7470626cab18
                                  • Instruction ID: 160f7cb70f3e13b209548d0696d040dbcc91cf853c04e3338e76395b6240d092
                                  • Opcode Fuzzy Hash: df52c4f5409747b8fc32e03b73347e2cf94692876c10b2d92ffb7470626cab18
                                  • Instruction Fuzzy Hash: 85518172A0020AEFDB129FA8CC49BEEBBF9EF05354F144751E500BB2D1D778AA418761
                                  APIs
                                  Strings
                                  • Unexpected elevated message sent to child process, msg: %u, xrefs: 006EC882
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 006EC876
                                  • Failed to save state., xrefs: 006EC74F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandleMutexRelease
                                  • String ID: Failed to save state.$Unexpected elevated message sent to child process, msg: %u$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 4207627910-2854340866
                                  • Opcode ID: 9b9eed3ae81c3b5da05e111ced593c8e2a4fe40d04916b1fbe1485e6fedec312
                                  • Instruction ID: 4a65806dc2418569505b350fc98ad72c247577560bdfb515c63f11f7d9a0cb47
                                  • Opcode Fuzzy Hash: 9b9eed3ae81c3b5da05e111ced593c8e2a4fe40d04916b1fbe1485e6fedec312
                                  • Instruction Fuzzy Hash: 1D61C67A111A54EFCB165F86CA01C56BFE3FF08720715C499FA995A632C732E922EF40
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717E91
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717E9C
                                  • SysFreeString.OLEAUT32(00000000), ref: 00717EA7
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp, xrefs: 00717D67
                                  • `)u, xrefs: 00717E86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeString$Heap$AllocateProcess
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp
                                  • API String ID: 2724874077-3437990411
                                  • Opcode ID: 65ec4553b8618a4a0b259f9752fd8e54cffd5499a73af4ce8308a0839e998a67
                                  • Instruction ID: 1ea13f92e54f3078a3e7d88a709153be7ad7c4826b178f458d0ef9c1965445a2
                                  • Opcode Fuzzy Hash: 65ec4553b8618a4a0b259f9752fd8e54cffd5499a73af4ce8308a0839e998a67
                                  • Instruction Fuzzy Hash: 6F519471A0422AEFDF25DB68C884EEEB7B8AF44750F114198E901AF290D774DE44DBE0
                                  APIs
                                  • CompareStringW.KERNEL32(00000000,00000001,?,000000FF,?,000000FF,00000000,00000100,00000000,?,?,?,006E7007,000000B8,0000001C,00000100), ref: 006F8FF6
                                  • CompareStringW.KERNEL32(00000000,00000001,?,000000FF,0071B4B8,000000FF,?,?,?,006E7007,000000B8,0000001C,00000100,00000100,00000100,000000B0), ref: 006F9080
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\detect.cpp, xrefs: 006F90E0
                                  • Failed to initialize update bundle., xrefs: 006F9123
                                  • BA aborted detect forward compatible bundle., xrefs: 006F90EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: BA aborted detect forward compatible bundle.$Failed to initialize update bundle.$c:\agent\_work\79\s\src\burn\engine\detect.cpp
                                  • API String ID: 1825529933-2802616466
                                  • Opcode ID: 02f9619d9e45bc8eed9cd69c2f7b0c41e95d35b40959997b16ba83ca9125c9e2
                                  • Instruction ID: 6d32a4ac25f4062aa0b051fadaf0cd6d7dfc1c39f696feac81a3d652c29f4a24
                                  • Opcode Fuzzy Hash: 02f9619d9e45bc8eed9cd69c2f7b0c41e95d35b40959997b16ba83ca9125c9e2
                                  • Instruction Fuzzy Hash: 2E51B070600219BBDF659F64CC85FAAB76BFF05310F104268FA149A3A5CB72D960DBA0
                                  APIs
                                  • RegQueryValueExW.ADVAPI32(00000000,000002C0,00000000,000002C0,00000000,00000000,000002C0,BundleUpgradeCode,00000410,000002C0,00000000,00000000,00000000,00000100,00000000), ref: 0071152E
                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,?,?,?,?,006E6FDC,00000100,000000B0,00000088,00000410,000002C0), ref: 00711565
                                  • lstrlenW.KERNEL32(?,?,?,00000000,?,-00000001,00000004,00000000), ref: 00711657
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 007115A8
                                  • BundleUpgradeCode, xrefs: 0071150D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: QueryValue$lstrlen
                                  • String ID: BundleUpgradeCode$c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 3790715954-4078672395
                                  • Opcode ID: 441cf973d690c19310182d5506416e5f989822003df96f2f541d2e62cbdeb2a5
                                  • Instruction ID: 10fb19db42dc14eb78d0bd082dd2c52d36c8938cb5d1dde40d6c55fd29623599
                                  • Opcode Fuzzy Hash: 441cf973d690c19310182d5506416e5f989822003df96f2f541d2e62cbdeb2a5
                                  • Instruction Fuzzy Hash: 2F41A431E0121AAFDB21CF99C8509EE77BAEF44710F594069FA01AF290DA39DE50DB94
                                  APIs
                                    • Part of subcall function 00714B80: SetFilePointerEx.KERNELBASE(?,?,?,?,?,00000000,?,?,?,006E8664,00000000,00000000,00000000,00000000,00000000), ref: 00714B98
                                    • Part of subcall function 00714B80: GetLastError.KERNEL32(?,?,?,006E8664,00000000,00000000,00000000,00000000,00000000), ref: 00714BA2
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00715E50,?,?,?,?,?,?,?,00010000,?), ref: 007165FF
                                  • WriteFile.KERNEL32(000000FF,00000008,00000008,?,00000000,000000FF,00000000,00000000,00000000,00000000,?,00715E50,?,?,?,?), ref: 00716651
                                  • GetLastError.KERNEL32(?,00715E50,?,?,?,?,?,?,?,00010000,?,00000001,?,GET,?,?), ref: 00716697
                                  • GetLastError.KERNEL32(?,00715E50,?,?,?,?,?,?,?,00010000,?,00000001,?,GET,?,?), ref: 007166BD
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp, xrefs: 007166E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$Write$Pointer
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp
                                  • API String ID: 133221148-1613074858
                                  • Opcode ID: 1ccd0955f54a7e493cb82ac0a743124cdfb2b4fa08072a7c4f0859b53c78bfa0
                                  • Instruction ID: 025544986a720576608fe6e3a6f55cbd97761be9eed9e5eb2bed61b8e80a885d
                                  • Opcode Fuzzy Hash: 1ccd0955f54a7e493cb82ac0a743124cdfb2b4fa08072a7c4f0859b53c78bfa0
                                  • Instruction Fuzzy Hash: 2741707290021AFFEB218E98CD45BEA7B69FF04764F154125FE00A61D0E779DDA0DBA0
                                  APIs
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00710319,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00710319,006F1099,?,00000000), ref: 006D2574
                                  • GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00710319,006F1099,?,00000000,0000FDE9,?,006F1099), ref: 006D2580
                                    • Part of subcall function 006D3C5F: GetProcessHeap.KERNEL32(00000000,000001C7,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C67
                                    • Part of subcall function 006D3C5F: HeapSize.KERNEL32(00000000,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C6E
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\strutil.cpp, xrefs: 006D25A4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$ByteCharErrorLastMultiProcessSizeWide
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\strutil.cpp
                                  • API String ID: 3662877508-2901571208
                                  • Opcode ID: 038b8bd08732a0b75d9bf664bbae4906eb87bf53652c52675e771ec32dc7c409
                                  • Instruction ID: 3de4f4adcac389594ba8d0f4c5bbbb56cf03d35b6c88eac73996a0a3dcdc9578
                                  • Opcode Fuzzy Hash: 038b8bd08732a0b75d9bf664bbae4906eb87bf53652c52675e771ec32dc7c409
                                  • Instruction Fuzzy Hash: AC311671A0035BAFE7109F259CF0EB6379BAB64768B10822BFD109B390EB71DC119760
                                  APIs
                                  • MoveFileExW.KERNEL32(00000003,00000001,00000000,00000000,00000101,?,007145B4,00000003,00000001,00000001,000007D0,00000003,00000000,?,006E9F4C,00000001), ref: 00714484
                                  • GetLastError.KERNEL32(00000002,?,007145B4,00000003,00000001,00000001,000007D0,00000003,00000000,?,006E9F4C,00000001,000007D0,00000001,00000001,00000003), ref: 00714493
                                  • MoveFileExW.KERNEL32(00000003,00000001,00000000,00000001,00000000,?,007145B4,00000003,00000001,00000001,000007D0,00000003,00000000,?,006E9F4C,00000001), ref: 0071452C
                                  • GetLastError.KERNEL32(?,007145B4,00000003,00000001,00000001,000007D0,00000003,00000000,?,006E9F4C,00000001,000007D0,00000001,00000001,00000003,000007D0), ref: 00714536
                                    • Part of subcall function 007146C4: FindFirstFileW.KERNEL32(006F8F8D,?,00000100,00000000,00000000), ref: 007146FF
                                    • Part of subcall function 007146C4: FindClose.KERNEL32(00000000), ref: 0071470B
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714555
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: File$ErrorFindLastMove$CloseFirst
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 3479031965-3405085980
                                  • Opcode ID: 783ea7e158708f93e38ebb2e6a53604cc1dee0c8e12461e7a6c52e006470b9e4
                                  • Instruction ID: 5b76e428ef73bf2f4cdd71e6fa16523bff1008b72f92597e1313a9589f731631
                                  • Opcode Fuzzy Hash: 783ea7e158708f93e38ebb2e6a53604cc1dee0c8e12461e7a6c52e006470b9e4
                                  • Instruction Fuzzy Hash: E731B536A40225A7DB214E5C9C40BFB7666BF40BA1F164136FD049B2D0D778CED192E4
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,?,000000FF,?,00000000,?,?,?,00000000,00000000,?,?,00000000), ref: 006FAAD2
                                  Strings
                                  • Failed to extract all payloads from container: %ls, xrefs: 006FAB16
                                  • Failed to skip the extraction of payload: %ls from container: %ls, xrefs: 006FAB67
                                  • Failed to extract payload: %ls from container: %ls, xrefs: 006FAB5B
                                  • Failed to open container: %ls., xrefs: 006FAAA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: Failed to extract all payloads from container: %ls$Failed to extract payload: %ls from container: %ls$Failed to open container: %ls.$Failed to skip the extraction of payload: %ls from container: %ls
                                  • API String ID: 1825529933-3891707333
                                  • Opcode ID: 6912901cafe12d55ad81734298c489fb63a78f47f7ba6932515f0cf160f43c07
                                  • Instruction ID: 108b385e71933aac4423394db96c122791f09b965007979f5280cf6b5f469ab2
                                  • Opcode Fuzzy Hash: 6912901cafe12d55ad81734298c489fb63a78f47f7ba6932515f0cf160f43c07
                                  • Instruction Fuzzy Hash: 8131C3B2C0012EFBCF129AD4CD46EEE77BAAF04720F100225FA15A6291E7749A55DB91
                                  APIs
                                    • Part of subcall function 007146C4: FindFirstFileW.KERNEL32(006F8F8D,?,00000100,00000000,00000000), ref: 007146FF
                                    • Part of subcall function 007146C4: FindClose.KERNEL32(00000000), ref: 0071470B
                                  • RegCloseKey.ADVAPI32(?,00000000,?,00000000,?,00000000,?,00000000,?,wininet.dll,?,crypt32.dll,?,?,?,00000000), ref: 007146B6
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                    • Part of subcall function 00711506: RegQueryValueExW.ADVAPI32(00000000,000002C0,00000000,000002C0,00000000,00000000,000002C0,BundleUpgradeCode,00000410,000002C0,00000000,00000000,00000000,00000100,00000000), ref: 0071152E
                                    • Part of subcall function 00711506: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,?,?,?,?,006E6FDC,00000100,000000B0,00000088,00000410,000002C0), ref: 00711565
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseFindQueryValue$FileFirstOpen
                                  • String ID: PendingFileRenameOperations$SYSTEM\CurrentControlSet\Control\Session Manager$\$crypt32.dll
                                  • API String ID: 3397690329-3978359083
                                  • Opcode ID: cd403ca3453984b3ac27c2da57768d38647cccea70bc52a7a207c52d7bb03690
                                  • Instruction ID: fb74241dfba77c80cac3b4ffd98799c257cebc06f992235cf7368ed91ed040d5
                                  • Opcode Fuzzy Hash: cd403ca3453984b3ac27c2da57768d38647cccea70bc52a7a207c52d7bb03690
                                  • Instruction Fuzzy Hash: F031C071A00219FEDF21AF98CC419EEB7B5FF11759F1481BAE504AA1D1E3799AC0CB10
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000001,000000FF,?,000000FF,00000001,PackageVersion,00000001,?,006E05E8,00000001,00000001,00000001,006E05E8,00000000), ref: 006DF02C
                                  • RegCloseKey.ADVAPI32(00000000,00000001,PackageVersion,00000001,?,006E05E8,00000001,00000001,00000001,006E05E8,00000000,00000001,00000000,?,006E05E8,00000001), ref: 006DF049
                                  Strings
                                  • PackageVersion, xrefs: 006DF00D
                                  • Failed to format key for update registration., xrefs: 006DEFE2
                                  • Failed to remove update registration key: %ls, xrefs: 006DF074
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCompareString
                                  • String ID: Failed to format key for update registration.$Failed to remove update registration key: %ls$PackageVersion
                                  • API String ID: 446873843-3222553582
                                  • Opcode ID: 5cbce19c9d1eccbff0551a950b27abaa9627b54ba501e6ef8ae016207c8990ea
                                  • Instruction ID: 718342228baeba178fcb6f5dc5a918c3cee756e22ebb0f630f8f760393f34af0
                                  • Opcode Fuzzy Hash: 5cbce19c9d1eccbff0551a950b27abaa9627b54ba501e6ef8ae016207c8990ea
                                  • Instruction Fuzzy Hash: EE21A731D00124FACB21ABA9CC09BEEBFB9EF14750F108276F911A7291E7749A41C690
                                  APIs
                                  • CopyFileW.KERNEL32(00000000,006D4DFD,00000000,?,?,00000000,?,007143B0,00000000,006D4DFD,00000000,00000000,?,006E84E4,?,?), ref: 007142AF
                                  • GetLastError.KERNEL32(?,007143B0,00000000,006D4DFD,00000000,00000000,?,006E84E4,?,?,00000001,00000003,000007D0,?,?,?), ref: 007142BD
                                  • CopyFileW.KERNEL32(00000000,006D4DFD,00000000,006D4DFD,00000000,?,007143B0,00000000,006D4DFD,00000000,00000000,?,006E84E4,?,?,00000001), ref: 0071432F
                                  • GetLastError.KERNEL32(?,007143B0,00000000,006D4DFD,00000000,00000000,?,006E84E4,?,?,00000001,00000003,000007D0,?,?,?), ref: 00714339
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714358
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CopyErrorFileLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 374144340-3405085980
                                  • Opcode ID: ebfa006dfa80607de85bfd491940eb5619de6c10bc02e8d5fad58d1742562c88
                                  • Instruction ID: 3676b4e57e397c5841145b7e2e1dd6312cc4f924195af743726571935ef9119c
                                  • Opcode Fuzzy Hash: ebfa006dfa80607de85bfd491940eb5619de6c10bc02e8d5fad58d1742562c88
                                  • Instruction Fuzzy Hash: 6D21D632B4027297AB211AAD4C40BFB6698BF5ABA1B114025FD50EB2D1D76CCCC192E4
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006DEF07
                                    • Part of subcall function 007143D6: SetFileAttributesW.KERNEL32(006F8F8D,00000080,00000000,006F8F8D,000000FF,00000000,?,?,006F8F8D), ref: 00714405
                                    • Part of subcall function 007143D6: GetLastError.KERNEL32(?,?,006F8F8D), ref: 0071440F
                                    • Part of subcall function 006D3CF7: RemoveDirectoryW.KERNEL32(00000001,00000000,00000000,00000000,?,?,006DEF52,00000001,00000000,00000095,00000001,006E05F7,00000095,00000000,swidtag,00000001), ref: 006D3D14
                                  Strings
                                  • swidtag, xrefs: 006DEF16
                                  • Failed to allocate regid file path., xrefs: 006DEF66
                                  • Failed to allocate regid folder path., xrefs: 006DEF6D
                                  • Failed to format tag folder path., xrefs: 006DEF74
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AttributesDirectoryErrorFileLastOpen@16Remove
                                  • String ID: Failed to allocate regid file path.$Failed to allocate regid folder path.$Failed to format tag folder path.$swidtag
                                  • API String ID: 1428973842-4170906717
                                  • Opcode ID: b442c7da0bb991499b9ca25c4c015b4d87f0e282131d886f1555d42f5cfce8bb
                                  • Instruction ID: a61468d1e9d9c52c770869e04fd6ea9e175b1222e17efdcb9a75b4e6c2a79db9
                                  • Opcode Fuzzy Hash: b442c7da0bb991499b9ca25c4c015b4d87f0e282131d886f1555d42f5cfce8bb
                                  • Instruction Fuzzy Hash: 35218B31D00228FBCB15EF99CC41A9DBBB6EF44710F1180AAF418AA361D7329E41DB80
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • CompareStringW.KERNEL32(00000000,00000001,00000000,000000FF,?,000000FF,00000000,00000000,00000000,-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00020019,00000000,00000100,00000100,000001B4), ref: 006F8B98
                                  • RegCloseKey.ADVAPI32(00000000,-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00020019,00000000,00000100,00000100,000001B4,?,?,?,006DF77F,00000001,00000100,000001B4,00000000), ref: 006F8BE6
                                  Strings
                                  • Failed to enumerate uninstall key for related bundles., xrefs: 006F8BF5
                                  • Failed to open uninstall registry key., xrefs: 006F8B5B
                                  • SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 006F8B35
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCompareOpenString
                                  • String ID: Failed to enumerate uninstall key for related bundles.$Failed to open uninstall registry key.$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                                  • API String ID: 2817536665-2531018330
                                  • Opcode ID: c5dedd7f1958f785a4efdfa32ded76f9bc1683fd021dad2ce8c83f90c9c02d56
                                  • Instruction ID: 5fdee1b952659ca1d3e14f93d519fb87bfcaebcd1a56dc92017659fee0cb3951
                                  • Opcode Fuzzy Hash: c5dedd7f1958f785a4efdfa32ded76f9bc1683fd021dad2ce8c83f90c9c02d56
                                  • Instruction Fuzzy Hash: 6D21B57690012CFFDF119A94CC49FEEBA7AEB01761F1442A4F610771A0DB794E909694
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006FCFEA
                                  • ReleaseMutex.KERNEL32(?), ref: 006FD018
                                  • SetEvent.KERNEL32(?), ref: 006FD021
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp, xrefs: 006FCF8F
                                  • Failed to allocate buffer., xrefs: 006FCF99
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateEventMutexObjectProcessReleaseSingleWait
                                  • String ID: Failed to allocate buffer.$c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp
                                  • API String ID: 944053411-523563896
                                  • Opcode ID: e88b429614e7e9d855002352353d10a5fffe33db3a8496a7c1042d75a76b8e98
                                  • Instruction ID: aa9880ec1c36eb1f45e15734b6c13ce8e2144d91d14c697c8dcd40e5a163f6c0
                                  • Opcode Fuzzy Hash: e88b429614e7e9d855002352353d10a5fffe33db3a8496a7c1042d75a76b8e98
                                  • Instruction Fuzzy Hash: FC21E5B160030ABFE7009F2CC845AA9FBF6FF48324F108569F955A7392C775A951CB50
                                  APIs
                                  • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,?,00000001,00000000,?,?,006F689E,00000000,?), ref: 00715B68
                                  • GetLastError.KERNEL32(?,?,006F689E,00000000,?,?,?,?,?,?,?,?,?,006F6CAE,?,?), ref: 00715B76
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?,?,00000001,?,?,006F689E,00000000,?), ref: 00715BB0
                                  • GetLastError.KERNEL32(?,?,006F689E,00000000,?,?,?,?,?,?,?,?,?,006F6CAE,?,?), ref: 00715BBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ConfigErrorHeapLastQueryService$AllocateProcess
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\svcutil.cpp
                                  • API String ID: 355237494-331149447
                                  • Opcode ID: bf1372857e97d42c865191564ed74d3bed7ef1d94a88546c55e5dd696c2b0719
                                  • Instruction ID: e2a5f2f9da6c9121e4369149ee019222fc23817ba44f51a90cfdabf89209183b
                                  • Opcode Fuzzy Hash: bf1372857e97d42c865191564ed74d3bed7ef1d94a88546c55e5dd696c2b0719
                                  • Instruction Fuzzy Hash: 5621F6BA904A36E7D7345E4D8D05BDB69699FC1B60F118015BD00AB280E76CCE40A3F5
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 007132DC
                                  • SysFreeString.OLEAUT32(?), ref: 007132F7
                                  • SysFreeString.OLEAUT32(?), ref: 00713306
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: t:q$t:q
                                  • API String ID: 3341692771-2585502148
                                  • Opcode ID: 4d23391ab5a9357d07e40fe39240ff2fbd38e84a81b621fbd45e3db07fffba40
                                  • Instruction ID: d986c8c4f13ff6a8fe8cc264dfcebef26b625cbbfe3940bccb27d8bd8b7750a0
                                  • Opcode Fuzzy Hash: 4d23391ab5a9357d07e40fe39240ff2fbd38e84a81b621fbd45e3db07fffba40
                                  • Instruction Fuzzy Hash: 4F216571A01118EF9B25DF9AC985CEEBBBCFF44704B20019EE504A7164E774EB40EB24
                                  APIs
                                  Strings
                                  • Failed to find variable., xrefs: 006D987A
                                  • Failed to read next symbol., xrefs: 006D98A9
                                  • Failed to parse condition '%ls' at position: %u, xrefs: 006D983F
                                  • c:\agent\_work\79\s\src\burn\engine\condition.cpp, xrefs: 006D982F, 006D9870
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _memcpy_s
                                  • String ID: Failed to find variable.$Failed to parse condition '%ls' at position: %u$Failed to read next symbol.$c:\agent\_work\79\s\src\burn\engine\condition.cpp
                                  • API String ID: 2001391462-2654771825
                                  • Opcode ID: 3e098ae277e1505d0ca8a13c82a981818d6e193642037cac1dc9a4d1e000ea29
                                  • Instruction ID: e7c0e254208548b878354478775836735779b33476796950d8e4c85568557184
                                  • Opcode Fuzzy Hash: 3e098ae277e1505d0ca8a13c82a981818d6e193642037cac1dc9a4d1e000ea29
                                  • Instruction Fuzzy Hash: C311EB73D402207AEB692D6C9C4ADD73A17EB16B11F000516FD046E3D2CA66DD50AAF5
                                  APIs
                                    • Part of subcall function 00716106: lstrlenW.KERNEL32(?), ref: 007161D3
                                    • Part of subcall function 00716106: lstrlenW.KERNEL32(00000000), ref: 007161EB
                                    • Part of subcall function 00718C13: GetLastError.KERNEL32(?,?,gq,00715F98,feclient.dll,clbcatq.dll,0071B518,0071B500,HEAD,00000000,0071B4E8,gq,00000000,?,?,00000000), ref: 00718C3D
                                  • GetSystemTimeAsFileTime.KERNEL32(0071B488,feclient.dll,0071B488,feclient.dll,clbcatq.dll,0071B518,0071B500,HEAD,00000000,0071B4E8,gq,00000000,?,?,00000000,00000000), ref: 00715FC8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Timelstrlen$ErrorFileLastSystem
                                  • String ID: HEAD$clbcatq.dll$feclient.dll$gq
                                  • API String ID: 451455982-2463469780
                                  • Opcode ID: 50a31818d64a0764bfc6703f4ca387cee0531017a4d82a33f9b9ebae8621bdbc
                                  • Instruction ID: d7eaa2e41592b385c961570e449df25a441ffaa0d3ec2670914c27275b6fbc64
                                  • Opcode Fuzzy Hash: 50a31818d64a0764bfc6703f4ca387cee0531017a4d82a33f9b9ebae8621bdbc
                                  • Instruction Fuzzy Hash: 082149B290021DEFDB119F98CD808EEBBB9FF88354F104169F804A3250D734DE51ABA0
                                  APIs
                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0071B500,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,006E531F), ref: 006E4A48
                                  Strings
                                  • Failed to write message type to pipe., xrefs: 006E4A8A
                                  • c:\agent\_work\79\s\src\burn\engine\pipe.cpp, xrefs: 006E4A80
                                  • Failed to allocate message to write., xrefs: 006E4A27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID: Failed to allocate message to write.$Failed to write message type to pipe.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 3934441357-1737657238
                                  • Opcode ID: 5fe35eb46224fb63693de7ed7a77f529fb44ddc3dba38d7a1e13b9f235c1b798
                                  • Instruction ID: 910e10c45023882d33d58180282123d285dcf1ea7b34388c0542f68f30e9b757
                                  • Opcode Fuzzy Hash: 5fe35eb46224fb63693de7ed7a77f529fb44ddc3dba38d7a1e13b9f235c1b798
                                  • Instruction Fuzzy Hash: FC11E772981269FBCB11DFAADD09EDF7E7AEF40360F114065F800B6254DB309E00DAA8
                                  APIs
                                  • _MREFOpen@16.MSPDB140-MSVCRT ref: 006D9DFC
                                  Strings
                                  • Failed to format path string., xrefs: 006D9E07
                                  • File search: %ls, did not find path: %ls, xrefs: 006D9E67
                                  • Failed get file version., xrefs: 006D9E3C
                                  • Failed to set variable., xrefs: 006D9E5B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Open@16
                                  • String ID: Failed get file version.$Failed to format path string.$Failed to set variable.$File search: %ls, did not find path: %ls
                                  • API String ID: 3613110473-2458530209
                                  • Opcode ID: f31c96e21bb6aabd0510226e61bad34d714a647aae3993c1d8efe910b7758f90
                                  • Instruction ID: 3ba2b82a9b159c1904a9551ba52918c636ff8c217a45d589e5c08895a00d9774
                                  • Opcode Fuzzy Hash: f31c96e21bb6aabd0510226e61bad34d714a647aae3993c1d8efe910b7758f90
                                  • Instruction Fuzzy Hash: 5A119072D00129FACF12AE98CD42CEEBB7AEF14750B104166F801A6351D6759E90ABE1
                                  APIs
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  • CreateWellKnownSid.ADVAPI32(00000000,00000000,00000000,00000000,00000044,00000001,00000000,00000000,?,?,006E8D01,0000001A,?,?,00000000,00000000), ref: 006E8152
                                  • GetLastError.KERNEL32(?,?,006E8D01,0000001A,?,?,00000000,00000000,?,?,?), ref: 006E815C
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 006E8130, 006E8180
                                  • Failed to allocate memory for well known SID., xrefs: 006E813A
                                  • Failed to create well known SID., xrefs: 006E818A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCreateErrorKnownLastProcessWell
                                  • String ID: Failed to allocate memory for well known SID.$Failed to create well known SID.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 2186923214-3348081855
                                  • Opcode ID: 253a4c0d24da13f13b2c3e79390155ca5d10e1ef27c18d1daeea57bae324bee4
                                  • Instruction ID: 0dbc7a80cf2e0aa7429c749ae1da39fbf48d86e85125617da47a2598594a0163
                                  • Opcode Fuzzy Hash: 253a4c0d24da13f13b2c3e79390155ca5d10e1ef27c18d1daeea57bae324bee4
                                  • Instruction Fuzzy Hash: 9D014C73642332BFE32066569D06EDF595E8F41B60B11401EFD08AF380EEA89E4285E4
                                  APIs
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000003E8,000004FF), ref: 006FDAA2
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 006FDACC
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,006FDC9A,00000000,?,?,?,00000000,00000000), ref: 006FDAD4
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp, xrefs: 006FDAF8
                                  • Failed while waiting for download., xrefs: 006FDB02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessageMultipleObjectsPeekWait
                                  • String ID: Failed while waiting for download.$c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp
                                  • API String ID: 435350009-4248891713
                                  • Opcode ID: 03614ed5510e1a6854cabcfd47ebb5ba343e3676f013143d71196ac4d3028667
                                  • Instruction ID: ae1f8bd4af1fe578042a5304761734ee3e4ba0eccdb1ec919c41804b98d8e2bd
                                  • Opcode Fuzzy Hash: 03614ed5510e1a6854cabcfd47ebb5ba343e3676f013143d71196ac4d3028667
                                  • Instruction Fuzzy Hash: 49012973A4523977D7205AAC8C49EEF7B5AEB04720F014025FB04E62C5D6A8A90081E9
                                  APIs
                                  • GetComputerNameW.KERNEL32(?,00000010), ref: 006D5F88
                                  • GetLastError.KERNEL32 ref: 006D5F92
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D5FB6
                                  • Failed to set variant value., xrefs: 006D5FD9
                                  • Failed to get computer name., xrefs: 006D5FC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ComputerErrorLastName
                                  • String ID: Failed to get computer name.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 3560734967-1556572959
                                  • Opcode ID: ba7b340ff89234a30652bf20fd3956be34056d237a6f188bc72673b83f5e8cab
                                  • Instruction ID: 55f5869ff75e911d3a331db8fb3b2af04a4ad9a8ed0bda67968be22e58b5a406
                                  • Opcode Fuzzy Hash: ba7b340ff89234a30652bf20fd3956be34056d237a6f188bc72673b83f5e8cab
                                  • Instruction Fuzzy Hash: 0C018672E41628A7D71197989905ADE77E9AB08710F114126F901FB380DA78AE444AE5
                                  APIs
                                  • GetTempPathW.KERNEL32(00000104,?), ref: 006D67FB
                                  • GetLastError.KERNEL32 ref: 006D6805
                                  Strings
                                  • Failed to get temp path., xrefs: 006D6833
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D6829
                                  • Failed to set variant value., xrefs: 006D684F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastPathTemp
                                  • String ID: Failed to get temp path.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 1238063741-3129921647
                                  • Opcode ID: b1792c58088f1063b0e1430d8e03c161282b32f6cf35a066d2e1aff76fcee239
                                  • Instruction ID: 2bc3aa10ddafdacf698b1a4ce2638f6be936b4f556a6d2b89a4bb8bf748580b0
                                  • Opcode Fuzzy Hash: b1792c58088f1063b0e1430d8e03c161282b32f6cf35a066d2e1aff76fcee239
                                  • Instruction Fuzzy Hash: 8801FE72E4133977D720A7589C06FEE77A95F04710F11416AFE04FB3C1EA68AD4446E9
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?), ref: 006D5ED4
                                    • Part of subcall function 00710DDC: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,006D5EE0,00000000), ref: 00710DF0
                                    • Part of subcall function 00710DDC: GetProcAddress.KERNEL32(00000000), ref: 00710DF7
                                    • Part of subcall function 00710DDC: GetLastError.KERNEL32(?,?,?,006D5EE0,00000000), ref: 00710E0E
                                    • Part of subcall function 00713FCA: SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00713FF7
                                  Strings
                                  • Failed to get shell folder., xrefs: 006D5F08
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 006D5EFE
                                  • Failed to get 64-bit folder., xrefs: 006D5F1E
                                  • Failed to set variant value., xrefs: 006D5F38
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressCurrentErrorFolderHandleLastModulePathProcProcess
                                  • String ID: Failed to get 64-bit folder.$Failed to get shell folder.$Failed to set variant value.$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 2084161155-3711669023
                                  • Opcode ID: 02570604fcca7447bf0e6ecb99e675b4012fbe92777fcc6cac0ce7b43f8ca5bc
                                  • Instruction ID: 98272a443df82ee298b1da17badb056c7e3237cfc5c8532d0c64e917b7427893
                                  • Opcode Fuzzy Hash: 02570604fcca7447bf0e6ecb99e675b4012fbe92777fcc6cac0ce7b43f8ca5bc
                                  • Instruction Fuzzy Hash: 4B01C871D54629F6DF22A794CC0AFDD3A7ADF00750F108056F801BA3C0DB789E809B95
                                  APIs
                                    • Part of subcall function 007146C4: FindFirstFileW.KERNEL32(006F8F8D,?,00000100,00000000,00000000), ref: 007146FF
                                    • Part of subcall function 007146C4: FindClose.KERNEL32(00000000), ref: 0071470B
                                  • SetFileAttributesW.KERNEL32(006F8F8D,00000080,00000000,006F8F8D,000000FF,00000000,?,?,006F8F8D), ref: 00714405
                                  • GetLastError.KERNEL32(?,?,006F8F8D), ref: 0071440F
                                  • DeleteFileW.KERNEL32(006F8F8D,00000000,006F8F8D,000000FF,00000000,?,?,006F8F8D), ref: 0071442F
                                  • GetLastError.KERNEL32(?,?,006F8F8D), ref: 00714439
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714454
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: File$ErrorFindLast$AttributesCloseDeleteFirst
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 3967264933-3405085980
                                  • Opcode ID: 85c03647aa0bcb3c2a199d898def9ce8b1cce0cb11a4a0b1c18c59bc565a4841
                                  • Instruction ID: 3473ff620ffebccfbcdc45c74feb3a7dd784db4205c0252b74dbff268e3b14d0
                                  • Opcode Fuzzy Hash: 85c03647aa0bcb3c2a199d898def9ce8b1cce0cb11a4a0b1c18c59bc565a4841
                                  • Instruction Fuzzy Hash: 7A01D232A0167AA7DB315BAD9D05FDB7EA8AF047A1F028220FD54EA2D1D328CD4095D4
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 006FD6F9
                                  • LeaveCriticalSection.KERNEL32(?), ref: 006FD73E
                                  • SetEvent.KERNEL32(?,?,?,?), ref: 006FD752
                                  Strings
                                  • Failure while sending progress during BITS job modification., xrefs: 006FD72D
                                  • Failed to get state during job modification., xrefs: 006FD712
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEventLeave
                                  • String ID: Failed to get state during job modification.$Failure while sending progress during BITS job modification.
                                  • API String ID: 3094578987-1258544340
                                  • Opcode ID: 2e2210c84c06619e95c34defcee54329c7cb54f4e920a90d6233d70c50fd0960
                                  • Instruction ID: 685f1f62955721b1635dae57e0bf688a8c54b987241054197154ea4b922c742b
                                  • Opcode Fuzzy Hash: 2e2210c84c06619e95c34defcee54329c7cb54f4e920a90d6233d70c50fd0960
                                  • Instruction Fuzzy Hash: 7E01D472A01629FBCB01EB59C89AEAEB7AEFF14725B008115F505DB280D778F904CBD4
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(00000008,00000000,00000000,?,006FDC24,?,?,?,?,?,00000000,00000000,?), ref: 006FD4E6
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,006FDC24,?,?,?,?,?,00000000,00000000,?), ref: 006FD4F1
                                  • GetLastError.KERNEL32(?,006FDC24,?,?,?,?,?,00000000,00000000,?), ref: 006FD4FE
                                  Strings
                                  • Failed to create BITS job complete event., xrefs: 006FD52C
                                  • c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp, xrefs: 006FD522
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateCriticalErrorEventInitializeLastSection
                                  • String ID: Failed to create BITS job complete event.$c:\agent\_work\79\s\src\burn\engine\bitsengine.cpp
                                  • API String ID: 3069647169-3888958423
                                  • Opcode ID: c57692b296d16f80e91473d72639659e70988e806c8f8a1f868e63ed8ae689fb
                                  • Instruction ID: 4d7843a8addccf30505f5ae8ba8d7c16c7c0976b68907a160fab6c49486f5055
                                  • Opcode Fuzzy Hash: c57692b296d16f80e91473d72639659e70988e806c8f8a1f868e63ed8ae689fb
                                  • Instruction Fuzzy Hash: 2F01D4B6601636BBD3109F5AD805A8ABFAAFF09720F018116FE08D7740D774E810CBE8
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000008,?,00000000,00000000,00000000,?,006FDAC2), ref: 006FD96A
                                  • LeaveCriticalSection.KERNEL32(00000008,?,006FDAC2), ref: 006FD9AF
                                  • SetEvent.KERNEL32(?,?,006FDAC2), ref: 006FD9C3
                                  Strings
                                  • Failed to get BITS job state., xrefs: 006FD983
                                  • Failure while sending progress., xrefs: 006FD99E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEventLeave
                                  • String ID: Failed to get BITS job state.$Failure while sending progress.
                                  • API String ID: 3094578987-2876445054
                                  • Opcode ID: ae4d2ac7ddbb2f36626cf85cfdddbf8d0103ecfde61a6925df02da0f989ed5c4
                                  • Instruction ID: ec03413c98490925374ab47c8d44f22203a37601f8bba31f680dbcc1135dce4b
                                  • Opcode Fuzzy Hash: ae4d2ac7ddbb2f36626cf85cfdddbf8d0103ecfde61a6925df02da0f989ed5c4
                                  • Instruction Fuzzy Hash: 2801D472A01629FFC712AB99C859EAEB7AAFF04721B004115F605D3690D7B4F904CBD9
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 00713CA0
                                  • SysFreeString.OLEAUT32(00000000), ref: 00713CD3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$AllocFree
                                  • String ID: BTm$`)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 344208780-3106803351
                                  • Opcode ID: 225a90b4ddcef7302b50963f356cc599ba46dd5fb498424e7a50b3028a0c630b
                                  • Instruction ID: 92afdba932c04ff229e21542e8956796638f246d27c0112b8feea18e8c41f36b
                                  • Opcode Fuzzy Hash: 225a90b4ddcef7302b50963f356cc599ba46dd5fb498424e7a50b3028a0c630b
                                  • Instruction Fuzzy Hash: 23016239A40226B7E7205E6D9C08EFA3699DF55B60F114429FC04AB3D0D7BCCE4456E5
                                  APIs
                                  • GetProcAddress.KERNEL32(SRSetRestorePointW,srclient.dll), ref: 00711F8E
                                  • GetLastError.KERNEL32(?,006D4A21,00000001,?,?,006D459E,?,?,?,?,006D54A3,?,?,?,?), ref: 00711F9D
                                  Strings
                                  • srclient.dll, xrefs: 00711F6C
                                  • SRSetRestorePointW, xrefs: 00711F83
                                  • c:\agent\_work\79\s\src\libs\dutil\srputil.cpp, xrefs: 00711FBE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorLastProc
                                  • String ID: SRSetRestorePointW$c:\agent\_work\79\s\src\libs\dutil\srputil.cpp$srclient.dll
                                  • API String ID: 199729137-3932515841
                                  • Opcode ID: cc500cae948b0bba82814eccfce136b08d8a233855d0d2c9d7c989b69a35ec23
                                  • Instruction ID: d4a727bc71038a920ae23def44296c4cd2b8509bab795e43c965c44f64156718
                                  • Opcode Fuzzy Hash: cc500cae948b0bba82814eccfce136b08d8a233855d0d2c9d7c989b69a35ec23
                                  • Instruction Fuzzy Hash: 4301D672E43676A3E732179D58097D629589B00761F428225FF00BE3D1E76CCC8596D9
                                  APIs
                                  Strings
                                  • gq, xrefs: 00716106
                                  • c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp, xrefs: 00716274
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp$gq
                                  • API String ID: 1659193697-2307428812
                                  • Opcode ID: d49b17667246f87d30474e66b0627c4508812c3fb76c786aeed971afefe5f8ac
                                  • Instruction ID: a01127e7c0fb92e4f3935aa29dde723387ac7119580f179e0af81db900eb8f75
                                  • Opcode Fuzzy Hash: d49b17667246f87d30474e66b0627c4508812c3fb76c786aeed971afefe5f8ac
                                  • Instruction Fuzzy Hash: 20517372900229BBDB219FE88C449EF7BB9AF48750F158114FE00A7290D738DD80ABA0
                                  APIs
                                  • _free.LIBCMT ref: 00704845
                                  • _free.LIBCMT ref: 00704865
                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007048C6
                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007048D8
                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007048E5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: __crt_fast_encode_pointer$_free
                                  • String ID:
                                  • API String ID: 366466260-0
                                  • Opcode ID: 57f3d6c164571e5cdc956557e43ed34fefb1a93909b2667a5726a71bda369834
                                  • Instruction ID: 8b32fcdf324c8064be422e26fddc86a895ce415463de17f23853930dcc2940cb
                                  • Opcode Fuzzy Hash: 57f3d6c164571e5cdc956557e43ed34fefb1a93909b2667a5726a71bda369834
                                  • Instruction Fuzzy Hash: E241E572A00214DFDB10DF68C881A59B7E6EF84710B1586A9E615EB3D1EB35AD01CB80
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(8007139F,00000000,?,?,00000000,00000000,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D22FB
                                  • GetLastError.KERNEL32(?,00000000,00000000,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D2307
                                    • Part of subcall function 006D3C5F: GetProcessHeap.KERNEL32(00000000,000001C7,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C67
                                    • Part of subcall function 006D3C5F: HeapSize.KERNEL32(00000000,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C6E
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\strutil.cpp, xrefs: 006D232B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$ByteCharErrorLastMultiProcessSizeWide
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\strutil.cpp
                                  • API String ID: 3662877508-2901571208
                                  • Opcode ID: 1b9b5996eb40c509aa3abfe5001081cf7da5a58ede7e1935c7cf955fbc16e1ec
                                  • Instruction ID: 567b774a418683f2c19fa4df5e44ac24a09b70f7473eec8f88c8532c7f8a22a9
                                  • Opcode Fuzzy Hash: 1b9b5996eb40c509aa3abfe5001081cf7da5a58ede7e1935c7cf955fbc16e1ec
                                  • Instruction Fuzzy Hash: 24312A32E00227EBC7208E65CCA4AAA3B97AF65764B134266FC10DB390E739CC01D7D0
                                  APIs
                                  • lstrlenW.KERNEL32(?,?,00000000,00000000,?,?,006D8BA7,006D96F4,?,006D96F4,?,?,006D96F4,?,?), ref: 006D8A08
                                  • lstrlenW.KERNEL32(?,?,00000000,00000000,?,?,006D8BA7,006D96F4,?,006D96F4,?,?,006D96F4,?,?), ref: 006D8A10
                                  • CompareStringW.KERNEL32(0000007F,?,?,?,?,00000000,?,00000000,00000000,?,?,006D8BA7,006D96F4,?,006D96F4,?), ref: 006D8A5F
                                  • CompareStringW.KERNEL32(0000007F,?,?,00000000,?,00000000,?,00000000,00000000,?,?,006D8BA7,006D96F4,?,006D96F4,?), ref: 006D8AC1
                                  • CompareStringW.KERNEL32(0000007F,?,?,00000000,?,00000000,?,00000000,00000000,?,?,006D8BA7,006D96F4,?,006D96F4,?), ref: 006D8AEE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString$lstrlen
                                  • String ID:
                                  • API String ID: 1657112622-0
                                  • Opcode ID: 10952c0d1c0fc1f799ff07b55bcbfc9cf63db0c80f0e93510f12eee53b4df5bb
                                  • Instruction ID: bcbbc1ac2feecf1574940b476591e133d8a1fda95434a7ac4189f1a67e690ed8
                                  • Opcode Fuzzy Hash: 10952c0d1c0fc1f799ff07b55bcbfc9cf63db0c80f0e93510f12eee53b4df5bb
                                  • Instruction Fuzzy Hash: DD313D72E00158BFCB258F58CC889EE3F6BEB49390F198417F9199B350CA759991DBA0
                                  APIs
                                  • EnterCriticalSection.KERNEL32(006D53FA,WixBundleOriginalSource,?,?,006EA51F,840F01E8,WixBundleOriginalSource,?,0073BB6C,?,00000000,006D5482,00000001,?,?,006D5482), ref: 006D74CA
                                  • LeaveCriticalSection.KERNEL32(006D53FA,006D53FA,00000000,00000000,?,?,006EA51F,840F01E8,WixBundleOriginalSource,?,0073BB6C,?,00000000,006D5482,00000001,?), ref: 006D7531
                                  Strings
                                  • Failed to get value as string for variable: %ls, xrefs: 006D7520
                                  • WixBundleOriginalSource, xrefs: 006D74C6
                                  • Failed to get value of variable: %ls, xrefs: 006D7504
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to get value as string for variable: %ls$Failed to get value of variable: %ls$WixBundleOriginalSource
                                  • API String ID: 3168844106-30613933
                                  • Opcode ID: 95da46dab2672d001db683966d8e4f9adf51919e6e51f46ae998001fcfeec69b
                                  • Instruction ID: a4cefed42aac9e701107ce6f56f0cb79843648b90283ab381e996a192dff89af
                                  • Opcode Fuzzy Hash: 95da46dab2672d001db683966d8e4f9adf51919e6e51f46ae998001fcfeec69b
                                  • Instruction Fuzzy Hash: 4101B176D44128FBCF225F58DC0AEDE7A66AF00324F118015FC04AA360E7399E6097D6
                                  APIs
                                  • CloseHandle.KERNEL32(?,00000000,?,00000000,?,006FCE46,00000000), ref: 006FCE69
                                  • CloseHandle.KERNEL32(00000000,00000000,?,00000000,?,006FCE46,00000000), ref: 006FCE75
                                  • CloseHandle.KERNEL32(0071B518,00000000,?,00000000,?,006FCE46,00000000), ref: 006FCE82
                                  • CloseHandle.KERNEL32(00000000,00000000,?,00000000,?,006FCE46,00000000), ref: 006FCE8F
                                  • UnmapViewOfFile.KERNEL32(0071B4E8,00000000,?,006FCE46,00000000), ref: 006FCE9E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseHandle$FileUnmapView
                                  • String ID:
                                  • API String ID: 260491571-0
                                  • Opcode ID: dee77ed27108b7a33aeab690f3637df7b88a60e76c32d8d0a6ac5049973a0551
                                  • Instruction ID: 8077ff43a2867e6f0595524b7034ead36cbe0f84b0509bd7661c0499ed0bdd90
                                  • Opcode Fuzzy Hash: dee77ed27108b7a33aeab690f3637df7b88a60e76c32d8d0a6ac5049973a0551
                                  • Instruction Fuzzy Hash: E601F632501B19DFCB306F66D9808ABF7EABF50725315C93EE2A652A20C371A850DF40
                                  APIs
                                  • _free.LIBCMT ref: 00708861
                                    • Part of subcall function 00705F5F: HeapFree.KERNEL32(00000000,00000000,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?), ref: 00705F75
                                    • Part of subcall function 00705F5F: GetLastError.KERNEL32(?,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?,?), ref: 00705F87
                                  • _free.LIBCMT ref: 00708873
                                  • _free.LIBCMT ref: 00708885
                                  • _free.LIBCMT ref: 00708897
                                  • _free.LIBCMT ref: 007088A9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 92f0717e06c8f9c76af39b74e6be3e7caa1f19de1012340d1be7df30677e33fd
                                  • Instruction ID: 29015fe6fe716493dd240939be892879d3b46441542a893b9c5e73db1ac2ef61
                                  • Opcode Fuzzy Hash: 92f0717e06c8f9c76af39b74e6be3e7caa1f19de1012340d1be7df30677e33fd
                                  • Instruction Fuzzy Hash: FEF09672514600EBD660EB54FC85C1773E9EA803107949A56F38DD76D1CF3CFC804A55
                                  APIs
                                  • SystemTimeToFileTime.KERNEL32(?,00000000,00000000,clbcatq.dll,00000000,clbcatq.dll,00000000,00000000,00000000), ref: 00718A36
                                  • GetLastError.KERNEL32 ref: 00718A40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Time$ErrorFileLastSystem
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\timeutil.cpp$clbcatq.dll
                                  • API String ID: 2781989572-3809602037
                                  • Opcode ID: 5504e1c3e35f1d4b31476908c9bbadd4f509cabe4925568e215f8d2717f938be
                                  • Instruction ID: 5d33c058d3bac8f769b643a9911fb63a05277f369345c1dba5dee1137447c49b
                                  • Opcode Fuzzy Hash: 5504e1c3e35f1d4b31476908c9bbadd4f509cabe4925568e215f8d2717f938be
                                  • Instruction Fuzzy Hash: E641C361F50206A7D7649BBC8D59AFFB669AF50700F14C21AF601B72C4DA3DDE8083A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: C:\Users\user\Desktop\jlK7Q70gbN.exe
                                  • API String ID: 0-2518045702
                                  • Opcode ID: 757a67f6576bf045b26193bd356e066e27e305dfcb751a5543bf4461df5a5086
                                  • Instruction ID: 1e7fc2f9a1ad12a5c02fa33188f568e6d6e0d2c990c1c248c61df5556469fde7
                                  • Opcode Fuzzy Hash: 757a67f6576bf045b26193bd356e066e27e305dfcb751a5543bf4461df5a5086
                                  • Instruction Fuzzy Hash: 9041AF71B00614EBDB21DF99DC859AFBBFCEB85310B104266F804E7291E7789B00CB60
                                  APIs
                                  • VariantInit.OLEAUT32(000002C0), ref: 00713998
                                  • SysAllocString.OLEAUT32(?), ref: 007139A8
                                  • VariantClear.OLEAUT32(?), ref: 00713A87
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 007139C0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Variant$AllocClearInitString
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 2213243845-812302861
                                  • Opcode ID: 0fc2d0d333c4620e455be8bd1fab1642df7ec26de1b66a281fbe47cc1f8e83dc
                                  • Instruction ID: b54aba5a17c4772816bc8d9ebef6aa1fbf0115e360da4baece95e07246e21db8
                                  • Opcode Fuzzy Hash: 0fc2d0d333c4620e455be8bd1fab1642df7ec26de1b66a281fbe47cc1f8e83dc
                                  • Instruction Fuzzy Hash: 7D418B75D00225ABCB109F68C889EDFBBB8AF05721F0581A5FC51EB291D778DE40CB90
                                  APIs
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00700903
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 007009BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable___except_validate_context_record
                                  • String ID: Xo$csm
                                  • API String ID: 3480331319-2364393460
                                  • Opcode ID: 1c447ceda0ea552e3a4abb51ed71d649c2372299b1f7861beabcc2163529c2cf
                                  • Instruction ID: 684809e1b37de12f39275a5cd0545da52cffaef722d44d0672407114cb76b6c6
                                  • Opcode Fuzzy Hash: 1c447ceda0ea552e3a4abb51ed71d649c2372299b1f7861beabcc2163529c2cf
                                  • Instruction Fuzzy Hash: 67418E34A10208DBDB10DF68C889B9FBBE5BF45334F148255E818AB3D2D739AA15CBD1
                                  APIs
                                  • RegEnumKeyExW.ADVAPI32(00000000,000002C0,00000410,00000002,00000000,00000000,00000000,00000000,00000410,00000002,00000100,00000000,00000000,?,?,006F8B79), ref: 007111B5
                                  • RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006F8B79,00000000), ref: 007111D3
                                  • RegEnumKeyExW.ADVAPI32(00000000,000002C0,00000410,00000002,00000000,00000000,00000000,00000000,00000410,00000003,?,?,006F8B79,00000000,00000000,00000000), ref: 00711229
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 007111F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Enum$InfoQuery
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 73471667-1128744096
                                  • Opcode ID: f0d19f0a5e7b598fc523bb1db73eeb3c2f1577d6d42cada98a56a694d37996a7
                                  • Instruction ID: bb20f3e7204ae427acaac8919681c9393c32b078cf1235aa9fa38312afd044e3
                                  • Opcode Fuzzy Hash: f0d19f0a5e7b598fc523bb1db73eeb3c2f1577d6d42cada98a56a694d37996a7
                                  • Instruction Fuzzy Hash: 8631A776E01129FBEB119AC88C44EEFB66DEF057A4F514066BF00FF190D3398E50A6A0
                                  APIs
                                    • Part of subcall function 0071904C: lstrlenW.KERNEL32(00000100,?,?,?,007193EC,000002C0,00000100,00000100,00000100,?,?,?,006F7AF5,?,?,000001BC), ref: 00719071
                                  • RegCloseKey.ADVAPI32(00000000,00000000,crypt32.dll,00000000,00000000,00000000,00000000,crypt32.dll), ref: 00719654
                                  • RegCloseKey.ADVAPI32(00000001,00000000,crypt32.dll,00000000,00000000,00000000,00000000,crypt32.dll), ref: 0071966E
                                    • Part of subcall function 00710EF7: RegCreateKeyExW.ADVAPI32(00000001,00000000,00000000,00000000,00000000,00000001,00000000,?,00000000,00000001,?,?,006E05AE,?,00000000,00020006), ref: 00710F1C
                                    • Part of subcall function 007117D9: RegSetValueExW.ADVAPI32(00020006,00720F38,00000000,00000001,?,00000000,?,000000FF,00000000,00000000,?,?,006DF2DC,00000000,?,00020006), ref: 0071180C
                                    • Part of subcall function 007117D9: RegDeleteValueW.ADVAPI32(00020006,00720F38,00000000,?,?,006DF2DC,00000000,?,00020006,?,00720F38,00020006,00000000,?,?,?), ref: 0071183C
                                    • Part of subcall function 0071178B: RegSetValueExW.ADVAPI32(?,00000005,00000000,00000004,?,00000004,00000001,?,006DF234,00720F38,Resume,00000005,?,00000000,00000000,00000000), ref: 007117A0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Value$Close$CreateDeletelstrlen
                                  • String ID: %ls\%ls$crypt32.dll
                                  • API String ID: 3924016894-1754266218
                                  • Opcode ID: 81796a39905de8daac2bc45a9bd9ffc67ead209bbd5d083d9f3f74feb781f14d
                                  • Instruction ID: a12a632766707ec81010ad0fda314bcf56e86dbd5ad9fd7969f2cc81f4ec06dc
                                  • Opcode Fuzzy Hash: 81796a39905de8daac2bc45a9bd9ffc67ead209bbd5d083d9f3f74feb781f14d
                                  • Instruction Fuzzy Hash: C5311D72C0016EFF8F229FD9CC918DEBBBAEB04350B454166EA0066160D3359E51ABA4
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000088,00000000,000002C0,00000410,00020019,00000000,000002C0,00000000,?,?,?,006F8BB5,00000000,00000000), ref: 006F8936
                                  Strings
                                  • Failed to open uninstall key for potential related bundle: %ls, xrefs: 006F88A5
                                  • Failed to ensure there is space for related bundles., xrefs: 006F88E9
                                  • Failed to initialize package from related bundle id: %ls, xrefs: 006F891C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: Failed to ensure there is space for related bundles.$Failed to initialize package from related bundle id: %ls$Failed to open uninstall key for potential related bundle: %ls
                                  • API String ID: 47109696-1717420724
                                  • Opcode ID: 407a99bc7817699c1fd60934cd9a7ab105f1633cfad4666bd117489f346c4cd5
                                  • Instruction ID: 9e04bbb27dfc51dc7f369da20e744a2a54f4193d80f6b68390556cd4a2d2799d
                                  • Opcode Fuzzy Hash: 407a99bc7817699c1fd60934cd9a7ab105f1633cfad4666bd117489f346c4cd5
                                  • Instruction Fuzzy Hash: 9921837290021EFFDF129E48DC06FFE7A7AEF04750F104095FA10A6190DB79AA60EB95
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,80004005,00000000,00000000,00000100,?,006D146A,00000000,80004005,00000000,80004005,00000000,000001C7,?,006D13B0), ref: 006D3BBF
                                  • HeapReAlloc.KERNEL32(00000000,?,006D146A,00000000,80004005,00000000,80004005,00000000,000001C7,?,006D13B0,000001C7,00000100,?,80004005,00000000), ref: 006D3BC6
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                    • Part of subcall function 006D3C5F: GetProcessHeap.KERNEL32(00000000,000001C7,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C67
                                    • Part of subcall function 006D3C5F: HeapSize.KERNEL32(00000000,?,006D22D5,000001C7,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D3C6E
                                  • _memcpy_s.LIBCMT ref: 006D3C12
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\memutil.cpp, xrefs: 006D3C53
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocAllocateSize_memcpy_s
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\memutil.cpp
                                  • API String ID: 3406509257-3949461043
                                  • Opcode ID: 931e408f60c8492a52e3f0b5306f78a03efd830e3ff627ccf95e1ba4463fb224
                                  • Instruction ID: 1d6e2237414e60fcdce72794262baa58c7e86c84a3c2068696e0111639f39c03
                                  • Opcode Fuzzy Hash: 931e408f60c8492a52e3f0b5306f78a03efd830e3ff627ccf95e1ba4463fb224
                                  • Instruction Fuzzy Hash: 7C115432E10179ABCB216F689D418EE3A0B9F40760B048217F804AB351C736CF109396
                                  APIs
                                  • lstrlenA.KERNEL32(006F1099,00000000,00000000,?,?,?,0071033D,006F1099,006F1099,?,00000000,0000FDE9,?,006F1099,8007139F,Invalid operation for this state.), ref: 00710A92
                                  • WriteFile.KERNEL32(FFFFFFFF,00000000,00000000,?,00000000,?,?,0071033D,006F1099,006F1099,?,00000000,0000FDE9,?,006F1099,8007139F), ref: 00710ACE
                                  • GetLastError.KERNEL32(?,?,0071033D,006F1099,006F1099,?,00000000,0000FDE9,?,006F1099,8007139F,Invalid operation for this state.,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7,8007139F), ref: 00710AD8
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\logutil.cpp, xrefs: 00710B09
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWritelstrlen
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\logutil.cpp
                                  • API String ID: 606256338-2833595300
                                  • Opcode ID: 1591bb96c457eb4d85356dbbc62d8dd3cc1b461601bed00643051e38800a48e3
                                  • Instruction ID: 287464386499044ee6e3daf7b359a709b8c4c000992e065a34113743768d24ef
                                  • Opcode Fuzzy Hash: 1591bb96c457eb4d85356dbbc62d8dd3cc1b461601bed00643051e38800a48e3
                                  • Instruction Fuzzy Hash: 58110AB2A01228B793308A6DDD44EDF7A6DAB44BA0B01C215FD01E72C1E7B8DDC082E0
                                  APIs
                                  • CommandLineToArgvW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000000,ignored ,00000000,?,00000000,?,?,?,006D527C,00000000,?), ref: 006D1244
                                  • GetLastError.KERNEL32(?,?,?,006D527C,00000000,?,?,00000003,00000000,00000000,?,?,?,?,?,?), ref: 006D124E
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\apputil.cpp, xrefs: 006D126F
                                  • ignored , xrefs: 006D1213
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ArgvCommandErrorLastLine
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\apputil.cpp$ignored
                                  • API String ID: 3459693003-3369145366
                                  • Opcode ID: a64169ed29b8e56899317a23beded7fe49ad5efe53c02f769f102b5fae340c78
                                  • Instruction ID: f1b2ab1e856d60a2dfce5b60b85b0c7407f30c2c62d684f1649de20a74146d45
                                  • Opcode Fuzzy Hash: a64169ed29b8e56899317a23beded7fe49ad5efe53c02f769f102b5fae340c78
                                  • Instruction Fuzzy Hash: BD119D76D00129BB8B21DB98D805DDEBBAAAF45B50B01405AF800EB340E7B19F40CAA0
                                  APIs
                                  • FormatMessageW.KERNEL32(00000900,?,?,00000000,00000000,00000000,?,00000000,?,?,00710812,?,?,?,?,00000001), ref: 0071016E
                                  • GetLastError.KERNEL32(?,00710812,?,?,?,?,00000001,?,006D5651,?,?,00000000,?,?,006D53D2,00000002), ref: 0071017A
                                  • LocalFree.KERNEL32(00000000,?,?,00000000,?,?,00710812,?,?,?,?,00000001,?,006D5651,?,?), ref: 007101E3
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\logutil.cpp, xrefs: 00710199
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFormatFreeLastLocalMessage
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\logutil.cpp
                                  • API String ID: 1365068426-2833595300
                                  • Opcode ID: a0bf34c1bff2bb976051f704e1041236d8c47d058025b38735d51dc1214d70eb
                                  • Instruction ID: 1bfdd7a395ac48ad6abc4f1ecc53f05f70dcc0cea1904be72b5d841229df4da3
                                  • Opcode Fuzzy Hash: a0bf34c1bff2bb976051f704e1041236d8c47d058025b38735d51dc1214d70eb
                                  • Instruction Fuzzy Hash: C4118C32601129FBDB219F998E45EEF7A69EF54720F018019FD01A61A0D7B89ED0E6E0
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000000,759230D0,?,?,006FD0E4,00000000,00000000,00000000,00000000), ref: 006FCEBF
                                  • ReleaseMutex.KERNEL32(?,?,006FD0E4,00000000,00000000,00000000,00000000), ref: 006FCF46
                                    • Part of subcall function 006D39DF: GetProcessHeap.KERNEL32(?,000001C7,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F0
                                    • Part of subcall function 006D39DF: RtlAllocateHeap.NTDLL(00000000,?,006D237C,?,00000001,80004005,8007139F,?,?,0071058B,8007139F,?,00000000,00000000,8007139F), ref: 006D39F7
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp, xrefs: 006FCF04
                                  • Failed to allocate memory for message data, xrefs: 006FCF0E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateMutexObjectProcessReleaseSingleWait
                                  • String ID: Failed to allocate memory for message data$c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp
                                  • API String ID: 2993511968-1329786970
                                  • Opcode ID: 127f19faa16769bf8c85fc2fdd35b849ff7db9120592c29fc85baff1266227fd
                                  • Instruction ID: eb61d6b72b59f37be5c386b02dfe44f734f2e22c8563864a68d50cad868c8700
                                  • Opcode Fuzzy Hash: 127f19faa16769bf8c85fc2fdd35b849ff7db9120592c29fc85baff1266227fd
                                  • Instruction Fuzzy Hash: F81191B1300219EFD7159F28D895EAABBB6FF49720F104169F9149B3A1C775AC10CB98
                                  APIs
                                  • CreateFileW.KERNEL32(002E0032,40000000,00000001,00000000,00000002,00000080,00000000,006E0455,00000000,?,006DF499,0071B500,00000080,002E0032,00000000), ref: 00715033
                                  • GetLastError.KERNEL32(?,006DF499,0071B500,00000080,002E0032,00000000,?,006E0455,crypt32.dll,00000094,?,?,?,?,?,00000000), ref: 00715040
                                  • CloseHandle.KERNEL32(00000000,00000000,0071B500,006DF499,?,006DF499,0071B500,00000080,002E0032,00000000,?,006E0455,crypt32.dll,00000094), ref: 00715094
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00715064
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 2528220319-3405085980
                                  • Opcode ID: 15b02fd6f015df3fd653360816e1b6eadc5304e142957f2e4300b1d4b1bb143b
                                  • Instruction ID: 94b04253af6dad4e000e341565ca25e5246515958d45c60d0f23e153cf498a75
                                  • Opcode Fuzzy Hash: 15b02fd6f015df3fd653360816e1b6eadc5304e142957f2e4300b1d4b1bb143b
                                  • Instruction Fuzzy Hash: 5B01D833641A25ABD7354ABD4C05FDE3A15AB88B70F014211FE256B1D0D7798C40A6E4
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000000,00000001,00000000,?,?,00020006,00000000,00000001,00000000), ref: 006E0723
                                  Strings
                                  • Failed to open registration key., xrefs: 006E06DA
                                  • Failed to update resume mode., xrefs: 006E06F4
                                  • Failed to update name and publisher., xrefs: 006E070D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: Failed to open registration key.$Failed to update name and publisher.$Failed to update resume mode.
                                  • API String ID: 47109696-1865096027
                                  • Opcode ID: 3ded7cb1e11b4f37b5516fb223c97c6213aca0a075dfbe909ada2cda2ca70327
                                  • Instruction ID: ea40dde6d45f5dff8dcee067b3e113213e093c246211fb0d18674c024419b976
                                  • Opcode Fuzzy Hash: 3ded7cb1e11b4f37b5516fb223c97c6213aca0a075dfbe909ada2cda2ca70327
                                  • Instruction Fuzzy Hash: 8501B132A41368F7EF125A95DC42FDEB77AAB20B50F104015F500B6291D7B4AE91AB84
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,00000080,00000001,00000000,00000003,00000080,00000000,000002C0,00000000,?,006F89D6,00000000,00000088,000002C0,BundleCachePath,00000000), ref: 00714C1F
                                  • GetLastError.KERNEL32(?,006F89D6,00000000,00000088,000002C0,BundleCachePath,00000000,000002C0,BundleVersion,000000B8,000002C0,EngineVersion,000002C0,000000B0), ref: 00714C2C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateErrorFileLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 1214770103-3405085980
                                  • Opcode ID: 3b2e2a5175650329249af2bdf610f574a55677e3f9b7b51b4b067e0a9241f86d
                                  • Instruction ID: bc68ac73752028990f0a14ade93df221d9fdf2c7e3e11fd3fa401db39b18532e
                                  • Opcode Fuzzy Hash: 3b2e2a5175650329249af2bdf610f574a55677e3f9b7b51b4b067e0a9241f86d
                                  • Instruction Fuzzy Hash: 5B01D673642235B7E7311A9C5D0AFEE26199B44B70F01C125FE54BF2D0D6AC4D40A2F9
                                  APIs
                                  • ControlService.ADVAPI32(006F688A,00000001,?,00000001,00000000,?,?,?,?,?,?,006F688A,00000000), ref: 006F699E
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,006F688A,00000000), ref: 006F69A8
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\msuengine.cpp, xrefs: 006F69CC
                                  • Failed to stop wusa service., xrefs: 006F69D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ControlErrorLastService
                                  • String ID: Failed to stop wusa service.$c:\agent\_work\79\s\src\burn\engine\msuengine.cpp
                                  • API String ID: 4114567744-864945257
                                  • Opcode ID: 1161a31003362ee7f0b296385afeddfbab57deb012c33b9cb797f9527afb6729
                                  • Instruction ID: 381b59ee6298f373184284859c5e3e977c10ac090696ff3f9efa8952e30d49b9
                                  • Opcode Fuzzy Hash: 1161a31003362ee7f0b296385afeddfbab57deb012c33b9cb797f9527afb6729
                                  • Instruction Fuzzy Hash: 3901A773A4023967D72097699D46AEF76A5AB08B10F114129FE15BB280DA789D0445E8
                                  APIs
                                  • SysAllocString.OLEAUT32(0071B594), ref: 00713C1A
                                  • SysFreeString.OLEAUT32(00000000), ref: 00713C4D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$AllocFree
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 344208780-2301883107
                                  • Opcode ID: d77660bac03425815d62b5815b85bbc71999be2bc9420e536aed904f259fdf20
                                  • Instruction ID: dd95202dbde6a6e60e39e990464a302934501ee65035e8db6028162e01958e9b
                                  • Opcode Fuzzy Hash: d77660bac03425815d62b5815b85bbc71999be2bc9420e536aed904f259fdf20
                                  • Instruction Fuzzy Hash: 20018F75644266A7EB201A5D8C04EFA76999F41B60F00803AFD00BB3C0C67CCE9456A5
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 00716B42
                                    • Part of subcall function 00718929: SystemTimeToFileTime.KERNEL32(?,00000000,00000000,clbcatq.dll,00000000,clbcatq.dll,00000000,00000000,00000000), ref: 00718A36
                                    • Part of subcall function 00718929: GetLastError.KERNEL32 ref: 00718A40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Time$ErrorFileFreeLastStringSystem
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp$clbcatq.dll
                                  • API String ID: 211557998-3562644932
                                  • Opcode ID: c54b0f57ab918dc2e65bf2de7d1d9d79af5a7ddf619ef659bb57174db1780f17
                                  • Instruction ID: 108e9f84553abaed2a1243c1fcd98b3ab7a58804839d2b6fac8a3c4e52736a83
                                  • Opcode Fuzzy Hash: c54b0f57ab918dc2e65bf2de7d1d9d79af5a7ddf619ef659bb57174db1780f17
                                  • Instruction Fuzzy Hash: 630162F2905116FB8B305F8998418DAFAA9EB14764B71817AE905A7190C3789E50D790
                                  APIs
                                  • PostThreadMessageW.USER32(?,00009002,00000000,?), ref: 006EEB60
                                  • GetLastError.KERNEL32 ref: 006EEB6A
                                  Strings
                                  • Failed to post elevate message., xrefs: 006EEB98
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EEB8E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessagePostThread
                                  • String ID: Failed to post elevate message.$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 2609174426-737417110
                                  • Opcode ID: 842cb0f400d587a087357c36e5374ef18e73345c5e99f713621e8d3bbae05d98
                                  • Instruction ID: 4da50e241077844e48dafd39e100ff9d8b53a09ad0b3d0e1550f086059b1c7f8
                                  • Opcode Fuzzy Hash: 842cb0f400d587a087357c36e5374ef18e73345c5e99f713621e8d3bbae05d98
                                  • Instruction Fuzzy Hash: 8FF0F633642371ABD72056999D09DD77796AB00B30F118229FE19BF2C0D72A9C0287D9
                                  APIs
                                  • GetProcAddress.KERNEL32(?,BootstrapperApplicationDestroy), ref: 006DD8AB
                                  • FreeLibrary.KERNEL32(?,?,006D4920,00000000,?,?,006D54CB,?,?), ref: 006DD8BA
                                  • GetLastError.KERNEL32(?,006D4920,00000000,?,?,006D54CB,?,?), ref: 006DD8C4
                                  Strings
                                  • BootstrapperApplicationDestroy, xrefs: 006DD8A3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressErrorFreeLastLibraryProc
                                  • String ID: BootstrapperApplicationDestroy
                                  • API String ID: 1144718084-3186005537
                                  • Opcode ID: b05791f4b78a9cda4718842dd0596ecac4803f32f5db8db42831dde333b2dd2a
                                  • Instruction ID: 1b7691f25b8c473c02a39e0380d0cd34fc8f823cc86231e429e6abfb1ae09022
                                  • Opcode Fuzzy Hash: b05791f4b78a9cda4718842dd0596ecac4803f32f5db8db42831dde333b2dd2a
                                  • Instruction Fuzzy Hash: 68F06832A00725ABC3116BA9DC04E56F7A5BF54762705C22BE815D6651C724EC50ABD4
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 007134BE
                                  • SysFreeString.OLEAUT32(00000000), ref: 007134EE
                                  Strings
                                  • `)u, xrefs: 007134EE
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 007134D2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$AllocFree
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 344208780-2301883107
                                  • Opcode ID: 7cefb188d2fea481aad694aa26b87067f79d2c1a7b61c336946056c8e6264d94
                                  • Instruction ID: b27f2840ade5e8faebb8559583cf42f0f01db435d71ee3eef8cf9aea10d75443
                                  • Opcode Fuzzy Hash: 7cefb188d2fea481aad694aa26b87067f79d2c1a7b61c336946056c8e6264d94
                                  • Instruction Fuzzy Hash: AFF0B4391415A5E7C7321F4C9C09FFB77A9EB40B60F188029FC186B390C7798E9096D4
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 00713763
                                  • SysFreeString.OLEAUT32(00000000), ref: 00713793
                                  Strings
                                  • `)u, xrefs: 00713793
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 0071377A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$AllocFree
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 344208780-2301883107
                                  • Opcode ID: 2935de0485f625d72ab323db96712946dd3199137876d0a70e73d3d462d717c8
                                  • Instruction ID: 114bddfe9568de5dfea403a11dac78d391e31e78fb085b328f6c8703473a4901
                                  • Opcode Fuzzy Hash: 2935de0485f625d72ab323db96712946dd3199137876d0a70e73d3d462d717c8
                                  • Instruction Fuzzy Hash: DEF0B4B9141225A7D7211E599C48EDA7769EB41B70F148119FC185B2D0C778CE5097D4
                                  APIs
                                  • PostThreadMessageW.USER32(?,00009001,00000000,?), ref: 006EF157
                                  • GetLastError.KERNEL32 ref: 006EF161
                                  Strings
                                  • Failed to post plan message., xrefs: 006EF18F
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EF185
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessagePostThread
                                  • String ID: Failed to post plan message.$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 2609174426-33280340
                                  • Opcode ID: e2f30f735845bca6c7c66831c80326ad7c42c855f78d8d434ab6fdf367d9214e
                                  • Instruction ID: 7f7c646c5aaab47253a2a48635a71f7b5212de7593830b8a876d17734c485eb6
                                  • Opcode Fuzzy Hash: e2f30f735845bca6c7c66831c80326ad7c42c855f78d8d434ab6fdf367d9214e
                                  • Instruction Fuzzy Hash: 08F0A733741335BBD231279A9C09DCB7E95EF06BB0B024025FD08AA2D1D6199C0086E5
                                  APIs
                                  • PostThreadMessageW.USER32(?,00009005,?,00000000), ref: 006EF265
                                  • GetLastError.KERNEL32 ref: 006EF26F
                                  Strings
                                  • Failed to post shutdown message., xrefs: 006EF29D
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EF293
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessagePostThread
                                  • String ID: Failed to post shutdown message.$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 2609174426-3784301040
                                  • Opcode ID: 2cd3fa5664dd353711ce21abeee7135d2758af828e00ba5ff890f400ddd6322b
                                  • Instruction ID: 97a603b648ad44753cc10e5d98d1bc5886a9d3a896af0e9a7efcbb62e72b8527
                                  • Opcode Fuzzy Hash: 2cd3fa5664dd353711ce21abeee7135d2758af828e00ba5ff890f400ddd6322b
                                  • Instruction Fuzzy Hash: 16F0A737A42335BB92211ADA6C09ECB7A95AF05B60B024025FE08AA280E6189D0086E5
                                  APIs
                                  • SetEvent.KERNEL32(0071B478,00000000,?,006F14DE,?,00000000,BTm,006DC24A,?,BTm,?,006E74AB,?,?,006D5442,?), ref: 006F0593
                                  • GetLastError.KERNEL32(?,006F14DE,?,00000000,BTm,006DC24A,?,BTm,?,006E74AB,?,?,006D5442,?,006D5482,00000001), ref: 006F059D
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 006F05C1
                                  • Failed to set begin operation event., xrefs: 006F05CB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorEventLast
                                  • String ID: Failed to set begin operation event.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 3848097054-176682265
                                  • Opcode ID: fbf31bb23756833e5743c58070c02eb2dfeabc6ad9aa7dd726658571a921190d
                                  • Instruction ID: 86b951c3dbf8dfd93c29fcfe8b4dd7ac5741a0cce1a162932f0555ee7349b369
                                  • Opcode Fuzzy Hash: fbf31bb23756833e5743c58070c02eb2dfeabc6ad9aa7dd726658571a921190d
                                  • Instruction Fuzzy Hash: 8FF0EC73E4163967632112995D06ADF769A9F04B617024029FF05FB382E69CAD014AD9
                                  APIs
                                  • PostThreadMessageW.USER32(?,00009003,00000000,?), ref: 006EEA53
                                  • GetLastError.KERNEL32 ref: 006EEA5D
                                  Strings
                                  • Failed to post apply message., xrefs: 006EEA8B
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EEA81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessagePostThread
                                  • String ID: Failed to post apply message.$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 2609174426-2978962975
                                  • Opcode ID: afb12192ee9c2d671d067210e31cfff6011acbe783fa8eb072be51b0fedd994b
                                  • Instruction ID: 5bd045a5c69d656363ae7adc3ff13f843b46d6f3d7e758ceef2ac4ae3b70c7a7
                                  • Opcode Fuzzy Hash: afb12192ee9c2d671d067210e31cfff6011acbe783fa8eb072be51b0fedd994b
                                  • Instruction Fuzzy Hash: DFF0A733642335BB9631569E6C09DCB7F95BF05BA0B024129FD08AA2D1E61A9D0086E5
                                  APIs
                                  • PostThreadMessageW.USER32(?,00009000,00000000,?), ref: 006EEAE4
                                  • GetLastError.KERNEL32 ref: 006EEAEE
                                  Strings
                                  • Failed to post detect message., xrefs: 006EEB1C
                                  • c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp, xrefs: 006EEB12
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessagePostThread
                                  • String ID: Failed to post detect message.$c:\agent\_work\79\s\src\burn\engine\engineforapplication.cpp
                                  • API String ID: 2609174426-1769289380
                                  • Opcode ID: fae12d112bc4a3560abaf6f7f496299a9429c0ab5706eaea5509aee7d7267f5c
                                  • Instruction ID: e4fa043b1d2d252efcd30846189ae2afc1fef022e10c8ad62ee156449835932f
                                  • Opcode Fuzzy Hash: fae12d112bc4a3560abaf6f7f496299a9429c0ab5706eaea5509aee7d7267f5c
                                  • Instruction Fuzzy Hash: 8AF0A733A42331B79230169A5D0DEC77F95EF04B60F024015FD08AB290E629AC00C5E9
                                  APIs
                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,007071E1), ref: 007091F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CountCriticalInitializeSectionSpin
                                  • String ID: InitializeCriticalSectionEx$Xo$qp
                                  • API String ID: 2593887523-1069613082
                                  • Opcode ID: 9904fad6b024464cfcc33ed7572e80553c8c110e431be2990ab2abfa8c83a915
                                  • Instruction ID: 8521b8e358e182b86d121d70f5623921dbd08d0496f430bd4cec6b8fa1777c1d
                                  • Opcode Fuzzy Hash: 9904fad6b024464cfcc33ed7572e80553c8c110e431be2990ab2abfa8c83a915
                                  • Instruction Fuzzy Hash: 64E0123164022DF7DB212F95DC09DDF7F56EB44B60F40C110FE18651A3DB7A8961AAD4
                                  APIs
                                  • try_get_function.LIBVCRUNTIME ref: 00700F41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: try_get_function
                                  • String ID: $pBp$FlsAlloc$Xo
                                  • API String ID: 2742660187-2837434512
                                  • Opcode ID: e332d005e3733c72d54e52c2d6abd1df301bec3cfd59151bdd9006fc94f17451
                                  • Instruction ID: 337f66f7e6351cbfc6ef2c91071f330762d147a6a2a0d98ed03ea212dfaf8e3a
                                  • Opcode Fuzzy Hash: e332d005e3733c72d54e52c2d6abd1df301bec3cfd59151bdd9006fc94f17451
                                  • Instruction Fuzzy Hash: 95D01231785378A7D5103694AC06BD97B44D700FB2F848571FA0C652D3DAAD591056C5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 373c3dc5cdb8866e1b63ba812093d7a657cc68dd37946afcad785b652a2611bc
                                  • Instruction ID: c687e95c030e219239ba75339e7af18ebe3c50869524b70b7a6547227bfe1561
                                  • Opcode Fuzzy Hash: 373c3dc5cdb8866e1b63ba812093d7a657cc68dd37946afcad785b652a2611bc
                                  • Instruction Fuzzy Hash: B4B13532910245DFDB11CF28C861BBEBBE5EF55354F1882AAE845DB3C1E638AD51CB60
                                  APIs
                                  • CloseHandle.KERNEL32(?,?,?,00000000,?,006D558F,?,?,?,?,?,?), ref: 006D503B
                                  • DeleteCriticalSection.KERNEL32(?,?,?,00000000,?,006D558F,?,?,?,?,?,?), ref: 006D504F
                                  • TlsFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,006D558F,?,?), ref: 006D513E
                                  • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,006D558F,?,?), ref: 006D5145
                                    • Part of subcall function 006D115F: LocalFree.KERNEL32(?,?,006D4FF8,?,00000000,?,006D558F,?,?,?,?,?,?), ref: 006D1169
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalDeleteFreeSection$CloseHandleLocal
                                  • String ID:
                                  • API String ID: 3671900028-0
                                  • Opcode ID: 4cb0bfdd8ac4ce4d1748590e0bb76dea238584d767571de80c5fcf87682adf5f
                                  • Instruction ID: ba337eb3cb84c980c17abd161cb76602d5d053db6629992dd99bc88318c21be7
                                  • Opcode Fuzzy Hash: 4cb0bfdd8ac4ce4d1748590e0bb76dea238584d767571de80c5fcf87682adf5f
                                  • Instruction Fuzzy Hash: D641FD71900B05ABDAA0EBB5C889BDB73EEAF14701F44481FB2AAD3251DB34E5448768
                                  APIs
                                  • GetLastError.KERNEL32(?,?,00716211,00000000,00000000,00000001), ref: 00716325
                                  • GetLastError.KERNEL32(?,?,00716211,00000000,00000000,00000001), ref: 00716374
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp$xrs
                                  • API String ID: 1452528299-4222975862
                                  • Opcode ID: fba1896cf15a8268e321f0c3831d95020c26f6a981f734990d14698ee6d1ab7d
                                  • Instruction ID: 2466b7a24a917c54532c5249c6c2fc103696d8b61c9df762acbfe83a9adf00c1
                                  • Opcode Fuzzy Hash: fba1896cf15a8268e321f0c3831d95020c26f6a981f734990d14698ee6d1ab7d
                                  • Instruction Fuzzy Hash: C831FD72900226FBEB219F9C8D44EDF76A9AF01760B114119FD20EB2C1E73CDD40A6E0
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000,?,00701309,00000000,80004004,00000100,?,00701641,00000000,80004004,00000000,00000000), ref: 00705AA2
                                  • _free.LIBCMT ref: 00705AFF
                                  • _free.LIBCMT ref: 00705B35
                                  • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00701641,00000000,80004004,00000000,00000000), ref: 00705B40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast_free
                                  • String ID:
                                  • API String ID: 2283115069-0
                                  • Opcode ID: 85fdca5f374f55b2bface471762024ea8c6e6e780642a06b8c4f616da76e664c
                                  • Instruction ID: 1d4d5a78a1e1c9e8696e65c34947c3b2138005c0ced10142de5661080a1b4751
                                  • Opcode Fuzzy Hash: 85fdca5f374f55b2bface471762024ea8c6e6e780642a06b8c4f616da76e664c
                                  • Instruction Fuzzy Hash: E511C6B2704E0AEAD71567755CCDE2B39E9DBC43B5B248324F725961E2EF2D9C009A20
                                  APIs
                                  • GetLastError.KERNEL32(?,00000100,00000000,00703A1A,006D3CE2,80004005,00000000,?,c:\agent\_work\79\s\src\burn\engine\cabextract.cpp,000001C7), ref: 00705BF9
                                  • _free.LIBCMT ref: 00705C56
                                  • _free.LIBCMT ref: 00705C8C
                                  • SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00705C97
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLast_free
                                  • String ID:
                                  • API String ID: 2283115069-0
                                  • Opcode ID: c661009c46eb9c1b3ad100eb08794456fd513110528163e15cf343c7a0df211a
                                  • Instruction ID: 45173dfefb5423b08d1f0df156e69ddc460163442d3daac1b24f16afd305bf9c
                                  • Opcode Fuzzy Hash: c661009c46eb9c1b3ad100eb08794456fd513110528163e15cf343c7a0df211a
                                  • Instruction Fuzzy Hash: 4611E971304B0BEAF61567795DCDE2B26E9EBC53B1B254324F725921E3EF2D8C018A24
                                  APIs
                                    • Part of subcall function 006DF909: RegCloseKey.ADVAPI32(00000000,?,?,00000001,00000000,00000000,?,?,006D4CE8,?,?,00000001), ref: 006DF959
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,?,?,00000001,00000000,?,?,?), ref: 006D4D4F
                                  Strings
                                  • Unable to get resume command line from the registry, xrefs: 006D4CEE
                                  • Failed to get current process path., xrefs: 006D4D0D
                                  • Failed to re-launch bundle process after RunOnce: %ls, xrefs: 006D4D39
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close$Handle
                                  • String ID: Failed to get current process path.$Failed to re-launch bundle process after RunOnce: %ls$Unable to get resume command line from the registry
                                  • API String ID: 187904097-642631345
                                  • Opcode ID: d0095cd9d5c9ba58c4576989da34dcd8443c91af613f1f12f6092b05738ddd67
                                  • Instruction ID: c7744be309bb78392a919798d22af400be109168a56900b772b53d1d5a93f1cb
                                  • Opcode Fuzzy Hash: d0095cd9d5c9ba58c4576989da34dcd8443c91af613f1f12f6092b05738ddd67
                                  • Instruction Fuzzy Hash: CC115E71D01618FB8F22AB99DC058EEBBBAEF54710B108167F901B6351EB748F909B90
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 006D744A
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 006D74B1
                                  Strings
                                  • Failed to get value of variable: %ls, xrefs: 006D7484
                                  • Failed to get value as numeric for variable: %ls, xrefs: 006D74A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to get value as numeric for variable: %ls$Failed to get value of variable: %ls
                                  • API String ID: 3168844106-4270472870
                                  • Opcode ID: ba3c9b89693ff58e24491dd8217af66e7255f4e68476cba44b986192acc8998a
                                  • Instruction ID: 3764a8e496316f5e4e2b6ec10be34f8a84eb0cd656c97fffe2eabb327b0ce44f
                                  • Opcode Fuzzy Hash: ba3c9b89693ff58e24491dd8217af66e7255f4e68476cba44b986192acc8998a
                                  • Instruction Fuzzy Hash: 10019A72D44128BBCF125E58CC0AECE7EA6AF10724F118126FD00AA260E3399A509AD5
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 006D75B9
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 006D7620
                                  Strings
                                  • Failed to get value of variable: %ls, xrefs: 006D75F3
                                  • Failed to get value as version for variable: %ls, xrefs: 006D760F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to get value as version for variable: %ls$Failed to get value of variable: %ls
                                  • API String ID: 3168844106-1851729331
                                  • Opcode ID: 05b725a243e6fe4214469a53cf68d46c0242e2b81639443ee53b089a685e25f6
                                  • Instruction ID: 0f915144a474f93f6c58cabb885504190fbacabad0006cfd22e9e4354c491399
                                  • Opcode Fuzzy Hash: 05b725a243e6fe4214469a53cf68d46c0242e2b81639443ee53b089a685e25f6
                                  • Instruction Fuzzy Hash: D6017172D44528BBCF125B48CC09ADE7B66AF10724F118052FD05A6361E739DA509BD6
                                  APIs
                                  • EnterCriticalSection.KERNEL32(000000D0,?,000000B8,00000000,?,006E6F34,000000B8,00000000,?,00000000,75A8B390), ref: 006DD470
                                  • LeaveCriticalSection.KERNEL32(000000D0,?,006E6F34,000000B8,00000000,?,00000000,75A8B390), ref: 006DD493
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\userexperience.cpp, xrefs: 006DD4AC
                                  • Engine active cannot be changed because it was already in that state., xrefs: 006DD4B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Engine active cannot be changed because it was already in that state.$c:\agent\_work\79\s\src\burn\engine\userexperience.cpp
                                  • API String ID: 3168844106-2856732556
                                  • Opcode ID: 78a838033f725dc7f49d740eea54e7f203115e16e349ff453ac8a5e7b97ba897
                                  • Instruction ID: c6a159bc8f931737cac09985b59d168e9dbc3ed9b79a3ccecff26d2580ea1e2d
                                  • Opcode Fuzzy Hash: 78a838033f725dc7f49d740eea54e7f203115e16e349ff453ac8a5e7b97ba897
                                  • Instruction Fuzzy Hash: ADF0A4323402156F9711AEAEAC98D9773EEBF95751701803AF505C7780DA75F90586A0
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,00000000,00000006,?,006D985C,00000000,?,00000000,00000000,00000000,?,006D969D,00000000,?,00000000,00000000), ref: 006D754A
                                  • LeaveCriticalSection.KERNEL32(00000000,00000000,00000000,00000000,?,006D985C,00000000,?,00000000,00000000,00000000,?,006D969D,00000000,?,00000000), ref: 006D75A0
                                  Strings
                                  • Failed to get value of variable: %ls, xrefs: 006D7570
                                  • Failed to copy value of variable: %ls, xrefs: 006D758F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: Failed to copy value of variable: %ls$Failed to get value of variable: %ls
                                  • API String ID: 3168844106-2936390398
                                  • Opcode ID: 5f4f05c465b0f24f4c319c3f02935dbc3a24eac5f97540b60d1cb642b22fed94
                                  • Instruction ID: 380cab6c4cc31eae0fe46dd23497651417fb00e7f090fb3aaadb022385e2a1ad
                                  • Opcode Fuzzy Hash: 5f4f05c465b0f24f4c319c3f02935dbc3a24eac5f97540b60d1cb642b22fed94
                                  • Instruction Fuzzy Hash: 7FF04FB2D54228FBCF026F98DC09DDE7F6AEF14364F018051FC05A62A0D739DA50AB95
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000000,7591DFD0,?,BTm,006E5C55,0071B4A0,BTm,?,BTm,00000000,00000000,006D53FA,00000000), ref: 006D7F47
                                  • LeaveCriticalSection.KERNEL32(00000000,00000000,006D53FA,00000000,?,BTm,006E5C55,0071B4A0,BTm,?,BTm,00000000,00000000,006D53FA,00000000), ref: 006D7F95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: BTm$Failed to get visibility of variable: %ls
                                  • API String ID: 3168844106-2377321778
                                  • Opcode ID: 6c1421193a70e6afd1502955c6e7b3f2638d1f89d1e3f19a234eb019b118c108
                                  • Instruction ID: cab050041f670975e6286517a7e3f4515fdb598a5dcc926973688d4c329aa473
                                  • Opcode Fuzzy Hash: 6c1421193a70e6afd1502955c6e7b3f2638d1f89d1e3f19a234eb019b118c108
                                  • Instruction Fuzzy Hash: B0F06976904128FFCB129F44CC09ADE7B76EF15350F018051FC019B360D3359E10AB95
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0070D785,00000000,00000001,00000000,00000000,?,0070C989,00000000,Y[p,00000000), ref: 0070EBAD
                                  • GetLastError.KERNEL32(?,0070D785,00000000,00000001,00000000,00000000,?,0070C989,00000000,Y[p,00000000,00000000,00000000,?,0070CEDD,00000000), ref: 0070EBB9
                                    • Part of subcall function 0070EB7F: CloseHandle.KERNEL32(FFFFFFFE,0070EBC9,?,0070D785,00000000,00000001,00000000,00000000,?,0070C989,00000000,Y[p,00000000,00000000,00000000), ref: 0070EB8F
                                  • ___initconout.LIBCMT ref: 0070EBC9
                                    • Part of subcall function 0070EB41: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0070EB70,0070D772,00000000,?,0070C989,00000000,Y[p,00000000,00000000), ref: 0070EB54
                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0070D785,00000000,00000001,00000000,00000000,?,0070C989,00000000,Y[p,00000000,00000000), ref: 0070EBDE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: 7cbaf7bd5f5a76027e60c0ea3a6301630fc0b58c02ffe6e87c58ce9ceeca1158
                                  • Instruction ID: f61a6ce6179a5c6357bb7e74ab81a243e4398882b9f0df6f9c5559c8c21b5426
                                  • Opcode Fuzzy Hash: 7cbaf7bd5f5a76027e60c0ea3a6301630fc0b58c02ffe6e87c58ce9ceeca1158
                                  • Instruction Fuzzy Hash: 56F01C36500128FBCF222FA9DC09DDE3FA6FB083B5B048510FA1985170C736C860DB94
                                  APIs
                                  • _free.LIBCMT ref: 00704B09
                                    • Part of subcall function 00705F5F: HeapFree.KERNEL32(00000000,00000000,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?), ref: 00705F75
                                    • Part of subcall function 00705F5F: GetLastError.KERNEL32(?,?,007088DC,?,00000000,?,00000000,?,00708903,?,00000007,?,?,00708D7D,?,?), ref: 00705F87
                                  • _free.LIBCMT ref: 00704B1C
                                  • _free.LIBCMT ref: 00704B2D
                                  • _free.LIBCMT ref: 00704B3E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: c54f44d31aaa7fa7996fb804441fc72c6099c14d46190db7055407cef2f546fb
                                  • Instruction ID: 583413283c00344b86d856f5248b1333bffefe2212bddefc6f0cb8d1bf3ba426
                                  • Opcode Fuzzy Hash: c54f44d31aaa7fa7996fb804441fc72c6099c14d46190db7055407cef2f546fb
                                  • Instruction Fuzzy Hash: 9DE046B1800971DAE6132F58BC1541B3FA5B7047423128246F6083A272C73D12229FCA
                                  APIs
                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0070DFAF), ref: 0070E65C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: DecodePointer
                                  • String ID: Xo$t_s
                                  • API String ID: 3527080286-2533328523
                                  • Opcode ID: 6d8e97b27284d96e3c44a12d0acce980e21d276739ed45e09d21cbe97d457c93
                                  • Instruction ID: 50f3304db8e867c51d58692a90031e91ca1e23ecbdcd68783e4af2d72ebb5573
                                  • Opcode Fuzzy Hash: 6d8e97b27284d96e3c44a12d0acce980e21d276739ed45e09d21cbe97d457c93
                                  • Instruction Fuzzy Hash: 7D51A974900A0ACBEF108FA8E84C1ADBBF4FF45300F549B55E491AB2E4CB7D8A25CB45
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000), ref: 007110E4
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 007110D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 3535843008-1128744096
                                  • Opcode ID: c5ef35a07fb4eebeb9785555dd4001f844b45cd07af04423aeef87dc725d699b
                                  • Instruction ID: 37c28a180fa33a8b4d0f7566d4bf59491a9f9d0eaca139d0b6465fc71a8d7b1b
                                  • Opcode Fuzzy Hash: c5ef35a07fb4eebeb9785555dd4001f844b45cd07af04423aeef87dc725d699b
                                  • Instruction Fuzzy Hash: 65411332D0016AEBDF318A5CCC057EE76A5AB08761F548165EA04AF2E0D73DCDC1ABC0
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000000,80000002,SYSTEM\CurrentControlSet\Control\Session Manager,00000003,?,?,00000000,00000101), ref: 00714B71
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: PendingFileRenameOperations$SYSTEM\CurrentControlSet\Control\Session Manager
                                  • API String ID: 47109696-3023217399
                                  • Opcode ID: ca46ae221627bc34ef666e491c8321e268badfa6a750bc386e64503534404990
                                  • Instruction ID: e8880e74dd2cf4485b48dc2f3adf60beeb07c2d23b793c433de0c2cab2e2e69c
                                  • Opcode Fuzzy Hash: ca46ae221627bc34ef666e491c8321e268badfa6a750bc386e64503534404990
                                  • Instruction Fuzzy Hash: C94160B1E00219EFCB30DF98C985AEEBBB9EF54751F164069E510AB291D738DE80DB50
                                  APIs
                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00711426
                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0071145E
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 0071149A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: QueryValue
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 3660427363-1128744096
                                  • Opcode ID: 034a6847bedcd6f82dce60173ee77e96c7c82319bebad9ce03a49be75b97494b
                                  • Instruction ID: 71f07286b896f2b712aad9b3e7c6a5c60f649f88b633425da38787bd3c8c78ed
                                  • Opcode Fuzzy Hash: 034a6847bedcd6f82dce60173ee77e96c7c82319bebad9ce03a49be75b97494b
                                  • Instruction Fuzzy Hash: 8B41B931D0016AFBDB119F9CC8419EEBBBAEF40B54F50816AEE10AF250D7359E40DB90
                                  APIs
                                    • Part of subcall function 0071904C: lstrlenW.KERNEL32(00000100,?,?,?,007193EC,000002C0,00000100,00000100,00000100,?,?,?,006F7AF5,?,?,000001BC), ref: 00719071
                                  • RegCloseKey.ADVAPI32(00000000,?,?,00000000,?,00000000,?,?,?,00000000,wininet.dll,?,0071B500,wininet.dll,?), ref: 0071925B
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,?,?,?,00000000,wininet.dll,?,0071B500,wininet.dll,?), ref: 00719268
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                    • Part of subcall function 0071115A: RegEnumKeyExW.ADVAPI32(00000000,000002C0,00000410,00000002,00000000,00000000,00000000,00000000,00000410,00000002,00000100,00000000,00000000,?,?,006F8B79), ref: 007111B5
                                    • Part of subcall function 0071115A: RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006F8B79,00000000), ref: 007111D3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Close$EnumInfoOpenQuerylstrlen
                                  • String ID: wininet.dll
                                  • API String ID: 2680864210-3354682871
                                  • Opcode ID: d0e11caa43bd86557224b9ce2341c80743615fbee702468515931ae29d244bd3
                                  • Instruction ID: ec97d46847d11d087bc702941d49ec9657ed0706bcb6113a644d640c37a42629
                                  • Opcode Fuzzy Hash: d0e11caa43bd86557224b9ce2341c80743615fbee702468515931ae29d244bd3
                                  • Instruction Fuzzy Hash: F8311A32C0012EFBCF11AF98CD919EEBAB9FF14710B554169EA0076261C7399F91AB90
                                  APIs
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,0070CF44,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0070CCEC
                                  • GetLastError.KERNEL32(0070CF44,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0070CD1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: Y[p
                                  • API String ID: 442123175-2506504590
                                  • Opcode ID: 6b4e2332a11148421fd904efa07836df1d60c8d7d955cb4be677608260f41b0a
                                  • Instruction ID: 26e5a26f4b7257a88824cb33cf7c5fe4dafc40badf78b06cf7491d47b54e256c
                                  • Opcode Fuzzy Hash: 6b4e2332a11148421fd904efa07836df1d60c8d7d955cb4be677608260f41b0a
                                  • Instruction Fuzzy Hash: 58319471B00219EFDB25CF69DC81AEA77F5EB44310F1442B9E909D7390E734AD818B64
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000,Y[p,00000000,00000000,?,0070CF34,00000000,00000000,00000000,00000000,?,00000000), ref: 0070CBC2
                                  • GetLastError.KERNEL32(?,0070CF34,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0070CBE8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: Y[p
                                  • API String ID: 442123175-2506504590
                                  • Opcode ID: 7b31349228ac03f9518421e29e87db45e58a19c34053ead2b8300ebe37746242
                                  • Instruction ID: 98b3c96b2d219bd25dbd4533b0f6a73e5f072984065a0c21ea0cc6ff35eed468
                                  • Opcode Fuzzy Hash: 7b31349228ac03f9518421e29e87db45e58a19c34053ead2b8300ebe37746242
                                  • Instruction Fuzzy Hash: 8B31A271A0021CDBCB15CF29DC819EAB3F9FF48311F1486A9E909E72A1E7349D81CB94
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000,Y[p,00000000,00000000,?,0070CF54,00000000,00000000,00000000,00000000,?,00000000), ref: 0070CAD7
                                  • GetLastError.KERNEL32(?,0070CF54,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0070CAFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: Y[p
                                  • API String ID: 442123175-2506504590
                                  • Opcode ID: b81fe2f38a275c376182358153e1c2f422d61693dc98bce4a848578a13338b76
                                  • Instruction ID: 77b440d1210a0c0b194f206417c5a7aace2100556571dbd104ddf810ae492e92
                                  • Opcode Fuzzy Hash: b81fe2f38a275c376182358153e1c2f422d61693dc98bce4a848578a13338b76
                                  • Instruction Fuzzy Hash: 0E21B470A0021DDFCB16CF29DC809E9B7F9EB48311F2082AAE906D7252E7349D46CF64
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: _memcpy_s
                                  • String ID: crypt32.dll$wininet.dll
                                  • API String ID: 2001391462-82500532
                                  • Opcode ID: 3acd12551d8af57428b3f6e5983e566ec212ccbbec8f150e6a88dae48337b01d
                                  • Instruction ID: 015ecf89f0b13aaf3fd205effc378a8de29ea8b80cd7b0a14bbc13ccfd807a54
                                  • Opcode Fuzzy Hash: 3acd12551d8af57428b3f6e5983e566ec212ccbbec8f150e6a88dae48337b01d
                                  • Instruction Fuzzy Hash: 1C114F71A00219ABCF08DF19CC959AF7F6AEF95294B14802AED058B311D631EA118AA0
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000000,SOFTWARE\Policies\Microsoft\Windows\Installer,00020019,00000000,?,?,?,?,006E3F39,feclient.dll,?,00000000,?,?,?,006D4B57), ref: 006E3ACA
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00711426
                                    • Part of subcall function 007113B0: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0071145E
                                  Strings
                                  • Logging, xrefs: 006E3A57
                                  • SOFTWARE\Policies\Microsoft\Windows\Installer, xrefs: 006E3A40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: QueryValue$CloseOpen
                                  • String ID: Logging$SOFTWARE\Policies\Microsoft\Windows\Installer
                                  • API String ID: 1586453840-387823766
                                  • Opcode ID: 19a81aff4feaaac50e4ce117fe4e5a707f1f0f3c141eaa53a42f13a1ac223493
                                  • Instruction ID: 57926c2fa6ca92330d2121ecb896231db3cb9191d0ff4087c0138dec504e9520
                                  • Opcode Fuzzy Hash: 19a81aff4feaaac50e4ce117fe4e5a707f1f0f3c141eaa53a42f13a1ac223493
                                  • Instruction Fuzzy Hash: BB113876602379BBEB24DA49C90EBFAB765AB00740F904065E982EB3C0D7749FC18754
                                  APIs
                                  • RegSetValueExW.ADVAPI32(00020006,00720F38,00000000,00000001,?,00000000,?,000000FF,00000000,00000000,?,?,006DF2DC,00000000,?,00020006), ref: 0071180C
                                  • RegDeleteValueW.ADVAPI32(00020006,00720F38,00000000,?,?,006DF2DC,00000000,?,00020006,?,00720F38,00020006,00000000,?,?,?), ref: 0071183C
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 00711870
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Value$Delete
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 1738766685-1128744096
                                  • Opcode ID: d925331a60f1e4c8b8701ef184535e4d1663bec65726590aaa4f113d2d2b743e
                                  • Instruction ID: 32cca3a175da19056fd6678d4e1d8585a7ecbc0104053ef29dbdcfde9d3563bd
                                  • Opcode Fuzzy Hash: d925331a60f1e4c8b8701ef184535e4d1663bec65726590aaa4f113d2d2b743e
                                  • Instruction Fuzzy Hash: 98119E36D00136BBEB224A998C05BDABA65EB00B70F59C125FF00BE1D0D629DD80A7E4
                                  APIs
                                  • CompareStringW.KERNEL32(00000000,00000000,00000000,000000FF,?,000000FF,IGNOREDEPENDENCIES,00000000,?,?,006F740F,00000000,IGNOREDEPENDENCIES,00000000,?,0071B518), ref: 006DDDA4
                                  Strings
                                  • Failed to copy the property value., xrefs: 006DDDD8
                                  • IGNOREDEPENDENCIES, xrefs: 006DDD5B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareString
                                  • String ID: Failed to copy the property value.$IGNOREDEPENDENCIES
                                  • API String ID: 1825529933-1412343224
                                  • Opcode ID: 95e4f898256ee07f8bbef229a34e0f3438dc3066db10356ff65062c384ffbcf3
                                  • Instruction ID: 76f3d6900459799ae5cc76319ecdad1434f577149956c4e6161220c68b42f042
                                  • Opcode Fuzzy Hash: 95e4f898256ee07f8bbef229a34e0f3438dc3066db10356ff65062c384ffbcf3
                                  • Instruction Fuzzy Hash: 8F118636A04215AFDF116F98CC85FA9B7A7AF04724F254177FA199B3A1C7709850C790
                                  APIs
                                  • LCMapStringW.KERNEL32(0000007F,00000000,00000000,006E6FDC,00000000,006E6FDC,00000000,00000000,006E6FDC,00000000,00000000,00000000,?,006D2420,00000000,00000000), ref: 006D15BC
                                  • GetLastError.KERNEL32(?,006D2420,00000000,00000000,006E6FDC,00000200,?,0071550E,00000000,006E6FDC,00000000,006E6FDC,00000000,00000000,00000000), ref: 006D15C6
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\strutil.cpp, xrefs: 006D15EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorLastString
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\strutil.cpp
                                  • API String ID: 3728238275-2901571208
                                  • Opcode ID: 8833932470a32e104a0b04c76617d073c0b8c52e8d37c5b2c3c9a8027887310e
                                  • Instruction ID: 9f62ecc5ff48df5af5d66e4b01883a484d048be01719f4d6f12378f57f4c6685
                                  • Opcode Fuzzy Hash: 8833932470a32e104a0b04c76617d073c0b8c52e8d37c5b2c3c9a8027887310e
                                  • Instruction Fuzzy Hash: C401F573D40236778B218A999C44E9B7A6AEF86B70B020216FE20AF341D668DC1087E0
                                  APIs
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 006E5756
                                  • CoUninitialize.OLE32(?,00000000,?,?,?,?,?,?,?), ref: 006E57AF
                                  Strings
                                  • Failed to initialize COM on cache thread., xrefs: 006E576B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: InitializeUninitialize
                                  • String ID: Failed to initialize COM on cache thread.
                                  • API String ID: 3442037557-3629645316
                                  • Opcode ID: 99f5319f94ebed7e343b160d85726d776c6d771e41c4f85edb6e9b945e546990
                                  • Instruction ID: a609b9313e0d1212fb7f3e180e0d9196be833d0c328b5f83dde548f450ad9a76
                                  • Opcode Fuzzy Hash: 99f5319f94ebed7e343b160d85726d776c6d771e41c4f85edb6e9b945e546990
                                  • Instruction Fuzzy Hash: B2019672601619FFDB059FA9DC84DDAFBADFF08354B008129F50997220D770AE508B94
                                  APIs
                                  • Sleep.KERNEL32(20000004,00000000,00000000,00000000,00000000,00000000,?,?,006E8D81,?,00000001,20000004,00000000,00000000,?,00000000), ref: 007158C3
                                  • SetNamedSecurityInfoW.ADVAPI32(00000000,?,000007D0,00000003,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006E8D81,?), ref: 007158DE
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\aclutil.cpp, xrefs: 00715902
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: InfoNamedSecuritySleep
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\aclutil.cpp
                                  • API String ID: 2352087905-4212656368
                                  • Opcode ID: 38b3d90aa104e522adaeb722d3e5f21a720176759eb84e86a3e1839b38826051
                                  • Instruction ID: d5610b0f5171fa8d51b77ae0dbb853e9e0a03d3a410b0c5411a7dfc30f9a5b04
                                  • Opcode Fuzzy Hash: 38b3d90aa104e522adaeb722d3e5f21a720176759eb84e86a3e1839b38826051
                                  • Instruction Fuzzy Hash: 7D018E33800629FBCF225E88CD05ACE7F75EF88760F024115FD0466260C2799E60ABD5
                                  APIs
                                  • lstrlenW.KERNEL32(burn.clean.room,?,?,?,?,006D1104,?,?,00000000), ref: 006D517F
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,0000000F,burn.clean.room,0000000F,?,?,?,?,006D1104,?,?,00000000), ref: 006D51AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CompareStringlstrlen
                                  • String ID: burn.clean.room
                                  • API String ID: 1433953587-3055529264
                                  • Opcode ID: 7aa01f19f4c2e606beb32de724cb8681ea5924da3157412909c3ebf6a1f17389
                                  • Instruction ID: 4b4e7486cdba006de2e601bae739346fbcf0ca51aca8fde5127652f3b274ba10
                                  • Opcode Fuzzy Hash: 7aa01f19f4c2e606beb32de724cb8681ea5924da3157412909c3ebf6a1f17389
                                  • Instruction Fuzzy Hash: 9701A9B69006686B97204B4DAC84EF3FBAEEB5D7517108127F606C7B14D765AC40C7A4
                                  APIs
                                    • Part of subcall function 00711275: RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,0073BB7C,00000000,?,00715A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00711289
                                  • RegCloseKey.ADVAPI32(00000000,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System,00020019,00000000,?,?,?,?,?,00713D3A,?), ref: 00713F0B
                                  Strings
                                  • EnableLUA, xrefs: 00713EDD
                                  • SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System, xrefs: 00713EB5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: EnableLUA$SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
                                  • API String ID: 47109696-3551287084
                                  • Opcode ID: 4f4dc171cafce71edaef9fb073188ff354df2b6fe8454f00d0e92eb37b332ca8
                                  • Instruction ID: 9ee4264b4bc9666d2874af31f16c4386355f368bad92c71fdbb6712c74fa0d0f
                                  • Opcode Fuzzy Hash: 4f4dc171cafce71edaef9fb073188ff354df2b6fe8454f00d0e92eb37b332ca8
                                  • Instruction Fuzzy Hash: 05018F76D10228FFDB109AA8DC0ABDEFABCAB04761F204065E901B7091D37C9F90D7A0
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 00716BB6
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp, xrefs: 00716B72
                                  • `)u, xrefs: 00716BB6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\atomutil.cpp
                                  • API String ID: 3341692771-3437990411
                                  • Opcode ID: 15147dd0d15aa74039cc33b993abf39ed6d5271b146ec0e8baf4d67f6ab13e7e
                                  • Instruction ID: d3fca9a117e29de7101835345186200ea93c06ec10a0badeac06c05de72b5743
                                  • Opcode Fuzzy Hash: 15147dd0d15aa74039cc33b993abf39ed6d5271b146ec0e8baf4d67f6ab13e7e
                                  • Instruction Fuzzy Hash: CA0162B2904115FBDB729A8C8D45FDEB6699F40F60F344159B800B61D0D77C8E90E694
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000104,?,?,?,?,006D10DD,?,00000000), ref: 006D34E5
                                  • GetLastError.KERNEL32(?,?,?,?,006D10DD,?,00000000), ref: 006D34FC
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp, xrefs: 006D3520
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastModuleName
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp
                                  • API String ID: 2776309574-1445327374
                                  • Opcode ID: ef54f4fcbb3ee4762e53ae251aeb000b9f5b95f3283c03940a5bbb4ab7ce81dc
                                  • Instruction ID: e9bb6a47471542399e44d6046a7db6ef4bd91eff5f9a42f1526e9fc7372c6d69
                                  • Opcode Fuzzy Hash: ef54f4fcbb3ee4762e53ae251aeb000b9f5b95f3283c03940a5bbb4ab7ce81dc
                                  • Instruction Fuzzy Hash: 92F0FC73E4053177877256995C45ECBFB9AEB41BA0B064127FD04EF340D769DE0182E2
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?), ref: 006D6552
                                    • Part of subcall function 00710DDC: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,006D5EE0,00000000), ref: 00710DF0
                                    • Part of subcall function 00710DDC: GetProcAddress.KERNEL32(00000000), ref: 00710DF7
                                    • Part of subcall function 00710DDC: GetLastError.KERNEL32(?,?,?,006D5EE0,00000000), ref: 00710E0E
                                    • Part of subcall function 006D5D14: RegCloseKey.ADVAPI32(00000000,?,00000000,CommonFilesDir,?,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00020119,00000000), ref: 006D5D9A
                                  Strings
                                  • Failed to get 64-bit folder., xrefs: 006D6575
                                  • Failed to set variant value., xrefs: 006D658F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressCloseCurrentErrorHandleLastModuleProcProcess
                                  • String ID: Failed to get 64-bit folder.$Failed to set variant value.
                                  • API String ID: 3109562764-2681622189
                                  • Opcode ID: ea443471b7d7f9e4334f86eaa3fa983b1d769d350e7c672248d8126110e137b0
                                  • Instruction ID: 32c38f758d03cdf74015d6b1f53edf5adb15e631c25406dbf2046fa1a22dd08b
                                  • Opcode Fuzzy Hash: ea443471b7d7f9e4334f86eaa3fa983b1d769d350e7c672248d8126110e137b0
                                  • Instruction Fuzzy Hash: CA016272D00228FBCF11A794DC06DDE7A7AAF04B21F108056F900B6295D775AF80DBD4
                                  APIs
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 006FE922
                                    • Part of subcall function 00700AF1: RaiseException.KERNEL32(?,?,?,Do,?,00000000,00000000,?,?,?,?,?,006FE944,?,00738338), ref: 00700B51
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 006FE93F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Exception@8Throw$ExceptionRaise
                                  • String ID: Unknown exception
                                  • API String ID: 3476068407-410509341
                                  • Opcode ID: 6a2087ecde39b5c825ede140e130435bbe105988391711b9c3e7bd1db7cf6e44
                                  • Instruction ID: 565a18eda9da87e2e61eb969d76ae99221c64b87c4db4164c64be6e26c2234a8
                                  • Opcode Fuzzy Hash: 6a2087ecde39b5c825ede140e130435bbe105988391711b9c3e7bd1db7cf6e44
                                  • Instruction Fuzzy Hash: D1F0287490030CF6CB14BAA4DC199BC3BAD9A00760F504235FB28851E2EFF6EA1681D4
                                  APIs
                                  • GetFileSizeEx.KERNEL32(00000000,00000000,00000000,759234C0,?,?,?,006DB9EC,?,?,?,00000000,00000000), ref: 00714C8E
                                  • GetLastError.KERNEL32(?,?,?,006DB9EC,?,?,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00714C98
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00714CBC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastSize
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 464720113-3405085980
                                  • Opcode ID: 80fe198c4ca5e5326a662cf9389124e654b00320da0af2f65263b52a42bf3b8b
                                  • Instruction ID: 5853bd6531a93ea76ac627983daba090d74ad0e802111276a4af46ca26b79cd6
                                  • Opcode Fuzzy Hash: 80fe198c4ca5e5326a662cf9389124e654b00320da0af2f65263b52a42bf3b8b
                                  • Instruction Fuzzy Hash: 8EF0C8B3A01136AB97109F4DC90599BFBACEF44B60B014119FD04AB380E374AD00C7E4
                                  APIs
                                  • CLSIDFromProgID.OLE32(Microsoft.Update.AutoUpdate,006D54A3,?,00000000,006D54A3,?,?,?), ref: 00714050
                                  • CoCreateInstance.OLE32(00000000,00000000,00000001,00737AAC,?), ref: 00714068
                                  Strings
                                  • Microsoft.Update.AutoUpdate, xrefs: 0071404B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: CreateFromInstanceProg
                                  • String ID: Microsoft.Update.AutoUpdate
                                  • API String ID: 2151042543-675569418
                                  • Opcode ID: 25df04f95ac6fb54f0318af3d805882d0fc11eb33595b9b5f7cb49b8ae16cfe7
                                  • Instruction ID: e23579a99682505ef4519897fa3c910291cdf86e0a0c464b26d5669ad1982bfa
                                  • Opcode Fuzzy Hash: 25df04f95ac6fb54f0318af3d805882d0fc11eb33595b9b5f7cb49b8ae16cfe7
                                  • Instruction Fuzzy Hash: 12F03AB1610208BBEB00DBADDD46AEFB7B9EB48710F404065AA01E6190D674AA0486A6
                                  APIs
                                    • Part of subcall function 00713503: SysAllocString.OLEAUT32(0071B4E8), ref: 00713516
                                    • Part of subcall function 00713503: VariantInit.OLEAUT32(?), ref: 00713522
                                    • Part of subcall function 00713503: VariantClear.OLEAUT32(?), ref: 00713596
                                    • Part of subcall function 00713503: SysFreeString.OLEAUT32(00000000), ref: 007135A1
                                  • SysFreeString.OLEAUT32(00000000), ref: 00713741
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: String$FreeVariant$AllocClearInit
                                  • String ID: `)u$msasn1.dll
                                  • API String ID: 3379191133-2799367386
                                  • Opcode ID: 818d1191bf3905e7c13fc67ca94454f4b71ae31e54a9bfcbc4a6f6923c29ceb9
                                  • Instruction ID: 931297f573b07b94f527ae21ae2e91565512761f8982be9683fb6fd33d1829f8
                                  • Opcode Fuzzy Hash: 818d1191bf3905e7c13fc67ca94454f4b71ae31e54a9bfcbc4a6f6923c29ceb9
                                  • Instruction Fuzzy Hash: B5F058B5500108FBCF029F58CD4ABDE7BB6EB80315F104024F901AA1E0D77A9F64EB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: Alloc
                                  • String ID: FlsAlloc$Xo
                                  • API String ID: 2773662609-581224058
                                  • Opcode ID: 4a7dfcea4fba90fc20990881b69bd32472f9cac1636a416ee7c21f378a46470b
                                  • Instruction ID: 4fcbd371f22746589c506b6263f7ced56a76cb555ef5f944391a28920db946c3
                                  • Opcode Fuzzy Hash: 4a7dfcea4fba90fc20990881b69bd32472f9cac1636a416ee7c21f378a46470b
                                  • Instruction Fuzzy Hash: F0E0C23268072EB7E23122655C0AE9E7D44DB50FA1F448210FE08611D3DAAE6B1182D9
                                  APIs
                                  • GetProcAddress.KERNEL32(RegDeleteKeyExW,AdvApi32.dll), ref: 00711133
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3297131584.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.3297054372.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297303299.000000000071B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297418481.000000000073B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3297471275.000000000073E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_jlK7Q70gbN.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: AdvApi32.dll$RegDeleteKeyExW
                                  • API String ID: 190572456-850864035
                                  • Opcode ID: 9b8df60fd459cbb1f0e0e92f607c67e2d100132d490b14e952a01c632a68c40c
                                  • Instruction ID: 6efc4710e295bac2d0c51c8c208bf995bf7a2512aa707c6bf5b2c10083b42aef
                                  • Opcode Fuzzy Hash: 9b8df60fd459cbb1f0e0e92f607c67e2d100132d490b14e952a01c632a68c40c
                                  • Instruction Fuzzy Hash: 92E0EC71941235ABF3625F5CBC057817AA0E701B57F00C125EA04BE2A1D37D4884AF99
                                  APIs
                                    • Part of subcall function 00A134C4: GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000104,?,?,?,?,00A110DD,?,00000000), ref: 00A134E5
                                  • CreateFileW.KERNELBASE(?,80000000,00000005,00000000,00000003,00000080,00000000,?,00000000), ref: 00A110F6
                                    • Part of subcall function 00A11173: HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A11184
                                    • Part of subcall function 00A11173: GetModuleHandleW.KERNEL32(kernel32,?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A1118F
                                    • Part of subcall function 00A11173: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00A1119D
                                    • Part of subcall function 00A11173: GetLastError.KERNEL32(?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A111B8
                                    • Part of subcall function 00A11173: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00A111C0
                                    • Part of subcall function 00A11173: GetLastError.KERNEL32(?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A111D5
                                  • CloseHandle.KERNEL32(?,?,?,?,00A5B4D0,?,cabinet.dll,00000009,?,?,00000000), ref: 00A11131
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressErrorFileHandleLastModuleProc$CloseCreateHeapInformationName
                                  • String ID: _`AB$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$feclient.dll$msasn1.dll$msi.dll$version.dll$wininet.dll
                                  • API String ID: 3687706282-3885576073
                                  • Opcode ID: c61e65747dd96a81d662dca215d0e80ab46f05b6f81d91ae928b9a77abe97cb6
                                  • Instruction ID: 1794e86379388f91cee2f633ca03daeff645f939dc9ed4cab86ebbc5269f8a3e
                                  • Opcode Fuzzy Hash: c61e65747dd96a81d662dca215d0e80ab46f05b6f81d91ae928b9a77abe97cb6
                                  • Instruction Fuzzy Hash: F3216D7191021CBBDB10DFA4DD49BEFBBB8BB48716F504219FA11B6281D77099488BB4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 a1f97e-a1f9af call a53c5b 3 a1f9b1 0->3 4 a1f9b3-a1f9b5 0->4 3->4 5 a1f9b7-a1f9c4 call a5055b 4->5 6 a1f9c9-a1f9e2 call a535af 4->6 11 a1feb1-a1feb6 5->11 12 a1f9e4-a1f9e9 6->12 13 a1f9ee-a1fa03 call a535af 6->13 16 a1feb8-a1feba 11->16 17 a1febe-a1fec3 11->17 14 a1fea8-a1feaf call a5055b 12->14 24 a1fa05-a1fa0a 13->24 25 a1fa0f-a1fa1c call a1e9f9 13->25 30 a1feb0 14->30 16->17 18 a1fec5-a1fec7 17->18 19 a1fecb-a1fed0 17->19 18->19 22 a1fed2-a1fed4 19->22 23 a1fed8-a1fedc 19->23 22->23 27 a1fee6-a1feeb 23->27 28 a1fede-a1fee1 call a12762 23->28 24->14 33 a1fa28-a1fa3d call a535af 25->33 34 a1fa1e-a1fa23 25->34 28->27 30->11 37 a1fa49-a1fa5b call a54f04 33->37 38 a1fa3f-a1fa44 33->38 34->14 41 a1fa6a-a1fa7f call a535af 37->41 42 a1fa5d-a1fa65 37->42 38->14 47 a1fa81-a1fa86 41->47 48 a1fa8b-a1faa0 call a535af 41->48 43 a1fd34-a1fd3d call a5055b 42->43 43->30 47->14 52 a1faa2-a1faa7 48->52 53 a1faac-a1fabe call a537bb 48->53 52->14 56 a1fac0-a1fac5 53->56 57 a1faca-a1fae0 call a53c5b 53->57 56->14 60 a1fae6-a1fae8 57->60 61 a1fd8f-a1fda9 call a1ec73 57->61 62 a1faf4-a1fb09 call a537bb 60->62 63 a1faea-a1faef 60->63 68 a1fdb5-a1fdcd call a53c5b 61->68 69 a1fdab-a1fdb0 61->69 70 a1fb15-a1fb2a call a535af 62->70 71 a1fb0b-a1fb10 62->71 63->14 76 a1fdd3-a1fdd5 68->76 77 a1fe97-a1fe98 call a1f0a3 68->77 69->14 79 a1fb3a-a1fb4f call a535af 70->79 80 a1fb2c-a1fb2e 70->80 71->14 81 a1fde1-a1fdff call a535af 76->81 82 a1fdd7-a1fddc 76->82 85 a1fe9d-a1fea1 77->85 90 a1fb51-a1fb53 79->90 91 a1fb5f-a1fb74 call a535af 79->91 80->79 86 a1fb30-a1fb35 80->86 92 a1fe01-a1fe06 81->92 93 a1fe0b-a1fe23 call a535af 81->93 82->14 85->30 89 a1fea3 85->89 86->14 89->14 90->91 94 a1fb55-a1fb5a 90->94 101 a1fb84-a1fb99 call a535af 91->101 102 a1fb76-a1fb78 91->102 92->14 99 a1fe30-a1fe48 call a535af 93->99 100 a1fe25-a1fe27 93->100 94->14 109 a1fe55-a1fe6d call a535af 99->109 110 a1fe4a-a1fe4c 99->110 100->99 103 a1fe29-a1fe2e 100->103 111 a1fba9-a1fbbe call a535af 101->111 112 a1fb9b-a1fb9d 101->112 102->101 104 a1fb7a-a1fb7f 102->104 103->14 104->14 119 a1fe76-a1fe8e call a535af 109->119 120 a1fe6f-a1fe74 109->120 110->109 113 a1fe4e-a1fe53 110->113 121 a1fbc0-a1fbc2 111->121 122 a1fbce-a1fbe3 call a535af 111->122 112->111 114 a1fb9f-a1fba4 112->114 113->14 114->14 119->77 128 a1fe90-a1fe95 119->128 120->14 121->122 124 a1fbc4-a1fbc9 121->124 129 a1fbf3-a1fc08 call a535af 122->129 130 a1fbe5-a1fbe7 122->130 124->14 128->14 134 a1fc18-a1fc2d call a535af 129->134 135 a1fc0a-a1fc0c 129->135 130->129 131 a1fbe9-a1fbee 130->131 131->14 139 a1fc3d-a1fc55 call a535af 134->139 140 a1fc2f-a1fc31 134->140 135->134 136 a1fc0e-a1fc13 135->136 136->14 144 a1fc65-a1fc7d call a535af 139->144 145 a1fc57-a1fc59 139->145 140->139 141 a1fc33-a1fc38 140->141 141->14 149 a1fc8d-a1fca2 call a535af 144->149 150 a1fc7f-a1fc81 144->150 145->144 146 a1fc5b-a1fc60 145->146 146->14 154 a1fd42-a1fd44 149->154 155 a1fca8-a1fcc5 CompareStringW 149->155 150->149 151 a1fc83-a1fc88 150->151 151->14 158 a1fd46-a1fd4d 154->158 159 a1fd4f-a1fd51 154->159 156 a1fcc7-a1fccd 155->156 157 a1fccf-a1fce4 CompareStringW 155->157 160 a1fd10-a1fd15 156->160 161 a1fcf2-a1fd07 CompareStringW 157->161 162 a1fce6-a1fcf0 157->162 158->159 163 a1fd53-a1fd58 159->163 164 a1fd5d-a1fd75 call a537bb 159->164 160->159 166 a1fd17-a1fd2f call a138ba 161->166 167 a1fd09 161->167 162->160 163->14 164->61 170 a1fd77-a1fd79 164->170 166->43 167->160 172 a1fd85 170->172 173 a1fd7b-a1fd80 170->173 172->61 173->14
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: StringVariant$AllocClearFreeInit
                                  • String ID: AboutUrl$Arp$Classification$Comments$Contact$Department$DisableModify$DisableRemove$DisplayName$DisplayVersion$ExecutableName$Failed to get @AboutUrl.$Failed to get @Classification.$Failed to get @Comments.$Failed to get @Contact.$Failed to get @Department.$Failed to get @DisableModify.$Failed to get @DisableRemove.$Failed to get @DisplayName.$Failed to get @DisplayVersion.$Failed to get @ExecutableName.$Failed to get @HelpLink.$Failed to get @HelpTelephone.$Failed to get @Id.$Failed to get @Manufacturer.$Failed to get @Name.$Failed to get @ParentDisplayName.$Failed to get @PerMachine.$Failed to get @ProductFamily.$Failed to get @ProviderKey.$Failed to get @Publisher.$Failed to get @Register.$Failed to get @Tag.$Failed to get @UpdateUrl.$Failed to get @Version.$Failed to parse @Version: %ls$Failed to parse related bundles$Failed to parse software tag.$Failed to select ARP node.$Failed to select Update node.$Failed to select registration node.$Failed to set registration paths.$HelpLink$HelpTelephone$Invalid modify disabled type: %ls$Manufacturer$Name$ParentDisplayName$PerMachine$ProductFamily$ProviderKey$Publisher$Register$Registration$Tag$Update$UpdateUrl$Version$button$c:\agent\_work\79\s\src\burn\engine\registration.cpp$yes$=
                                  • API String ID: 760788290-1495693619
                                  • Opcode ID: cb43c3b280abe434056baf53f2b67b68355bce2ed0b6470f2a44220e5eccbc24
                                  • Instruction ID: 101a300ab260cc90ef00a76eae6f06b4b19666cbef3f90565dcf0a67a12d7f40
                                  • Opcode Fuzzy Hash: cb43c3b280abe434056baf53f2b67b68355bce2ed0b6470f2a44220e5eccbc24
                                  • Instruction Fuzzy Hash: 50E1E233E446A5BECF22A664CD42EFEBA74BB00751F190A31FC11F72A1D7709E956680

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 174 a1b45a-a1b4cf call a3f620 * 2 179 a1b4d1-a1b4db GetLastError 174->179 180 a1b507-a1b50d 174->180 181 a1b4e8 179->181 182 a1b4dd-a1b4e6 179->182 183 a1b511-a1b523 SetFilePointerEx 180->183 184 a1b50f 180->184 185 a1b4ea 181->185 186 a1b4ef-a1b4fc call a138ba 181->186 182->181 187 a1b525-a1b52f GetLastError 183->187 188 a1b557-a1b571 ReadFile 183->188 184->183 185->186 203 a1b501-a1b502 186->203 192 a1b531-a1b53a 187->192 193 a1b53c 187->193 189 a1b573-a1b57d GetLastError 188->189 190 a1b5a8-a1b5af 188->190 194 a1b58a 189->194 195 a1b57f-a1b588 189->195 197 a1b5b5-a1b5be 190->197 198 a1bba6-a1bbba call a138ba 190->198 192->193 199 a1b543-a1b555 call a138ba 193->199 200 a1b53e 193->200 201 a1b591-a1b5a3 call a138ba 194->201 202 a1b58c 194->202 195->194 197->198 205 a1b5c4-a1b5d4 SetFilePointerEx 197->205 216 a1bbbf 198->216 199->203 200->199 201->203 202->201 209 a1bbc0-a1bbc6 call a5055b 203->209 211 a1b5d6-a1b5e0 GetLastError 205->211 212 a1b60b-a1b623 ReadFile 205->212 231 a1bbc7-a1bbd7 call a3dd3f 209->231 218 a1b5e2-a1b5eb 211->218 219 a1b5ed 211->219 213 a1b625-a1b62f GetLastError 212->213 214 a1b65a-a1b661 212->214 220 a1b631-a1b63a 213->220 221 a1b63c 213->221 223 a1b667-a1b671 214->223 224 a1bb8b-a1bba4 call a138ba 214->224 216->209 218->219 225 a1b5f4-a1b601 call a138ba 219->225 226 a1b5ef 219->226 220->221 229 a1b643-a1b650 call a138ba 221->229 230 a1b63e 221->230 223->224 232 a1b677-a1b69a SetFilePointerEx 223->232 224->216 225->212 226->225 229->214 230->229 233 a1b6d1-a1b6e9 ReadFile 232->233 234 a1b69c-a1b6a6 GetLastError 232->234 242 a1b720-a1b738 ReadFile 233->242 243 a1b6eb-a1b6f5 GetLastError 233->243 240 a1b6b3 234->240 241 a1b6a8-a1b6b1 234->241 247 a1b6b5 240->247 248 a1b6ba-a1b6c7 call a138ba 240->248 241->240 245 a1b73a-a1b744 GetLastError 242->245 246 a1b76f-a1b78a SetFilePointerEx 242->246 249 a1b702 243->249 250 a1b6f7-a1b700 243->250 251 a1b751 245->251 252 a1b746-a1b74f 245->252 254 a1b7c4-a1b7e3 ReadFile 246->254 255 a1b78c-a1b796 GetLastError 246->255 247->248 248->233 256 a1b704 249->256 257 a1b709-a1b716 call a138ba 249->257 250->249 260 a1b753 251->260 261 a1b758-a1b765 call a138ba 251->261 252->251 258 a1b7e9-a1b7eb 254->258 259 a1bb4c-a1bb56 GetLastError 254->259 263 a1b7a3 255->263 264 a1b798-a1b7a1 255->264 256->257 257->242 266 a1b7ec-a1b7f3 258->266 268 a1bb63 259->268 269 a1bb58-a1bb61 259->269 260->261 261->246 270 a1b7a5 263->270 271 a1b7aa-a1b7ba call a138ba 263->271 264->263 274 a1bb27-a1bb44 call a138ba 266->274 275 a1b7f9-a1b805 266->275 277 a1bb65 268->277 278 a1bb6a-a1bb80 call a138ba 268->278 269->268 270->271 271->254 290 a1bb49-a1bb4a 274->290 281 a1b810-a1b819 275->281 282 a1b807-a1b80e 275->282 277->278 289 a1bb81-a1bb89 call a5055b 278->289 287 a1baea-a1bb01 call a138ba 281->287 288 a1b81f-a1b845 ReadFile 281->288 282->281 286 a1b853-a1b85a 282->286 292 a1b883-a1b89a call a139df 286->292 293 a1b85c-a1b87e call a138ba 286->293 302 a1bb06-a1bb0c call a5055b 287->302 288->259 291 a1b84b-a1b851 288->291 289->231 290->289 291->266 303 a1b89c-a1b8b9 call a138ba 292->303 304 a1b8be-a1b8d3 SetFilePointerEx 292->304 293->290 310 a1bb12-a1bb13 302->310 303->209 308 a1b913-a1b938 ReadFile 304->308 309 a1b8d5-a1b8df GetLastError 304->309 311 a1b93a-a1b944 GetLastError 308->311 312 a1b96f-a1b97b 308->312 314 a1b8e1-a1b8ea 309->314 315 a1b8ec 309->315 316 a1bb14-a1bb16 310->316 317 a1b951 311->317 318 a1b946-a1b94f 311->318 319 a1b97d-a1b999 call a138ba 312->319 320 a1b99e-a1b9a2 312->320 314->315 321 a1b8f3-a1b903 call a138ba 315->321 322 a1b8ee 315->322 316->231 323 a1bb1c-a1bb22 call a13aa4 316->323 324 a1b953 317->324 325 a1b958-a1b96d call a138ba 317->325 318->317 319->302 328 a1b9a4-a1b9d8 call a138ba call a5055b 320->328 329 a1b9dd-a1b9f0 call a54c76 320->329 339 a1b908-a1b90e call a5055b 321->339 322->321 323->231 324->325 325->339 328->316 342 a1b9f2-a1b9f7 329->342 343 a1b9fc-a1ba06 329->343 339->310 342->339 346 a1ba10-a1ba18 343->346 347 a1ba08-a1ba0e 343->347 350 a1ba24-a1ba27 346->350 351 a1ba1a-a1ba22 346->351 349 a1ba29-a1ba89 call a139df 347->349 354 a1ba8b-a1baa7 call a138ba 349->354 355 a1baad-a1bace call a3eb20 call a1b1d7 349->355 350->349 351->349 354->355 355->316 362 a1bad0-a1bae0 call a138ba 355->362 362->287
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B4D1
                                  • SetFilePointerEx.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B51F
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B525
                                  • ReadFile.KERNELBASE(00000000,00A144B0,00000040,?,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B56D
                                  • GetLastError.KERNEL32(?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B573
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B5D0
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B5D6
                                  • ReadFile.KERNELBASE(00000000,?,00000018,00000040,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B61F
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B625
                                  • SetFilePointerEx.KERNELBASE(00000000,-00000098,00000000,00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B696
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B69C
                                  • ReadFile.KERNEL32(00000000,?,00000004,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B6E5
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B6EB
                                  • ReadFile.KERNEL32(00000000,?,00000004,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B734
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B73A
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B786
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B78C
                                    • Part of subcall function 00A139DF: GetProcessHeap.KERNEL32(?,?,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F0
                                    • Part of subcall function 00A139DF: RtlAllocateHeap.NTDLL(00000000,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F7
                                  • ReadFile.KERNEL32(00000000,?,00000028,00000018,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B7DF
                                  • ReadFile.KERNEL32(00000000,?,00000028,00000028,00000000,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B841
                                  • SetFilePointerEx.KERNELBASE(00000000,?,00000000,00000000,00000000,00000034,00000001,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B8CB
                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B8D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: File$ErrorLast$Read$Pointer$Heap$AllocateProcess
                                  • String ID: ($.wix$4$Failed to allocate buffer for section info.$Failed to allocate memory for container sizes.$Failed to find Burn section.$Failed to find valid DOS image header in buffer.$Failed to find valid NT image header in buffer.$Failed to get total size of bundle.$Failed to open handle to engine process path.$Failed to read DOS header.$Failed to read NT header.$Failed to read complete image section header, index: %u$Failed to read complete section info.$Failed to read image section header, index: %u$Failed to read section info, data to short: %u$Failed to read section info, unsupported version: %08x$Failed to read section info.$Failed to read signature offset.$Failed to read signature size.$Failed to seek past optional headers.$Failed to seek to NT header.$Failed to seek to section info.$Failed to seek to start of file.$PE$PE Header from file didn't match PE Header in memory.$_`AB$burn$c:\agent\_work\79\s\src\burn\engine\section.cpp
                                  • API String ID: 3411815225-3099757939
                                  • Opcode ID: 73a1ef517262cf1973cb322aecefd9f7230cf67197cf9061e6ee9a0533b24c2c
                                  • Instruction ID: 18b42ee4217bd76a9ea47734b678da8e66873919f2f867fe1a23d99857c6b08a
                                  • Opcode Fuzzy Hash: 73a1ef517262cf1973cb322aecefd9f7230cf67197cf9061e6ee9a0533b24c2c
                                  • Instruction Fuzzy Hash: B612C276A50225BBEB20DB558D46FEA7AA4BF00B12F0141A5FD05BB280E7749D84CBB1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 365 a1cd76-a1cda2 call a53bd5 368 a1cda4 365->368 369 a1cdb6-a1cdc7 365->369 370 a1cda9-a1cdb1 call a5055b 368->370 374 a1cdd0-a1cdd5 369->374 375 a1cdc9-a1cdce 369->375 376 a1d10b-a1d110 370->376 374->376 377 a1cddb-a1cdee call a139df 374->377 375->370 379 a1d112-a1d114 376->379 380 a1d118-a1d11d 376->380 384 a1cdf0-a1ce0f call a138ba call a5055b 377->384 385 a1ce14-a1ce21 377->385 379->380 381 a1d125-a1d129 380->381 382 a1d11f-a1d121 380->382 386 a1d133-a1d137 381->386 387 a1d12b-a1d12e call a12762 381->387 382->381 397 a1d10a 384->397 390 a1d107 385->390 391 a1ce27-a1ce29 385->391 387->386 394 a1d109 390->394 393 a1ce2c-a1ce42 call a53b34 391->393 400 a1ce48-a1ce5a call a535af 393->400 401 a1d1df 393->401 394->397 397->376 406 a1ce60-a1ce6c call a535af 400->406 407 a1d1d8-a1d1dd 400->407 403 a1d1e4-a1d1ec call a5055b 401->403 403->394 410 a1ce71-a1ce75 406->410 407->403 411 a1d1d1-a1d1d6 410->411 412 a1ce7b-a1ce90 call a535af 410->412 411->403 415 a1ce96-a1ceb1 CompareStringW 412->415 416 a1d1ca-a1d1cf 412->416 417 a1ceb3-a1ceba 415->417 418 a1cebc-a1ced1 CompareStringW 415->418 416->403 419 a1cefa-a1cefe 417->419 420 a1ced3-a1ced6 418->420 421 a1ced8-a1ceed CompareStringW 418->421 424 a1cf00-a1cf19 call a535af 419->424 425 a1cf42-a1cf5b call a537bb 419->425 420->419 422 a1cef3 421->422 423 a1d1af-a1d1b7 421->423 422->419 427 a1d1bc-a1d1c5 call a5055b 423->427 432 a1cf21-a1cf23 424->432 433 a1cf1b-a1cf1f 424->433 434 a1cf65-a1cf7e call a535af 425->434 435 a1cf5d-a1cf5f 425->435 427->394 437 a1d144-a1d149 432->437 438 a1cf29-a1cf3c call a1c1d4 432->438 433->425 433->432 444 a1cf80-a1cf84 434->444 445 a1cf86-a1cf88 434->445 435->434 439 a1d14e-a1d153 435->439 437->403 438->425 446 a1d13a-a1d142 438->446 439->403 444->445 447 a1cf8e-a1cfa7 call a535af 444->447 445->447 448 a1d1a8-a1d1ad 445->448 446->427 451 a1cfa9-a1cfad 447->451 452 a1cfaf-a1cfb1 447->452 448->403 451->452 453 a1cfb7-a1cfd0 call a535af 451->453 452->453 454 a1d1a1-a1d1a6 452->454 457 a1cff2-a1d00b call a535af 453->457 458 a1cfd2-a1cfd4 453->458 454->403 465 a1d00d-a1d00f 457->465 466 a1d02f-a1d048 call a535af 457->466 459 a1d162-a1d167 458->459 460 a1cfda-a1cfec call a12b03 458->460 459->403 460->457 468 a1d158-a1d15d 460->468 469 a1d170-a1d175 465->469 470 a1d015-a1d029 call a12108 465->470 474 a1d04a-a1d04c 466->474 475 a1d06c-a1d081 call a535af 466->475 468->403 469->403 470->466 476 a1d169-a1d16e 470->476 477 a1d052-a1d066 call a12108 474->477 478 a1d17e-a1d183 474->478 483 a1d087-a1d09b call a12108 475->483 484 a1d19a-a1d19f 475->484 476->403 477->475 485 a1d177-a1d17c 477->485 478->403 488 a1d0a1-a1d0ba call a535af 483->488 489 a1d193-a1d198 483->489 484->403 485->403 492 a1d0dd-a1d0e2 488->492 493 a1d0bc-a1d0be 488->493 489->403 496 a1d0e4-a1d0ea 492->496 497 a1d0ee-a1d101 492->497 494 a1d0c4-a1d0d7 call a1bc01 493->494 495 a1d18c-a1d191 493->495 494->492 501 a1d185-a1d18a 494->501 495->403 496->497 497->390 497->393 501->403
                                  APIs
                                    • Part of subcall function 00A139DF: GetProcessHeap.KERNEL32(?,?,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F0
                                    • Part of subcall function 00A139DF: RtlAllocateHeap.NTDLL(00000000,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F7
                                  • CompareStringW.KERNEL32(0000007F,00000000,00000000,000000FF,download,000000FF,00000000,Packaging,00000000,00000000,FilePath,00A1549A,00000000,00A5CB64,00A15482,00000000), ref: 00A1CEAC
                                  Strings
                                  • Failed to get @CertificateRootPublicKeyIdentifier., xrefs: 00A1D170
                                  • Failed to get next node., xrefs: 00A1D1DF
                                  • c:\agent\_work\79\s\src\burn\engine\payload.cpp, xrefs: 00A1CDF8
                                  • Failed to get payload node count., xrefs: 00A1CDC9
                                  • Payload, xrefs: 00A1CD91
                                  • Failed to get @Container., xrefs: 00A1D144
                                  • Packaging, xrefs: 00A1CE7F
                                  • Failed to get @Catalog., xrefs: 00A1D18C
                                  • CertificateRootThumbprint, xrefs: 00A1D033
                                  • Failed to get @DownloadUrl., xrefs: 00A1D1A1
                                  • Failed to select payload nodes., xrefs: 00A1CDA4
                                  • Failed to get @Hash., xrefs: 00A1D19A
                                  • external, xrefs: 00A1CEDA
                                  • Failed to hex decode the Payload/@Hash., xrefs: 00A1D193
                                  • FileSize, xrefs: 00A1CFBB
                                  • Failed to get @Id., xrefs: 00A1D1D8
                                  • Failed to get @Packaging., xrefs: 00A1D1CA
                                  • Failed to get @LayoutOnly., xrefs: 00A1D14E
                                  • Failed to get @FilePath., xrefs: 00A1D1D1
                                  • CertificateRootPublicKeyIdentifier, xrefs: 00A1CFF6
                                  • FilePath, xrefs: 00A1CE64
                                  • Failed to get @SourcePath., xrefs: 00A1D1A8
                                  • Failed to get @FileSize., xrefs: 00A1D162
                                  • Failed to hex decode @CertificateRootThumbprint., xrefs: 00A1D177
                                  • Failed to find catalog., xrefs: 00A1D185
                                  • Failed to parse @FileSize., xrefs: 00A1D158
                                  • Failed to to find container: %ls, xrefs: 00A1D13D
                                  • Hash, xrefs: 00A1D070
                                  • Invalid value for @Packaging: %ls, xrefs: 00A1D1B7
                                  • Failed to hex decode @CertificateRootPublicKeyIdentifier., xrefs: 00A1D169
                                  • Failed to get @CertificateRootThumbprint., xrefs: 00A1D17E
                                  • LayoutOnly, xrefs: 00A1CF46
                                  • SourcePath, xrefs: 00A1CF69
                                  • Failed to allocate memory for payload structs., xrefs: 00A1CE02
                                  • DownloadUrl, xrefs: 00A1CF92
                                  • Container, xrefs: 00A1CF04
                                  • Catalog, xrefs: 00A1D0A5
                                  • download, xrefs: 00A1CE9E
                                  • embedded, xrefs: 00A1CEBE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCompareProcessString
                                  • String ID: Catalog$CertificateRootPublicKeyIdentifier$CertificateRootThumbprint$Container$DownloadUrl$Failed to allocate memory for payload structs.$Failed to find catalog.$Failed to get @Catalog.$Failed to get @CertificateRootPublicKeyIdentifier.$Failed to get @CertificateRootThumbprint.$Failed to get @Container.$Failed to get @DownloadUrl.$Failed to get @FilePath.$Failed to get @FileSize.$Failed to get @Hash.$Failed to get @Id.$Failed to get @LayoutOnly.$Failed to get @Packaging.$Failed to get @SourcePath.$Failed to get next node.$Failed to get payload node count.$Failed to hex decode @CertificateRootPublicKeyIdentifier.$Failed to hex decode @CertificateRootThumbprint.$Failed to hex decode the Payload/@Hash.$Failed to parse @FileSize.$Failed to select payload nodes.$Failed to to find container: %ls$FilePath$FileSize$Hash$Invalid value for @Packaging: %ls$LayoutOnly$Packaging$Payload$SourcePath$c:\agent\_work\79\s\src\burn\engine\payload.cpp$download$embedded$external
                                  • API String ID: 1171520630-1473155156
                                  • Opcode ID: 2182b28b2ab26c0d27b4a148899ee17c6c1de82e3d87b4a093b96ab3c728bfd7
                                  • Instruction ID: 7079ecb20ab7e9a2cf3b30b2e8eecf008022687f932363f14ff3dab860f39a0c
                                  • Opcode Fuzzy Hash: 2182b28b2ab26c0d27b4a148899ee17c6c1de82e3d87b4a093b96ab3c728bfd7
                                  • Instruction Fuzzy Hash: 03C1C172981629BFCB11AB94CD02EEEBB75BB00B26F104675FD01BB190D770EE949790

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 502 a30ae0-a30af7 SetEvent 503 a30b39-a30b47 WaitForSingleObject 502->503 504 a30af9-a30b03 GetLastError 502->504 505 a30b49-a30b53 GetLastError 503->505 506 a30b7e-a30b89 ResetEvent 503->506 507 a30b10 504->507 508 a30b05-a30b0e 504->508 509 a30b60 505->509 510 a30b55-a30b5e 505->510 511 a30bc3-a30bc9 506->511 512 a30b8b-a30b95 GetLastError 506->512 513 a30b12 507->513 514 a30b17-a30b27 call a138ba 507->514 508->507 518 a30b62 509->518 519 a30b67-a30b7c call a138ba 509->519 510->509 516 a30bcb-a30bce 511->516 517 a30bfc-a30c15 call a122b5 511->517 520 a30ba2 512->520 521 a30b97-a30ba0 512->521 513->514 529 a30b2c-a30b34 call a5055b 514->529 525 a30bf2-a30bf7 516->525 526 a30bd0-a30bed call a138ba 516->526 538 a30c17-a30c28 call a5055b 517->538 539 a30c2d-a30c38 SetEvent 517->539 518->519 519->529 523 a30ba4 520->523 524 a30ba9-a30bbe call a138ba 520->524 521->520 523->524 524->529 532 a30eb2-a30eb7 525->532 545 a30ea8-a30eae call a5055b 526->545 529->532 540 a30eb9 532->540 541 a30ebc-a30ec2 532->541 553 a30eaf-a30eb1 538->553 542 a30c72-a30c80 WaitForSingleObject 539->542 543 a30c3a-a30c44 GetLastError 539->543 540->541 550 a30c82-a30c8c GetLastError 542->550 551 a30cba-a30cc5 ResetEvent 542->551 548 a30c51 543->548 549 a30c46-a30c4f 543->549 545->553 556 a30c53 548->556 557 a30c58-a30c6d call a138ba 548->557 549->548 558 a30c99 550->558 559 a30c8e-a30c97 550->559 554 a30cc7-a30cd1 GetLastError 551->554 555 a30cff-a30d06 551->555 553->532 561 a30cd3-a30cdc 554->561 562 a30cde 554->562 564 a30d75-a30d98 CreateFileW 555->564 565 a30d08-a30d0b 555->565 556->557 581 a30ea7 557->581 566 a30ca0-a30cb5 call a138ba 558->566 567 a30c9b 558->567 559->558 561->562 568 a30ce0 562->568 569 a30ce5-a30cfa call a138ba 562->569 571 a30dd5-a30de9 SetFilePointerEx 564->571 572 a30d9a-a30da4 GetLastError 564->572 573 a30d38-a30d3c call a139df 565->573 574 a30d0d-a30d10 565->574 566->581 567->566 568->569 569->581 577 a30e23-a30e2e SetEndOfFile 571->577 578 a30deb-a30df5 GetLastError 571->578 582 a30db1 572->582 583 a30da6-a30daf 572->583 588 a30d41-a30d46 573->588 584 a30d12-a30d15 574->584 585 a30d31-a30d33 574->585 590 a30e30-a30e3a GetLastError 577->590 591 a30e65-a30e72 SetFilePointerEx 577->591 586 a30e02 578->586 587 a30df7-a30e00 578->587 581->545 592 a30db3 582->592 593 a30db8-a30dcb call a138ba 582->593 583->582 594 a30d27-a30d2c 584->594 595 a30d17-a30d1d 584->595 585->532 599 a30e04 586->599 600 a30e09-a30e1e call a138ba 586->600 587->586 597 a30d67-a30d70 588->597 598 a30d48-a30d62 call a138ba 588->598 601 a30e47 590->601 602 a30e3c-a30e45 590->602 591->553 596 a30e74-a30e7e GetLastError 591->596 592->593 593->571 594->553 595->594 604 a30e80-a30e89 596->604 605 a30e8b 596->605 597->553 598->581 599->600 600->581 608 a30e49 601->608 609 a30e4e-a30e63 call a138ba 601->609 602->601 604->605 611 a30e92-a30ea2 call a138ba 605->611 612 a30e8d 605->612 608->609 609->581 611->581 612->611
                                  APIs
                                  • SetEvent.KERNEL32(?,?,?,?,?,00A30690,?,?), ref: 00A30AEF
                                  • GetLastError.KERNEL32(?,?,?,?,00A30690,?,?), ref: 00A30AF9
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,00A30690,?,?), ref: 00A30B3E
                                  • GetLastError.KERNEL32(?,?,?,?,00A30690,?,?), ref: 00A30B49
                                  • ResetEvent.KERNEL32(?,?,?,?,?,00A30690,?,?), ref: 00A30B81
                                  • GetLastError.KERNEL32(?,?,?,?,00A30690,?,?), ref: 00A30B8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Event$ObjectResetSingleWait
                                  • String ID: Failed to allocate buffer for stream.$Failed to copy stream name: %ls$Failed to create file: %ls$Failed to reset begin operation event.$Failed to set end of file.$Failed to set file pointer to beginning of file.$Failed to set file pointer to end of file.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 1865021742-2724965156
                                  • Opcode ID: 295198a882beea9d07313b0c50733feb9643a13bf0fa34b49b8d4ce4d924fa00
                                  • Instruction ID: 5616a8b2ef049f6ca9da54aa921c17d59629b79da9e08fac6c5c561727b6f873
                                  • Opcode Fuzzy Hash: 295198a882beea9d07313b0c50733feb9643a13bf0fa34b49b8d4ce4d924fa00
                                  • Instruction Fuzzy Hash: 15912833A90736BBE3205BA99E1AF6BA964BF10B63F110610BE51BB6D0D764DC00C5E1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 619 a151d2-a15280 call a3f620 * 2 GetModuleHandleW call a50816 call a509ca call a11206 630 a15282 619->630 631 a15296-a152a7 call a14326 619->631 632 a15287-a15291 call a5055b 630->632 637 a152b0-a152cc call a15653 CoInitializeEx 631->637 638 a152a9-a152ae 631->638 639 a15511-a15518 632->639 644 a152d5-a152e1 call a4ffdc 637->644 645 a152ce-a152d3 637->645 638->632 642 a15525-a15527 639->642 643 a1551a-a15520 call a12762 639->643 647 a15537-a15555 call a1d7d7 call a2a7ca call a2aa14 642->647 648 a15529-a15530 642->648 643->642 655 a152e3 644->655 656 a152f5-a15304 call a51112 644->656 645->632 668 a15583-a15596 call a14fe1 647->668 669 a15557-a1555f 647->669 648->647 649 a15532 call a24174 648->649 649->647 658 a152e8-a152f0 call a5055b 655->658 666 a15306-a1530b 656->666 667 a1530d-a1531c call a52dba 656->667 658->639 666->658 674 a15325-a15334 call a53819 667->674 675 a1531e-a15323 667->675 679 a15598 call a53ce1 668->679 680 a1559d-a155a4 668->680 669->668 672 a15561-a15564 669->672 672->668 677 a15566-a15581 call a242d4 call a1563d 672->677 687 a15336-a1533b 674->687 688 a1533d-a1535c GetVersionExW 674->688 675->658 677->668 679->680 684 a155a6 call a531c0 680->684 685 a155ab-a155b2 680->685 684->685 690 a155b4 call a5175e 685->690 691 a155b9-a155c0 685->691 687->658 693 a15396-a153db call a134c4 call a1563d 688->693 694 a1535e-a15368 GetLastError 688->694 690->691 696 a155c2 call a500eb 691->696 697 a155c7-a155c9 691->697 719 a153dd-a153e8 call a12762 693->719 720 a153ee-a153fe call a27430 693->720 699 a15375 694->699 700 a1536a-a15373 694->700 696->697 703 a155d1-a155d8 697->703 704 a155cb CoUninitialize 697->704 707 a15377 699->707 708 a1537c-a15391 call a138ba 699->708 700->699 705 a15613-a1561c call a50439 703->705 706 a155da-a155dc 703->706 704->703 722 a15623-a1563a call a50b1c call a3dd3f 705->722 723 a1561e call a14639 705->723 711 a155e2-a155e8 706->711 712 a155de-a155e0 706->712 707->708 708->658 716 a155ea-a15603 call a23d09 call a1563d 711->716 712->716 716->705 738 a15605-a15612 call a1563d 716->738 719->720 734 a15400 720->734 735 a1540a-a15413 720->735 723->722 734->735 739 a15419-a1541c 735->739 740 a154db-a154f1 call a14d7a 735->740 738->705 743 a154b3-a154cf call a14b2a 739->743 744 a15422-a15425 739->744 751 a154f3 740->751 752 a154fd-a1550f 740->752 743->752 756 a154d1 743->756 748 a15427-a1542a 744->748 749 a1548b-a1549e call a14936 744->749 754 a15463-a1547f call a14acd 748->754 755 a1542c-a1542f 748->755 758 a154a3-a154a7 749->758 751->752 752->639 754->752 765 a15481 754->765 759 a15431-a15436 755->759 760 a15440-a15453 call a14cc9 755->760 756->740 758->752 763 a154a9 758->763 759->760 760->752 766 a15459 760->766 763->743 765->749 766->754
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A15254
                                    • Part of subcall function 00A50816: InitializeCriticalSection.KERNEL32(00A7C6EC,?,00A15260,00000000,?,?,?,?,?,?), ref: 00A5082D
                                    • Part of subcall function 00A11206: CommandLineToArgvW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000000,ignored ,00000000,?,00000000,?,?,?,00A1527C,00000000,?), ref: 00A11244
                                    • Part of subcall function 00A11206: GetLastError.KERNEL32(?,?,?,00A1527C,00000000,?,?,00000003,00000000,00000000,?,?,?,?,?,?), ref: 00A1124E
                                  • CoInitializeEx.COMBASE(00000000,00000000,?,?,00000000,?,?,00000003,00000000,00000000,?,?,?,?,?,?), ref: 00A152C2
                                    • Part of subcall function 00A51112: GetProcAddress.KERNEL32(RegDeleteKeyExW,AdvApi32.dll), ref: 00A51133
                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?), ref: 00A15354
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 00A1535E
                                  • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00A155CB
                                  Strings
                                  • 3.14.0.3910, xrefs: 00A153C1
                                  • Failed to initialize Cryputil., xrefs: 00A152E3
                                  • Failed to initialize XML util., xrefs: 00A15336
                                  • Failed to initialize Wiutil., xrefs: 00A1531E
                                  • Invalid run mode., xrefs: 00A15436
                                  • Failed to get OS info., xrefs: 00A1538C
                                  • Failed to run per-user mode., xrefs: 00A154D1
                                  • Failed to initialize engine state., xrefs: 00A152A9
                                  • =, xrefs: 00A15532
                                  • Failed to parse command line., xrefs: 00A15282
                                  • c:\agent\_work\79\s\src\burn\engine\engine.cpp, xrefs: 00A15382
                                  • Failed to run RunOnce mode., xrefs: 00A15459
                                  • Failed to run embedded mode., xrefs: 00A15481
                                  • Failed to initialize Regutil., xrefs: 00A15306
                                  • _`AB, xrefs: 00A151DB
                                  • Failed to run untrusted mode., xrefs: 00A154F3
                                  • Failed to initialize COM., xrefs: 00A152CE
                                  • Failed to run per-machine mode., xrefs: 00A154A9
                                  • Failed to initialize core., xrefs: 00A15400
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorInitializeLast$AddressArgvCommandCriticalHandleLineModuleProcSectionUninitializeVersion
                                  • String ID: 3.14.0.3910$Failed to get OS info.$Failed to initialize COM.$Failed to initialize Cryputil.$Failed to initialize Regutil.$Failed to initialize Wiutil.$Failed to initialize XML util.$Failed to initialize core.$Failed to initialize engine state.$Failed to parse command line.$Failed to run RunOnce mode.$Failed to run embedded mode.$Failed to run per-machine mode.$Failed to run per-user mode.$Failed to run untrusted mode.$Invalid run mode.$_`AB$c:\agent\_work\79\s\src\burn\engine\engine.cpp$=
                                  • API String ID: 3262001429-3747138455
                                  • Opcode ID: 7eaced785456e22062d83e0381839f78e5147a050533847a94ab5660c8469eb6
                                  • Instruction ID: 8b953a2f018df5c4d83b3638fc6d6b12de3b8d55adcdcd8f239ea0ebb34da545
                                  • Opcode Fuzzy Hash: 7eaced785456e22062d83e0381839f78e5147a050533847a94ab5660c8469eb6
                                  • Instruction Fuzzy Hash: BBB1A072D10A29EBDB21ABB8CD45BED76B9BF84752F040195FD08B6241DB709EC48F90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 767 a519f8-a51a98 call a3f620 * 6 InitializeSecurityDescriptor 780 a51aca-a51aeb CreateWellKnownSid 767->780 781 a51a9a-a51aa4 GetLastError 767->781 782 a51b10-a51b2b CreateWellKnownSid 780->782 783 a51aed-a51af7 GetLastError 780->783 784 a51aa6-a51aaf 781->784 785 a51ab1 781->785 788 a51b56-a51b71 CreateWellKnownSid 782->788 789 a51b2d-a51b37 GetLastError 782->789 786 a51b04 783->786 787 a51af9-a51b02 783->787 784->785 790 a51ab3 785->790 791 a51ab8-a51ab9 785->791 792 a51b06 786->792 793 a51b0b-a51b0e 786->793 787->786 796 a51b73-a51b7d GetLastError 788->796 797 a51b9c-a51bb7 CreateWellKnownSid 788->797 794 a51b44 789->794 795 a51b39-a51b42 789->795 790->791 798 a51abb-a51ac5 call a138ba 791->798 792->793 793->798 801 a51b46 794->801 802 a51b4b-a51b51 794->802 795->794 803 a51b7f-a51b88 796->803 804 a51b8a 796->804 799 a51be2-a51bfd CreateWellKnownSid 797->799 800 a51bb9-a51bc3 GetLastError 797->800 813 a51dff-a51e05 798->813 811 a51bff-a51c09 GetLastError 799->811 812 a51c28-a51cfa SetEntriesInAclA 799->812 809 a51bc5-a51bce 800->809 810 a51bd0 800->810 801->802 802->798 803->804 807 a51b91-a51b97 804->807 808 a51b8c 804->808 807->798 808->807 809->810 816 a51bd7-a51bd8 810->816 817 a51bd2 810->817 818 a51c16 811->818 819 a51c0b-a51c14 811->819 814 a51cfc 812->814 815 a51d1b-a51d32 SetSecurityDescriptorOwner 812->815 826 a51e07-a51e0d LocalFree 813->826 827 a51e13-a51e23 call a3dd3f 813->827 820 a51cfe-a51d07 814->820 821 a51d09 814->821 822 a51d34-a51d3e GetLastError 815->822 823 a51d5d-a51d74 SetSecurityDescriptorGroup 815->823 816->799 817->816 824 a51c1d-a51c1e 818->824 825 a51c18 818->825 819->818 820->821 831 a51d10-a51d11 821->831 832 a51d0b 821->832 833 a51d40-a51d49 822->833 834 a51d4b 822->834 828 a51d76-a51d80 GetLastError 823->828 829 a51d9f-a51db7 SetSecurityDescriptorDacl 823->829 824->812 825->824 826->827 835 a51d82-a51d8b 828->835 836 a51d8d 828->836 838 a51de2-a51dfd CoInitializeSecurity 829->838 839 a51db9-a51dc3 GetLastError 829->839 831->815 832->831 833->834 840 a51d52-a51d53 834->840 841 a51d4d 834->841 835->836 842 a51d94-a51d95 836->842 843 a51d8f 836->843 838->813 844 a51dc5-a51dce 839->844 845 a51dd0 839->845 840->823 841->840 842->829 843->842 844->845 846 a51dd7-a51dd8 845->846 847 a51dd2 845->847 846->838 847->846
                                  APIs
                                  • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 00A51A90
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51A9A
                                  • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?), ref: 00A51AE7
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51AED
                                  • CreateWellKnownSid.ADVAPI32(00000017,00000000,?,?), ref: 00A51B27
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51B2D
                                  • CreateWellKnownSid.ADVAPI32(00000018,00000000,?,?), ref: 00A51B6D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51B73
                                  • CreateWellKnownSid.ADVAPI32(00000010,00000000,?,?), ref: 00A51BB3
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51BB9
                                  • CreateWellKnownSid.ADVAPI32(00000016,00000000,?,?), ref: 00A51BF9
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51BFF
                                  • SetEntriesInAclA.ADVAPI32(00000005,?,00000000,?), ref: 00A51CF0
                                  • SetSecurityDescriptorOwner.ADVAPI32(?,?,00000000), ref: 00A51D2A
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51D34
                                  • SetSecurityDescriptorGroup.ADVAPI32(?,?,00000000), ref: 00A51D6C
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51D76
                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A51DAF
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A51DB9
                                  • CoInitializeSecurity.COMBASE(?,000000FF,00000000,00000000,00000006,00000002,00000000,00003000,00000000), ref: 00A51DF7
                                  • LocalFree.KERNEL32(?), ref: 00A51E0D
                                  Strings
                                  • _`AB, xrefs: 00A51A01
                                  • c:\agent\_work\79\s\src\libs\dutil\srputil.cpp, xrefs: 00A51ABB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateKnownSecurityWell$Descriptor$Initialize$DaclEntriesFreeGroupLocalOwner
                                  • String ID: _`AB$c:\agent\_work\79\s\src\libs\dutil\srputil.cpp
                                  • API String ID: 267631441-1440381988
                                  • Opcode ID: 575242d49372632e93f4c2cb5a89a688b79a83958b8f3b8332486ff6d68228cd
                                  • Instruction ID: 08f8a483e117c7f97d5211b1c92b9352e7db71806672542f58aa31307164d8e1
                                  • Opcode Fuzzy Hash: 575242d49372632e93f4c2cb5a89a688b79a83958b8f3b8332486ff6d68228cd
                                  • Instruction Fuzzy Hash: 9BC153B6D41239ABDB20CF958D48BEFFAB8BF44751F0141AAED04B7250E7709D448EA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 848 a27430-a27475 call a3f620 call a1762d 853 a27481-a27492 call a1c3ca 848->853 854 a27477-a2747c 848->854 860 a27494-a27499 853->860 861 a2749e-a274af call a1c231 853->861 855 a2771a-a27721 call a5055b 854->855 862 a27722-a27727 855->862 860->855 870 a274b1-a274b6 861->870 871 a274bb-a274d0 call a1c489 861->871 864 a27729-a2772a call a12762 862->864 865 a2772f-a27733 862->865 864->865 868 a27735-a27738 call a12762 865->868 869 a2773d-a27742 865->869 868->869 873 a27744-a27745 call a12762 869->873 874 a2774a-a27757 call a1c180 869->874 870->855 880 a274d2-a274d7 871->880 881 a274dc-a274ec call a3bd12 871->881 873->874 882 a27761-a27765 874->882 883 a27759-a2775c call a12762 874->883 880->855 889 a274f8-a2756b call a25bab 881->889 890 a274ee-a274f3 881->890 887 a27767-a2776a call a12762 882->887 888 a2776f-a27773 882->888 883->882 887->888 892 a27775-a27778 call a13aa4 888->892 893 a2777d-a27783 888->893 897 a27577-a2757c 889->897 898 a2756d-a27572 889->898 890->855 892->893 899 a27583-a2759e call a1563d GetCurrentProcess call a50b93 897->899 900 a2757e 897->900 898->855 904 a275a3-a275ba call a18274 899->904 900->899 907 a275d4-a275eb call a18274 904->907 908 a275bc 904->908 914 a275f4-a275f9 907->914 915 a275ed-a275f2 907->915 909 a275c1-a275cf call a5055b 908->909 909->862 916 a27655-a2765a 914->916 917 a275fb-a2760d call a1821a 914->917 915->909 918 a2767a-a27683 916->918 919 a2765c-a2766e call a1821a 916->919 928 a27619-a27629 call a13533 917->928 929 a2760f-a27614 917->929 922 a27685-a27688 918->922 923 a2768f-a276a3 call a2a408 918->923 919->918 932 a27670-a27675 919->932 922->923 927 a2768a-a2768d 922->927 935 a276a5-a276aa 923->935 936 a276ac 923->936 927->923 933 a276b2-a276b5 927->933 939 a27635-a27649 call a1821a 928->939 940 a2762b-a27630 928->940 929->855 932->855 937 a276b7-a276ba 933->937 938 a276bc-a276d2 call a1d54c 933->938 935->855 936->933 937->862 937->938 945 a276d4-a276d9 938->945 946 a276db-a276f3 call a1cb82 938->946 939->916 947 a2764b-a27650 939->947 940->855 945->855 950 a276f5-a276fa 946->950 951 a276fc-a27713 call a1c8a5 946->951 947->855 950->855 951->862 954 a27715 951->954 954->855
                                  Strings
                                  • Failed to set source process folder variable., xrefs: 00A2764B
                                  • Failed to get unique temporary folder for bootstrapper application., xrefs: 00A276D4
                                  • Failed to extract bootstrapper application payloads., xrefs: 00A276F5
                                  • Failed to get source process folder from path., xrefs: 00A2762B
                                  • Failed to set original source variable., xrefs: 00A27670
                                  • Failed to initialize variables., xrefs: 00A27477
                                  • WixBundleOriginalSource, xrefs: 00A2765F
                                  • Failed to set source process path variable., xrefs: 00A2760F
                                  • Failed to parse command line., xrefs: 00A2756D
                                  • Failed to overwrite the %ls built-in variable., xrefs: 00A275C1
                                  • Failed to open manifest stream., xrefs: 00A274B1
                                  • Failed to load catalog files., xrefs: 00A27715
                                  • WixBundleSourceProcessPath, xrefs: 00A275FE
                                  • Failed to get manifest stream from container., xrefs: 00A274D2
                                  • Failed to initialize internal cache functionality., xrefs: 00A276A5
                                  • Failed to load manifest., xrefs: 00A274EE
                                  • WixBundleElevated, xrefs: 00A275AB, 00A275BC
                                  • WixBundleUILevel, xrefs: 00A275DC, 00A275ED
                                  • WixBundleSourceProcessFolder, xrefs: 00A2763A
                                  • Failed to open attached UX container., xrefs: 00A27494
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CriticalInitializeSection
                                  • String ID: Failed to extract bootstrapper application payloads.$Failed to get manifest stream from container.$Failed to get source process folder from path.$Failed to get unique temporary folder for bootstrapper application.$Failed to initialize internal cache functionality.$Failed to initialize variables.$Failed to load catalog files.$Failed to load manifest.$Failed to open attached UX container.$Failed to open manifest stream.$Failed to overwrite the %ls built-in variable.$Failed to parse command line.$Failed to set original source variable.$Failed to set source process folder variable.$Failed to set source process path variable.$WixBundleElevated$WixBundleOriginalSource$WixBundleSourceProcessFolder$WixBundleSourceProcessPath$WixBundleUILevel
                                  • API String ID: 32694325-1564579409
                                  • Opcode ID: 47bb3fd340ec927974ad5c041ee0ff2e8fd145fb1126b4a09ea754c4117e4cc1
                                  • Instruction ID: a697d1ce831efea628558621fd1a6a65f785ee2ac93b5844f68c3ce8cb040e0f
                                  • Opcode Fuzzy Hash: 47bb3fd340ec927974ad5c041ee0ff2e8fd145fb1126b4a09ea754c4117e4cc1
                                  • Instruction Fuzzy Hash: 02A17472E44A26BACB129AB8DD41EEFB77CBB14710F010636F915E7141E770EA448BA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 955 a24665-a246a1 GetCurrentProcessId ReadFile 956 a246a3-a246ad GetLastError 955->956 957 a246db-a246e5 955->957 960 a246ba 956->960 961 a246af-a246b8 956->961 958 a246e7-a246fe call a138ba 957->958 959 a24709-a24718 call a11fe0 957->959 969 a24703-a24704 958->969 970 a24724-a24735 ReadFile 959->970 971 a2471a-a2471f 959->971 964 a246c1-a246d6 call a138ba 960->964 965 a246bc 960->965 961->960 974 a24849 964->974 965->964 973 a2484a-a24850 call a5055b 969->973 975 a24737-a24741 GetLastError 970->975 976 a2476f-a24786 CompareStringW 970->976 971->974 991 a24851-a24855 973->991 974->973 980 a24743-a2474c 975->980 981 a2474e 975->981 977 a24788-a247a4 call a138ba 976->977 978 a247a9-a247ba ReadFile 976->978 977->969 983 a247f1-a247f8 978->983 984 a247bc-a247c6 GetLastError 978->984 980->981 986 a24750 981->986 987 a24755-a2476a call a138ba 981->987 992 a247fa-a247fd 983->992 993 a24868-a2486b 983->993 989 a247d3 984->989 990 a247c8-a247d1 984->990 986->987 987->974 995 a247d5 989->995 996 a247da-a247ef call a138ba 989->996 990->989 997 a24857-a2485a call a12762 991->997 998 a2485f-a24865 991->998 999 a247ff-a24814 WriteFile 992->999 993->999 1000 a2486d-a24884 call a138ba 993->1000 995->996 996->974 997->998 999->991 1005 a24816-a24820 GetLastError 999->1005 1006 a24822-a2482b 1005->1006 1007 a2482d 1005->1007 1006->1007 1010 a24834-a24844 call a138ba 1007->1010 1011 a2482f 1007->1011 1010->974 1011->1010
                                  APIs
                                  • GetCurrentProcessId.KERNEL32(?,8000FFFF,feclient.dll,?,00A24B78,00A5B4E8,?,feclient.dll,00000000,?,?), ref: 00A2467C
                                  • ReadFile.KERNELBASE(feclient.dll,feclient.dll,00000004,?,00000000,?,00A24B78,00A5B4E8,?,feclient.dll,00000000,?,?), ref: 00A2469D
                                  • GetLastError.KERNEL32(?,00A24B78,00A5B4E8,?,feclient.dll,00000000,?,?), ref: 00A246A3
                                  • ReadFile.KERNELBASE(feclient.dll,00000000,00A5B518,?,00000000,00000000,00A5B519,?,00A24B78,00A5B4E8,?,feclient.dll,00000000,?,?), ref: 00A24731
                                  • GetLastError.KERNEL32(?,00A24B78,00A5B4E8,?,feclient.dll,00000000,?,?), ref: 00A24737
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead$CurrentProcess
                                  • String ID: Failed to allocate buffer for verification secret.$Failed to inform parent process that child is running.$Failed to read size of verification secret from parent pipe.$Failed to read verification process id from parent pipe.$Failed to read verification secret from parent pipe.$Verification process id from parent does not match.$Verification secret from parent does not match.$Verification secret from parent is too big.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$feclient.dll$msasn1.dll
                                  • API String ID: 1233551569-195037519
                                  • Opcode ID: 09893c8d4eb92a6157903d9b02ed2248ddaf349af875867da8fe73e18f7cefce
                                  • Instruction ID: 1316e6fd882c57e54a0097e7e6d81ad88178f1ed3021af8aa9828214e0611738
                                  • Opcode Fuzzy Hash: 09893c8d4eb92a6157903d9b02ed2248ddaf349af875867da8fe73e18f7cefce
                                  • Instruction Fuzzy Hash: D151B336D90336B7E7219B99AD45FAFBA78BF09B11F110135BE20BB280D7749D0086E1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1119 a1762d-a17ee0 InitializeCriticalSection 1120 a17ee3-a17f07 call a1565e 1119->1120 1123 a17f14-a17f25 call a5055b 1120->1123 1124 a17f09-a17f10 1120->1124 1127 a17f28-a17f38 call a3dd3f 1123->1127 1124->1120 1125 a17f12 1124->1125 1125->1127
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(00A27471,00A153FA,00000000,00A15482), ref: 00A1764D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CriticalInitializeSection
                                  • String ID: #$$$'$0$Date$Failed to add built-in variable: %ls.$InstallerName$InstallerVersion$LogonUser$WixBundleAction$WixBundleActiveParent$WixBundleElevated$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$WixBundleForcedRestartPackage$WixBundleInstalled$WixBundleProviderKey$WixBundleSourceProcessFolder$WixBundleSourceProcessPath$WixBundleTag$WixBundleUILevel$WixBundleVersion$_`AB
                                  • API String ID: 32694325-332951141
                                  • Opcode ID: 28595a1553a9701e7f3479939b9c46ebc7da9127770ce796ff451388ce5250a0
                                  • Instruction ID: b2790c9ebc78e51966f26e29dda6591b6bc468ce5f62f9e0b420fe93cda74331
                                  • Opcode Fuzzy Hash: 28595a1553a9701e7f3479939b9c46ebc7da9127770ce796ff451388ce5250a0
                                  • Instruction Fuzzy Hash: 613244B0C117699FDB61CF5AC9887CDFAB5BB48315F9081EE960CAA214D7B00B89CF45

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1131 a30ec5-a30ef1 CoInitializeEx 1132 a30ef3-a30f00 call a5055b 1131->1132 1133 a30f05-a30f50 call a4f792 1131->1133 1140 a31168-a31178 call a3dd3f 1132->1140 1138 a30f52-a30f75 call a138ba call a5055b 1133->1138 1139 a30f7a-a30f9c call a4f7b3 1133->1139 1157 a31161-a31162 CoUninitialize 1138->1157 1148 a30fa2-a30faa 1139->1148 1149 a31056-a31061 SetEvent 1139->1149 1153 a30fb0-a30fb6 1148->1153 1154 a31159-a3115c call a4f7c3 1148->1154 1150 a31063-a3106d GetLastError 1149->1150 1151 a310a0-a310ae WaitForSingleObject 1149->1151 1155 a3107a 1150->1155 1156 a3106f-a31078 1150->1156 1160 a310e2-a310ed ResetEvent 1151->1160 1161 a310b0-a310ba GetLastError 1151->1161 1153->1154 1159 a30fbc-a30fc4 1153->1159 1154->1157 1162 a3107e-a3108e call a138ba 1155->1162 1163 a3107c 1155->1163 1156->1155 1157->1140 1166 a30fc6-a30fc8 1159->1166 1167 a3103e-a31051 call a5055b 1159->1167 1164 a31124-a3112a 1160->1164 1165 a310ef-a310f9 GetLastError 1160->1165 1168 a310c7 1161->1168 1169 a310bc-a310c5 1161->1169 1205 a31093-a3109b call a5055b 1162->1205 1163->1162 1178 a31154 1164->1178 1179 a3112c-a3112f 1164->1179 1173 a31106 1165->1173 1174 a310fb-a31104 1165->1174 1176 a30fdb-a30fde 1166->1176 1177 a30fca 1166->1177 1167->1154 1171 a310cb-a310e0 call a138ba 1168->1171 1172 a310c9 1168->1172 1169->1168 1171->1205 1172->1171 1184 a3110a-a3111f call a138ba 1173->1184 1185 a31108 1173->1185 1174->1173 1180 a30fe0 1176->1180 1181 a31038 1176->1181 1187 a30fd0-a30fd9 1177->1187 1188 a30fcc-a30fce 1177->1188 1178->1154 1189 a31131-a3114b call a138ba 1179->1189 1190 a31150-a31152 1179->1190 1192 a31003-a31008 1180->1192 1193 a31011-a31016 1180->1193 1194 a30fe7-a30fec 1180->1194 1195 a31026-a3102b 1180->1195 1196 a30ff5-a30ffa 1180->1196 1197 a31034-a31036 1180->1197 1198 a3100a-a3100f 1180->1198 1199 a31018-a3101d 1180->1199 1200 a3101f-a31024 1180->1200 1201 a30fee-a30ff3 1180->1201 1202 a3102d-a31032 1180->1202 1203 a30ffc-a31001 1180->1203 1207 a3103a-a3103c 1181->1207 1184->1205 1185->1184 1187->1207 1188->1207 1189->1205 1190->1154 1192->1167 1193->1167 1194->1167 1195->1167 1196->1167 1197->1167 1198->1167 1199->1167 1200->1167 1201->1167 1202->1167 1203->1167 1205->1154 1207->1149 1207->1167
                                  APIs
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 00A30EE7
                                  • CoUninitialize.COMBASE ref: 00A31162
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: InitializeUninitialize
                                  • String ID: <the>.cab$Failed to extract all files from container, erf: %d:%X:%d$Failed to initialize COM.$Failed to initialize cabinet.dll.$Failed to reset begin operation event.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$_`AB$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 3442037557-2317135288
                                  • Opcode ID: 1b80c04ba8f7ffa87f327e5ea5e0ccbac0c33d321fcdb009ad69c286a80c3475
                                  • Instruction ID: 03ad255119b81aed05c8a8c5530746d789afb1edf99343f041455cf9e983f698
                                  • Opcode Fuzzy Hash: 1b80c04ba8f7ffa87f327e5ea5e0ccbac0c33d321fcdb009ad69c286a80c3475
                                  • Instruction Fuzzy Hash: 53518D37E40262F7D73457648D05EAF7674BB41B62F220729FD01BF380D66A8D4186E2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1212 a14326-a1437d InitializeCriticalSection * 2 call a24c86 * 2 1217 a144a1-a144ab call a1b45a 1212->1217 1218 a14383 1212->1218 1223 a144b0-a144b4 1217->1223 1219 a14389-a14396 1218->1219 1221 a14494-a1449b 1219->1221 1222 a1439c-a143c8 lstrlenW * 2 CompareStringW 1219->1222 1221->1217 1221->1219 1224 a1441a-a14446 lstrlenW * 2 CompareStringW 1222->1224 1225 a143ca-a143ed lstrlenW 1222->1225 1226 a144c3-a144c9 1223->1226 1227 a144b6-a144c2 call a5055b 1223->1227 1224->1221 1228 a14448-a1446b lstrlenW 1224->1228 1229 a143f3-a143f8 1225->1229 1230 a144d7-a144ec call a138ba 1225->1230 1227->1226 1233 a14471-a14476 1228->1233 1234 a14503-a1451d call a138ba 1228->1234 1229->1230 1235 a143fe-a1440e call a12abf 1229->1235 1241 a144f1-a144f8 1230->1241 1233->1234 1238 a1447c-a1448c call a12abf 1233->1238 1234->1241 1247 a14414 1235->1247 1248 a144cc-a144d5 1235->1248 1238->1248 1250 a1448e 1238->1250 1245 a144f9-a14501 call a5055b 1241->1245 1245->1226 1247->1224 1248->1245 1250->1221
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,?,?,00A152A3,?,?,00000000,?,?), ref: 00A14352
                                  • InitializeCriticalSection.KERNEL32(000000D0,?,?,00A152A3,?,?,00000000,?,?), ref: 00A1435B
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,000004B8,000004A0,?,?,00A152A3,?,?,00000000,?,?), ref: 00A143A1
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,burn.filehandle.attached,00000000,?,?,00A152A3,?,?,00000000,?,?), ref: 00A143AB
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,00000000,?,?,00A152A3,?,?,00000000,?,?), ref: 00A143BF
                                  • lstrlenW.KERNEL32(burn.filehandle.attached,?,?,00A152A3,?,?,00000000,?,?), ref: 00A143CF
                                  • lstrlenW.KERNEL32(burn.filehandle.self,?,?,00A152A3,?,?,00000000,?,?), ref: 00A1441F
                                  • lstrlenW.KERNEL32(burn.filehandle.self,burn.filehandle.self,00000000,?,?,00A152A3,?,?,00000000,?,?), ref: 00A14429
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,00000000,?,?,00A152A3,?,?,00000000,?,?), ref: 00A1443D
                                  • lstrlenW.KERNEL32(burn.filehandle.self,?,?,00A152A3,?,?,00000000,?,?), ref: 00A1444D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: lstrlen$CompareCriticalInitializeSectionString
                                  • String ID: Failed to initialize engine section.$Failed to parse file handle: '%ls'$Missing required parameter for switch: %ls$burn.filehandle.attached$burn.filehandle.self$c:\agent\_work\79\s\src\burn\engine\engine.cpp
                                  • API String ID: 3039292287-348208256
                                  • Opcode ID: b560785e446a679877f67cba1449cb072b8a5311653be8dbe3f50052401b2921
                                  • Instruction ID: 372143fc1f2df6a494551039e31aaaba75e90d76e5ef6a4f6b086d2ff5509d73
                                  • Opcode Fuzzy Hash: b560785e446a679877f67cba1449cb072b8a5311653be8dbe3f50052401b2921
                                  • Instruction Fuzzy Hash: 9551A071A50615BFD720ABACDC86FDA7769FB18762F004115FA18DB290D770A990CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1252 a24aad-a24ad1 call a12022 1255 a24ad3-a24ae0 call a5055b 1252->1255 1256 a24ae5-a24aeb 1252->1256 1262 a24c70-a24c74 1255->1262 1258 a24aed-a24af3 1256->1258 1260 a24af5-a24b13 CreateFileW 1258->1260 1261 a24b48-a24b4a 1258->1261 1263 a24b41 1260->1263 1264 a24b15-a24b1f GetLastError 1260->1264 1265 a24b69-a24b7c call a24665 1261->1265 1266 a24b4c-a24b4d 1261->1266 1267 a24c76-a24c79 call a12762 1262->1267 1268 a24c7e-a24c83 1262->1268 1272 a24b43-a24b46 1263->1272 1270 a24b21-a24b24 1264->1270 1271 a24b2a-a24b30 1264->1271 1280 a24b8b-a24b8f 1265->1280 1281 a24b7e-a24b86 1265->1281 1273 a24b52-a24b64 call a138ba 1266->1273 1267->1268 1270->1271 1277 a24b32 1271->1277 1278 a24b37-a24b3f Sleep 1271->1278 1272->1258 1272->1261 1282 a24c66-a24c6c call a5055b 1273->1282 1277->1278 1278->1272 1283 a24b95-a24bac call a12022 1280->1283 1284 a24c1b-a24c2f OpenProcess 1280->1284 1281->1282 1286 a24c6f 1282->1286 1295 a24bc0-a24bdc CreateFileW 1283->1295 1296 a24bae-a24bbb call a5055b 1283->1296 1285 a24c31-a24c3b GetLastError 1284->1285 1284->1286 1290 a24c48 1285->1290 1291 a24c3d-a24c46 1285->1291 1286->1262 1293 a24c4a 1290->1293 1294 a24c4f-a24c61 call a138ba 1290->1294 1291->1290 1293->1294 1294->1282 1299 a24c07-a24c0c call a24665 1295->1299 1300 a24bde-a24be8 GetLastError 1295->1300 1296->1286 1308 a24c11-a24c15 1299->1308 1304 a24bf5 1300->1304 1305 a24bea-a24bf3 1300->1305 1306 a24bf7 1304->1306 1307 a24bfc-a24c02 1304->1307 1305->1304 1306->1307 1307->1273 1308->1281 1308->1284
                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?), ref: 00A24B07
                                  • GetLastError.KERNEL32 ref: 00A24B15
                                  • Sleep.KERNEL32(00000064), ref: 00A24B39
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CreateErrorFileLastSleep
                                  • String ID: Failed to allocate name of parent cache pipe.$Failed to allocate name of parent pipe.$Failed to open companion process with PID: %u$Failed to open parent pipe: %ls$Failed to verify parent pipe: %ls$\\.\pipe\%ls$\\.\pipe\%ls.Cache$c:\agent\_work\79\s\src\burn\engine\pipe.cpp$feclient.dll
                                  • API String ID: 408151869-21451366
                                  • Opcode ID: c75ccb5f7c2fe64d98a769b02b39520bff368a51186c5ed8de9ba9af86c42064
                                  • Instruction ID: f685c883a63d27a30393e26233caef874505a848625599be152f436d62690300
                                  • Opcode Fuzzy Hash: c75ccb5f7c2fe64d98a769b02b39520bff368a51186c5ed8de9ba9af86c42064
                                  • Instruction Fuzzy Hash: A841D537D81632BBE72257ACAE06F5ABA64BF08B21F114230FD00BB1D0D765DD409AE4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1309 a2e631-a2e669 1310 a2e68b-a2e6ac RegisterClassW 1309->1310 1311 a2e66b-a2e67f TlsSetValue 1309->1311 1313 a2e6e6-a2e71d CreateWindowExW 1310->1313 1314 a2e6ae-a2e6b8 GetLastError 1310->1314 1311->1310 1312 a2e681-a2e686 1311->1312 1315 a2e7b5-a2e7c9 UnregisterClassW 1312->1315 1318 a2e754-a2e768 SetEvent 1313->1318 1319 a2e71f-a2e729 GetLastError 1313->1319 1316 a2e6c5 1314->1316 1317 a2e6ba-a2e6c3 1314->1317 1321 a2e6c7 1316->1321 1322 a2e6cc-a2e6e1 call a138ba 1316->1322 1317->1316 1320 a2e794-a2e79f KiUserCallbackDispatcher 1318->1320 1323 a2e736 1319->1323 1324 a2e72b-a2e734 1319->1324 1325 a2e7a1 1320->1325 1326 a2e76a-a2e76d 1320->1326 1321->1322 1336 a2e7ad-a2e7b4 call a5055b 1322->1336 1328 a2e738 1323->1328 1329 a2e73d-a2e752 call a138ba 1323->1329 1324->1323 1325->1315 1330 a2e7a3-a2e7a8 1326->1330 1331 a2e76f-a2e77e IsDialogMessageW 1326->1331 1328->1329 1329->1336 1330->1336 1331->1320 1335 a2e780-a2e78e TranslateMessage DispatchMessageW 1331->1335 1335->1320 1336->1315
                                  APIs
                                  • TlsSetValue.KERNEL32(?,?), ref: 00A2E677
                                  • RegisterClassW.USER32(?), ref: 00A2E6A3
                                  • GetLastError.KERNEL32 ref: 00A2E6AE
                                  • CreateWindowExW.USER32(00000080,00A6A1B4,00000000,90000000,80000000,00000008,00000000,00000000,00000000,00000000,?,?), ref: 00A2E715
                                  • GetLastError.KERNEL32 ref: 00A2E71F
                                  • UnregisterClassW.USER32(WixBurnMessageWindow,?), ref: 00A2E7BD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ClassErrorLast$CreateRegisterUnregisterValueWindow
                                  • String ID: Failed to create window.$Failed to register window.$Unexpected return value from message pump.$WixBurnMessageWindow$c:\agent\_work\79\s\src\burn\engine\uithread.cpp
                                  • API String ID: 213125376-717246376
                                  • Opcode ID: 24d89f88015acf4aee64639a69c35bfcc795e342e54680797fb2ea0b75527643
                                  • Instruction ID: 92d8d097252e25e913ba5ea23292e60148c2bcc575f36d2fbb80ff4e57d8e201
                                  • Opcode Fuzzy Hash: 24d89f88015acf4aee64639a69c35bfcc795e342e54680797fb2ea0b75527643
                                  • Instruction Fuzzy Hash: E6418276900225BBDB20CF98ED48ADEBFB8FF05762F114175F905BA250E7309985CBA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1339 a1c252-a1c284 1340 a1c286-a1c2a4 CreateFileW 1339->1340 1341 a1c2ee-a1c30a GetCurrentProcess * 2 DuplicateHandle 1339->1341 1344 a1c346-a1c34c 1340->1344 1345 a1c2aa-a1c2b4 GetLastError 1340->1345 1342 a1c344 1341->1342 1343 a1c30c-a1c316 GetLastError 1341->1343 1342->1344 1346 a1c323 1343->1346 1347 a1c318-a1c321 1343->1347 1350 a1c356 1344->1350 1351 a1c34e-a1c354 1344->1351 1348 a1c2c1 1345->1348 1349 a1c2b6-a1c2bf 1345->1349 1352 a1c325 1346->1352 1353 a1c32a-a1c342 call a138ba 1346->1353 1347->1346 1354 a1c2c3 1348->1354 1355 a1c2c8-a1c2db call a138ba 1348->1355 1349->1348 1356 a1c358-a1c366 SetFilePointerEx 1350->1356 1351->1356 1352->1353 1368 a1c2e0-a1c2e9 call a5055b 1353->1368 1354->1355 1355->1368 1359 a1c368-a1c372 GetLastError 1356->1359 1360 a1c39d-a1c3a3 1356->1360 1365 a1c374-a1c37d 1359->1365 1366 a1c37f 1359->1366 1361 a1c3c1-a1c3c7 1360->1361 1362 a1c3a5-a1c3a9 call a31508 1360->1362 1372 a1c3ae-a1c3b2 1362->1372 1365->1366 1369 a1c381 1366->1369 1370 a1c386-a1c39b call a138ba 1366->1370 1368->1361 1369->1370 1377 a1c3b9-a1c3c0 call a5055b 1370->1377 1372->1361 1375 a1c3b4 1372->1375 1375->1377 1377->1361
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,08000080,00000000,?,00000000,00000000,?,00A1C442,00A15442,?,?,00A15482), ref: 00A1C299
                                  • GetLastError.KERNEL32(?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C2AA
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002,?,00000000,00000000,?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?), ref: 00A1C2F9
                                  • GetCurrentProcess.KERNEL32(000000FF,00000000,?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C2FF
                                  • DuplicateHandle.KERNELBASE(00000000,?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C302
                                  • GetLastError.KERNEL32(?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C30C
                                  • SetFilePointerEx.KERNELBASE(?,00000000,00000000,00000000,00000000,?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C35E
                                  • GetLastError.KERNEL32(?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A1C368
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CurrentFileProcess$CreateDuplicateHandlePointer
                                  • String ID: Failed to duplicate handle to container: %ls$Failed to move file pointer to container offset.$Failed to open container.$Failed to open file: %ls$c:\agent\_work\79\s\src\burn\engine\container.cpp$crypt32.dll$feclient.dll
                                  • API String ID: 2619879409-1118363129
                                  • Opcode ID: 1f6fe04739cc0ac9c1edcfaaffaac1f78a5dfc47e52799a726ee6448cf84642d
                                  • Instruction ID: e8ad1109f28e87dcad7ac9a849a235200d3dc4abbfe805fc1d06094ff1e851ba
                                  • Opcode Fuzzy Hash: 1f6fe04739cc0ac9c1edcfaaffaac1f78a5dfc47e52799a726ee6448cf84642d
                                  • Instruction Fuzzy Hash: 2D41D736180201ABDB109F599D49E9BBBB9BBC5772F218019FD24DF281E731C841DB70
                                  APIs
                                    • Part of subcall function 00A138D1: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00A13910
                                    • Part of subcall function 00A138D1: GetLastError.KERNEL32 ref: 00A1391A
                                    • Part of subcall function 00A54CDB: GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000001), ref: 00A54D0C
                                  • GetProcAddress.KERNEL32(MsiDeterminePatchSequenceW,00000000), ref: 00A52E04
                                  • GetProcAddress.KERNEL32(MsiDetermineApplicablePatchesW), ref: 00A52E24
                                  • GetProcAddress.KERNEL32(MsiEnumProductsExW), ref: 00A52E44
                                  • GetProcAddress.KERNEL32(MsiGetPatchInfoExW), ref: 00A52E64
                                  • GetProcAddress.KERNEL32(MsiGetProductInfoExW), ref: 00A52E84
                                  • GetProcAddress.KERNEL32(MsiSetExternalUIRecord), ref: 00A52EA4
                                  • GetProcAddress.KERNEL32(MsiSourceListAddSourceExW), ref: 00A52EC4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLast$DirectorySystem
                                  • String ID: Msi.dll$MsiDetermineApplicablePatchesW$MsiDeterminePatchSequenceW$MsiEnumProductsExW$MsiGetPatchInfoExW$MsiGetProductInfoExW$MsiSetExternalUIRecord$MsiSourceListAddSourceExW
                                  • API String ID: 2510051996-1735120554
                                  • Opcode ID: 8e553f466df34143f11403dd08fd3d4cbf26f4859f3eaa20ae695dcf0da4644a
                                  • Instruction ID: eb25e02019bb20aabdb83923a9b7c22ae965e75e6ba0240e272a808e0a4d063b
                                  • Opcode Fuzzy Hash: 8e553f466df34143f11403dd08fd3d4cbf26f4859f3eaa20ae695dcf0da4644a
                                  • Instruction Fuzzy Hash: BE31B470940718EFDB1ADFA1EE527553BA0F715726F00C12EE80866171EB7509D6DF80
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,00000000,00A538BD,00000000,?,00000000), ref: 00A53329
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00A3BD36,?,00A15442,?,00000000,?), ref: 00A53335
                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00A53375
                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A53381
                                  • GetProcAddress.KERNEL32(00000000,Wow64EnableWow64FsRedirection), ref: 00A5338C
                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A53396
                                  • CoCreateInstance.OLE32(00A7C7A0,00000000,00000001,00A5B878,?,?,?,?,?,?,?,?,?,?,?,00A3BD36), ref: 00A533D1
                                  • ExitProcess.KERNEL32 ref: 00A53480
                                  Strings
                                  • IsWow64Process, xrefs: 00A5336F
                                  • Wow64RevertWow64FsRedirection, xrefs: 00A5338E
                                  • Wow64DisableWow64FsRedirection, xrefs: 00A5337B
                                  • kernel32.dll, xrefs: 00A53319
                                  • Wow64EnableWow64FsRedirection, xrefs: 00A53383
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 00A53359
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressProc$CreateErrorExitHandleInstanceLastModuleProcess
                                  • String ID: IsWow64Process$Wow64DisableWow64FsRedirection$Wow64EnableWow64FsRedirection$Wow64RevertWow64FsRedirection$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp$kernel32.dll
                                  • API String ID: 2124981135-2947744589
                                  • Opcode ID: faf1dce51334a0c74d75735429f0221f4529d85040a62bcedc8bcc00c6874074
                                  • Instruction ID: 007fd98891565f4ed155f1cbd84537a9cc1e7f2ab00bb7a2f2af417878669bf9
                                  • Opcode Fuzzy Hash: faf1dce51334a0c74d75735429f0221f4529d85040a62bcedc8bcc00c6874074
                                  • Instruction Fuzzy Hash: A041B536A00315ABCF22DFA8C854B6E77B4FF84793F118468ED05EB250DB71DE098A50
                                  APIs
                                  • TlsAlloc.KERNEL32(?,00000001,00000001,00000000,00000000,?,?,?,00A154A3,?,?,?,?), ref: 00A14967
                                  • GetLastError.KERNEL32(?,?,?,00A154A3,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00A14978
                                  • ReleaseMutex.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A14AB5
                                  • CloseHandle.KERNEL32(?,?,?,?,00A154A3,?,?,?,?,?,?,?,?,?,?,?), ref: 00A14ABE
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\engine.cpp, xrefs: 00A1499C, 00A149E5
                                  • Failed to connect to unelevated process., xrefs: 00A1495D
                                  • comres.dll, xrefs: 00A14A24
                                  • Failed to allocate thread local storage for logging., xrefs: 00A149A6
                                  • Failed to create the message window., xrefs: 00A14A13
                                  • Failed to pump messages from parent process., xrefs: 00A14A89
                                  • Failed to set elevated pipe into thread local storage for logging., xrefs: 00A149EF
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AllocCloseErrorHandleLastMutexRelease
                                  • String ID: Failed to allocate thread local storage for logging.$Failed to connect to unelevated process.$Failed to create the message window.$Failed to pump messages from parent process.$Failed to set elevated pipe into thread local storage for logging.$c:\agent\_work\79\s\src\burn\engine\engine.cpp$comres.dll
                                  • API String ID: 687263955-2063452256
                                  • Opcode ID: c076cd5807295c5e3dce244586800ebbf687fb6f5193a00aa9352e45433dce68
                                  • Instruction ID: 7ed66736afd6508e733a102a13d008c84ce6e22f2804a75011bb00ac2deb1a5d
                                  • Opcode Fuzzy Hash: c076cd5807295c5e3dce244586800ebbf687fb6f5193a00aa9352e45433dce68
                                  • Instruction Fuzzy Hash: 4D41D773A40626BBD711DBE8DD45EDFB66CBF08752F010226FE15E2141DB30A98487E0
                                  APIs
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,wininet.dll,?,00000000,00000000,00000000,?,?,00A1C3AE,?,00000000,?,00A1C442), ref: 00A3153F
                                  • GetLastError.KERNEL32(?,00A1C3AE,?,00000000,?,00A1C442,00A15442,?,?,00A15482,00A15482,00000000,?,00000000), ref: 00A31548
                                  Strings
                                  • Failed to create extraction thread., xrefs: 00A31608
                                  • Failed to create begin operation event., xrefs: 00A31576
                                  • Failed to wait for operation complete., xrefs: 00A3161B
                                  • Failed to create operation complete event., xrefs: 00A315BC
                                  • wininet.dll, xrefs: 00A3151E
                                  • Failed to copy file name., xrefs: 00A3152A
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 00A3156C, 00A315B2, 00A315FE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CreateErrorEventLast
                                  • String ID: Failed to copy file name.$Failed to create begin operation event.$Failed to create extraction thread.$Failed to create operation complete event.$Failed to wait for operation complete.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp$wininet.dll
                                  • API String ID: 545576003-3114295247
                                  • Opcode ID: e3e074b8d8e759a5595f7f335be52378f8ee2d888739f1a20b5847459a1aa7df
                                  • Instruction ID: 9cb51d3eed76170a889b783640974a2a526a7da36442ff9d91c25ff1d6c575a6
                                  • Opcode Fuzzy Hash: e3e074b8d8e759a5595f7f335be52378f8ee2d888739f1a20b5847459a1aa7df
                                  • Instruction Fuzzy Hash: F42109B3E41736B7E22157A89D46F6BA9ACBF50BA2F010111BD01BB580E768DC014AF5
                                  APIs
                                  • GetProcAddress.KERNELBASE(SystemFunction040,AdvApi32.dll), ref: 00A50004
                                  • GetProcAddress.KERNEL32(SystemFunction041), ref: 00A50016
                                  • GetProcAddress.KERNEL32(CryptProtectMemory,Crypt32.dll), ref: 00A50059
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 00A5006D
                                  • GetProcAddress.KERNEL32(CryptUnprotectMemory), ref: 00A500A5
                                  • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 00A500B9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLast
                                  • String ID: AdvApi32.dll$Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory$SystemFunction040$SystemFunction041$c:\agent\_work\79\s\src\libs\dutil\cryputil.cpp
                                  • API String ID: 4214558900-2260022107
                                  • Opcode ID: 4a4a87e55f312b51b2edc9c9384d9288f7cfe86a509a791fbbb92be262ab0d42
                                  • Instruction ID: f37fdebc80dbe0f9bea8cc2f42d0f7ff1a2c989693ab5270099be830a07ad113
                                  • Opcode Fuzzy Hash: 4a4a87e55f312b51b2edc9c9384d9288f7cfe86a509a791fbbb92be262ab0d42
                                  • Instruction Fuzzy Hash: DF219837941732A7D731EF95AD45F277960BB107B2F01E128ED08B62E0D3719C898AD0
                                  APIs
                                  • CompareStringA.KERNELBASE(00000000,00000000,<the>.cab,?,?), ref: 00A306C6
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 00A306DE
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,?), ref: 00A306E3
                                  • DuplicateHandle.KERNELBASE(00000000,?,?), ref: 00A306E6
                                  • GetLastError.KERNEL32(?,?), ref: 00A306F0
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,08000080,00000000,?,?), ref: 00A3075F
                                  • GetLastError.KERNEL32(?,?), ref: 00A3076C
                                  Strings
                                  • <the>.cab, xrefs: 00A306BF
                                  • Failed to duplicate handle to cab container., xrefs: 00A3071E
                                  • Failed to open cabinet file: %hs, xrefs: 00A3079D
                                  • Failed to add virtual file pointer for cab container., xrefs: 00A30745
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 00A30714, 00A30790
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CurrentErrorLastProcess$CompareCreateDuplicateFileHandleString
                                  • String ID: <the>.cab$Failed to add virtual file pointer for cab container.$Failed to duplicate handle to cab container.$Failed to open cabinet file: %hs$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 3030546534-4222385192
                                  • Opcode ID: 59507e81a88a56ffc0e06218018900672558f71c72c5eab4c5dd5e86f6be79ac
                                  • Instruction ID: 3a5f12c6e3006c14645ff397f6613826a42d4f5412fc67e09bc084b2691f6f91
                                  • Opcode Fuzzy Hash: 59507e81a88a56ffc0e06218018900672558f71c72c5eab4c5dd5e86f6be79ac
                                  • Instruction Fuzzy Hash: 2E31CF76911A35BBD7219B988D59F8FBE68FF05762F114210FE04B7290D720AD008EF0
                                  APIs
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,?,00A154CB,?,?), ref: 00A2E913
                                  • GetLastError.KERNEL32(?,00A154CB,?,?), ref: 00A2E920
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0001E631,?,00000000,00000000), ref: 00A2E979
                                  • GetLastError.KERNEL32(?,00A154CB,?,?), ref: 00A2E986
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,00A154CB,?,?), ref: 00A2E9C1
                                  • CloseHandle.KERNEL32(00000000,?,00A154CB,?,?), ref: 00A2E9E0
                                  • CloseHandle.KERNELBASE(?,?,00A154CB,?,?), ref: 00A2E9ED
                                  Strings
                                  • Failed to create the UI thread., xrefs: 00A2E9B1
                                  • Failed to create initialization event., xrefs: 00A2E94B
                                  • c:\agent\_work\79\s\src\burn\engine\uithread.cpp, xrefs: 00A2E941, 00A2E9A7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorHandleLast$EventMultipleObjectsThreadWait
                                  • String ID: Failed to create initialization event.$Failed to create the UI thread.$c:\agent\_work\79\s\src\burn\engine\uithread.cpp
                                  • API String ID: 2351989216-563379454
                                  • Opcode ID: 16a14a8a26a85e68975f703e363dba893d85b0f7b994bc4f4b65622421c14d36
                                  • Instruction ID: d9738821e49034774b99ebb24cb904e78ed3fed561a76d1bb226599fda0c9b10
                                  • Opcode Fuzzy Hash: 16a14a8a26a85e68975f703e363dba893d85b0f7b994bc4f4b65622421c14d36
                                  • Instruction Fuzzy Hash: BD318176D01229BBEB11DF9D9D85A9FFBB8BF04751F114136F904F7280E6309E808AA1
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,?,00000008,?,00000000,?,00000000,00000000,?,00000000), ref: 00A248E1
                                  • GetLastError.KERNEL32 ref: 00A248EE
                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,00000000), ref: 00A24999
                                  • GetLastError.KERNEL32 ref: 00A249A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID: Failed to allocate data for message.$Failed to read data for message.$Failed to read message from pipe.$c:\agent\_work\79\s\src\burn\engine\pipe.cpp
                                  • API String ID: 1948546556-2758242248
                                  • Opcode ID: 77cccb7f30d69481e88798246996c88ecce0dfee8ad14d8b553571d8c43e90bc
                                  • Instruction ID: a3702edcbadde57ebdc950e49d60f9a76664db9c3f229e6638417567a7f16e67
                                  • Opcode Fuzzy Hash: 77cccb7f30d69481e88798246996c88ecce0dfee8ad14d8b553571d8c43e90bc
                                  • Instruction Fuzzy Hash: 1B31F533D50236BBDB10DBA8ED05BAFBA68BF08752F118135BC45A6180D7749E80CBD0
                                  APIs
                                  • TlsSetValue.KERNEL32(?,?), ref: 00A2AC3E
                                  • GetLastError.KERNEL32 ref: 00A2AC48
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 00A2AC87
                                  • CoUninitialize.OLE32(?,00A2C5DF,?,?), ref: 00A2ACC4
                                  Strings
                                  • Failed to set elevated cache pipe into thread local storage for logging., xrefs: 00A2AC76
                                  • Failed to pump messages in child process., xrefs: 00A2ACB2
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 00A2AC6C
                                  • Failed to initialize COM., xrefs: 00A2AC93
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorInitializeLastUninitializeValue
                                  • String ID: Failed to initialize COM.$Failed to pump messages in child process.$Failed to set elevated cache pipe into thread local storage for logging.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 876858697-3953973340
                                  • Opcode ID: ddad89bb27ec09b3b1c31209a65fd68045b87189cbd89edf24ec8ca2425c0687
                                  • Instruction ID: f3cfbd5e06db827ebf4016436f8501d8e9b689c065dc8dc62c55c201ec2aec69
                                  • Opcode Fuzzy Hash: ddad89bb27ec09b3b1c31209a65fd68045b87189cbd89edf24ec8ca2425c0687
                                  • Instruction Fuzzy Hash: E6110273951631BB97129BDDEE0A99FBE69FF20F227014225FD05B7240EB71AD0086E1
                                  APIs
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0001AC27,00000001,00000000,00000000), ref: 00A2D188
                                  • GetLastError.KERNEL32(?,?,?,00A154A3,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00A2D194
                                    • Part of subcall function 00A2CDDD: WaitForSingleObject.KERNEL32(?,000493E0,00000000,?,?,00A2D204,00000000,?,?,00A2C687,?,?,?,?,?,00A154A3), ref: 00A2CDEF
                                    • Part of subcall function 00A2CDDD: GetLastError.KERNEL32(?,?,00A2D204,00000000,?,?,00A2C687,?,?,?,?,?,00A154A3,?,?,?), ref: 00A2CDF9
                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,00A2C687,?,?,?,?,?,00A154A3,?,?,?,?), ref: 00A2D215
                                  Strings
                                  • Failed to create elevated cache thread., xrefs: 00A2D1C2
                                  • Failed to pump messages in child process., xrefs: 00A2D1EC
                                  • c:\agent\_work\79\s\src\burn\engine\elevation.cpp, xrefs: 00A2D1B8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CloseCreateHandleObjectSingleThreadWait
                                  • String ID: Failed to create elevated cache thread.$Failed to pump messages in child process.$c:\agent\_work\79\s\src\burn\engine\elevation.cpp
                                  • API String ID: 3606931770-1134900366
                                  • Opcode ID: a47374af2234c8f7d8feaea0273d958c4aaa2e9060e5c639c45360299d9dd7fb
                                  • Instruction ID: 62ab3f175c94bf89208028ccc3acb7fa2f742525132a7a04e13a8c608f638883
                                  • Opcode Fuzzy Hash: a47374af2234c8f7d8feaea0273d958c4aaa2e9060e5c639c45360299d9dd7fb
                                  • Instruction Fuzzy Hash: 6E41D3B6D11229AF8B45DFACD9819DEBBF4BF08710F10412AF809E7340E73099418FA0
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 00A535C5
                                  • SysAllocString.OLEAUT32(?), ref: 00A535E1
                                  • VariantClear.OLEAUT32(?), ref: 00A53668
                                  • SysFreeString.OLEAUT32(00000000), ref: 00A53673
                                  Strings
                                  • `)u, xrefs: 00A53673
                                  • c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp, xrefs: 00A535F8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: StringVariant$AllocClearFreeInit
                                  • String ID: `)u$c:\agent\_work\79\s\src\libs\dutil\xmlutil.cpp
                                  • API String ID: 760788290-2301883107
                                  • Opcode ID: 4b32f6e5f0cd147981e5062d1fe95b11ad6bdf8d46a6acbfccdc858d2a90d5fd
                                  • Instruction ID: 6a5215f5e66dc29f890c775430e9aaf84da4ad4d87b46b81a5c62137d83b8023
                                  • Opcode Fuzzy Hash: 4b32f6e5f0cd147981e5062d1fe95b11ad6bdf8d46a6acbfccdc858d2a90d5fd
                                  • Instruction Fuzzy Hash: A3218076900215BBCF21DBA4C848EAFBBB9BF84B62F11415CFD05AB610D7319E05CBA0
                                  APIs
                                  • OpenProcessToken.ADVAPI32(?,00000008,?,?,?,?,?,?,00A28214,00000000), ref: 00A50BB1
                                  • GetLastError.KERNEL32(?,?,?,00A28214,00000000), ref: 00A50BBB
                                  • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,00A28214,00000000), ref: 00A50BED
                                  • GetLastError.KERNEL32(?,?,?,00A28214,00000000), ref: 00A50C06
                                  • CloseHandle.KERNELBASE(?,?,?,?,00A28214,00000000), ref: 00A50C45
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\procutil.cpp, xrefs: 00A50C33
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLastToken$CloseHandleInformationOpenProcess
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\procutil.cpp
                                  • API String ID: 4040495316-1009431558
                                  • Opcode ID: e48bc853f716c510dea47ff26394f3e1197a96e0e937e9e2f62eed222d9c56be
                                  • Instruction ID: ee7e979483c6c57dc8c9a85e2fa43af6d1ca0d2aa897dfd35ee1afb6126c90df
                                  • Opcode Fuzzy Hash: e48bc853f716c510dea47ff26394f3e1197a96e0e937e9e2f62eed222d9c56be
                                  • Instruction Fuzzy Hash: 6121A172D10629EBDB219B999D44F9EBBB8FF11713F014156ED15BB290D3708E04DAA0
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 00A53828
                                  • InterlockedIncrement.KERNEL32(00A7C7B4), ref: 00A53845
                                  • CLSIDFromProgID.COMBASE(Msxml2.DOMDocument,00A7C7A0,?,?,?,?,?,?), ref: 00A53860
                                  • CLSIDFromProgID.OLE32(MSXML.DOMDocument,00A7C7A0,?,?,?,?,?,?), ref: 00A5386C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: FromProg$IncrementInitializeInterlocked
                                  • String ID: MSXML.DOMDocument$Msxml2.DOMDocument
                                  • API String ID: 2109125048-2356320334
                                  • Opcode ID: ee18427fdeabd22b8c6f0fccb6ebe760da06667b76373081a64dbcd62982a1d1
                                  • Instruction ID: 6b87039f733e6d7ffff504cf9de6f0f8ab8ef88fdde8b5163d2504f1f9517a8b
                                  • Opcode Fuzzy Hash: ee18427fdeabd22b8c6f0fccb6ebe760da06667b76373081a64dbcd62982a1d1
                                  • Instruction Fuzzy Hash: 4FF0373274426166DB184BE5AC04B2B2995BBC1BE3F50942EFC48D5164D770D9868AB0
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000001), ref: 00A54D0C
                                  • GlobalAlloc.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000001), ref: 00A54D39
                                  • GetLastError.KERNEL32(?,00000000,?,00000000), ref: 00A54D65
                                  • GetLastError.KERNEL32(00000000,00A5B800,?,00000000,?,00000000,?,00000000), ref: 00A54DA3
                                  • GlobalFree.KERNEL32(00000000), ref: 00A54DD4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Global$AllocFree
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 1145190524-3405085980
                                  • Opcode ID: 315c7780450fca9b5614b20e2bf36dd3c32474a1f1c63d2bf6ed937c2f01b2fa
                                  • Instruction ID: 2f807254f3c4a1c11bd7fef07fbb3c8bf17ee78709fd69a0c987ab940ede35c6
                                  • Opcode Fuzzy Hash: 315c7780450fca9b5614b20e2bf36dd3c32474a1f1c63d2bf6ed937c2f01b2fa
                                  • Instruction Fuzzy Hash: B731E537900229BBDB22DB988D01EEFBAB8BF49756F114265FD04EB241E730DD4486E0
                                  APIs
                                  • DefWindowProcW.USER32(?,00000082,?,?), ref: 00A2E7FB
                                  • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00A2E80A
                                  • SetWindowLongW.USER32(?,000000EB,?), ref: 00A2E81E
                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00A2E82E
                                  • GetWindowLongW.USER32(?,000000EB), ref: 00A2E848
                                  • PostQuitMessage.USER32(00000000), ref: 00A2E8A7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Window$Long$Proc$MessagePostQuit
                                  • String ID:
                                  • API String ID: 3812958022-0
                                  • Opcode ID: 1e71750904c02cd5b105a84225d10152d04dd97097c95775cc5f8ac9b4050a1b
                                  • Instruction ID: f91cefc1fe5ba05ac4e24c7e3f517c6bee415f1fee7d3742707d93e3d0b947cc
                                  • Opcode Fuzzy Hash: 1e71750904c02cd5b105a84225d10152d04dd97097c95775cc5f8ac9b4050a1b
                                  • Instruction Fuzzy Hash: 9621B036100224BFDF059FA8EC48E6A3B65FF45322F148624F906AA2B0C731DD60DBA0
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?), ref: 00A308F7
                                  • GetLastError.KERNEL32(?,?,?), ref: 00A30901
                                  Strings
                                  • Invalid seek type., xrefs: 00A3088D
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 00A30925
                                  • Failed to move file pointer 0x%x bytes., xrefs: 00A30932
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID: Failed to move file pointer 0x%x bytes.$Invalid seek type.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2976181284-3594109541
                                  • Opcode ID: 8f04636d71ea41ee731b8be0876856042fbbc7bec0ea37d9a3654a0c4c00df95
                                  • Instruction ID: 3c2440cb85a73f8585fe6f76522f8725209f3742644f6a379f96323fbfdd6b77
                                  • Opcode Fuzzy Hash: 8f04636d71ea41ee731b8be0876856042fbbc7bec0ea37d9a3654a0c4c00df95
                                  • Instruction Fuzzy Hash: A1317E72A0021AFFDB04DFA8C995E9EB7B9FB04724F048115F914E7251E330EA108BE0
                                  APIs
                                  • GetProcAddress.KERNEL32(SRSetRestorePointW,srclient.dll), ref: 00A51F8E
                                  • GetLastError.KERNEL32(?,00A14A21,00000001,?,?,00A1459E,?,?,?,?,00A154A3,?,?,?,?), ref: 00A51F9D
                                  Strings
                                  • srclient.dll, xrefs: 00A51F6C
                                  • SRSetRestorePointW, xrefs: 00A51F83
                                  • c:\agent\_work\79\s\src\libs\dutil\srputil.cpp, xrefs: 00A51FBE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressErrorLastProc
                                  • String ID: SRSetRestorePointW$c:\agent\_work\79\s\src\libs\dutil\srputil.cpp$srclient.dll
                                  • API String ID: 199729137-3932515841
                                  • Opcode ID: c9162149ab11a806ac7e38297d3e8e5bddebb260dde8335b11c10b8dfccd9217
                                  • Instruction ID: 9dbe7cb3131c895b23ed8221adf92d4011c55d8ccb9e120c633b81af0bc73777
                                  • Opcode Fuzzy Hash: c9162149ab11a806ac7e38297d3e8e5bddebb260dde8335b11c10b8dfccd9217
                                  • Instruction Fuzzy Hash: 9D018633A50A72A3D73267D99D06B766A54BB00767F018627FD04AA251DB74CC8CC6E1
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00A13910
                                  • GetLastError.KERNEL32 ref: 00A1391A
                                  • LoadLibraryW.KERNELBASE(?,?,00000104,?), ref: 00A13983
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: DirectoryErrorLastLibraryLoadSystem
                                  • String ID: _`AB
                                  • API String ID: 1230559179-2337101104
                                  • Opcode ID: b529d8ad2b231acb28d14639eb7078b1fc84f9b6a76322d23be4e4d5349d29ff
                                  • Instruction ID: 5b3b4708299409f81cbd3174664592aee2c84164154c5c76e78637c11809b20d
                                  • Opcode Fuzzy Hash: b529d8ad2b231acb28d14639eb7078b1fc84f9b6a76322d23be4e4d5349d29ff
                                  • Instruction Fuzzy Hash: 5621B3B7D0133967DF20DFA49C59FDE77A8AB00761F1502A1BD15E7281E670DE8486A0
                                  APIs
                                    • Part of subcall function 00A311D6: SetFilePointerEx.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000000,?,00A307EB,?,?,?), ref: 00A311FE
                                    • Part of subcall function 00A311D6: GetLastError.KERNEL32(?,00A307EB,?,?,?), ref: 00A31208
                                  • ReadFile.KERNELBASE(?,?,?,?,00000000,?,?,?), ref: 00A307F9
                                  • GetLastError.KERNEL32 ref: 00A30803
                                  Strings
                                  • Failed to read during cabinet extraction., xrefs: 00A30831
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 00A30827
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$PointerRead
                                  • String ID: Failed to read during cabinet extraction.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2170121939-535368954
                                  • Opcode ID: 2fc5d89d9e2b0b280da0f3dddc6b2699b260336cf1e660dd10badd4442b710d5
                                  • Instruction ID: 01e48231d585ea44e26d308258c90ac29cc0108214515fdb87e263923cce3d50
                                  • Opcode Fuzzy Hash: 2fc5d89d9e2b0b280da0f3dddc6b2699b260336cf1e660dd10badd4442b710d5
                                  • Instruction Fuzzy Hash: 6301A132A10229BBCB21DFA9DD05E8A7BA8FF45765F014114FE04E7290D330D901CAE0
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000000,?,00A307EB,?,?,?), ref: 00A311FE
                                  • GetLastError.KERNEL32(?,00A307EB,?,?,?), ref: 00A31208
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cabextract.cpp, xrefs: 00A3122C
                                  • Failed to move to virtual file pointer., xrefs: 00A31236
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID: Failed to move to virtual file pointer.$c:\agent\_work\79\s\src\burn\engine\cabextract.cpp
                                  • API String ID: 2976181284-2647110642
                                  • Opcode ID: 049550c0788756753fcd2267bbf4dd26fe099033a71a10c23dd2bc014ddd44c0
                                  • Instruction ID: 918c56f761d58fb68651cae1e8f98d3ddd4b743143fda0696e784aa7998b0353
                                  • Opcode Fuzzy Hash: 049550c0788756753fcd2267bbf4dd26fe099033a71a10c23dd2bc014ddd44c0
                                  • Instruction Fuzzy Hash: D201843361063AB7D7215BD59C059CBBF25BF40B72B118125BE18A6150EB25981086E0
                                  APIs
                                  • lstrlenW.KERNEL32(burn.clean.room,?,?,?,?,00A11104,?,?,00000000), ref: 00A1517F
                                  • CompareStringW.KERNELBASE(0000007F,00000001,?,0000000F,burn.clean.room,0000000F,?,?,?,?,00A11104,?,?,00000000), ref: 00A151AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CompareStringlstrlen
                                  • String ID: burn.clean.room
                                  • API String ID: 1433953587-3055529264
                                  • Opcode ID: 760e6cadd1086197719a4ee1c7ba11c858327920295ed099dda3a758b8092934
                                  • Instruction ID: b5d5955a7bf5d9a542e5f621946c2aadcfa219216b304f10e67c362c22901905
                                  • Opcode Fuzzy Hash: 760e6cadd1086197719a4ee1c7ba11c858327920295ed099dda3a758b8092934
                                  • Instruction Fuzzy Hash: 5501D6B2910620FB83219BA8AC88FF3BBADFB997917104215E908C3210C3619CC1C6B0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00A505D9,00000000,?,?,00000000,00000000,8000FFFF,?,?,?,00A5056D,?), ref: 00A13AAE
                                  • RtlFreeHeap.NTDLL(00000000,?,00A505D9,00000000,?,?,00000000,00000000,8000FFFF,?,?,?,00A5056D,?,?,?), ref: 00A13AB5
                                  • GetLastError.KERNEL32(?,00A505D9,00000000,?,?,00000000,00000000,8000FFFF,?,?,?,00A5056D,?,?,?), ref: 00A13ABF
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$ErrorFreeLastProcess
                                  • String ID:
                                  • API String ID: 406640338-0
                                  • Opcode ID: 4d5fde84e0e0787e3fe374f4f696478d439439ae178efe593f805e8b7f4f526d
                                  • Instruction ID: f27610eaacff736d52deb42c121f8646f3d17ab042af822382337883db736874
                                  • Opcode Fuzzy Hash: 4d5fde84e0e0787e3fe374f4f696478d439439ae178efe593f805e8b7f4f526d
                                  • Instruction Fuzzy Hash: 6DD01273A10635578A219BE65C0C9DBBE58FF146E3B010121FD44EB250DB26CD4197F4
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 00A538AC
                                    • Part of subcall function 00A5330F: GetModuleHandleA.KERNEL32(kernel32.dll,00000000,00000000,00A538BD,00000000,?,00000000), ref: 00A53329
                                    • Part of subcall function 00A5330F: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00A3BD36,?,00A15442,?,00000000,?), ref: 00A53335
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorHandleInitLastModuleVariant
                                  • String ID: _`AB
                                  • API String ID: 52713655-2337101104
                                  • Opcode ID: e2cf6622d1902e5ddf74c1764d3d04dd0bd823cd9857be06e10e63e7511c9bec
                                  • Instruction ID: 8ffb74dc3bfe1a152c434a8bad7eb9392aa5bbc8b91c9a89747b61467088cc3b
                                  • Opcode Fuzzy Hash: e2cf6622d1902e5ddf74c1764d3d04dd0bd823cd9857be06e10e63e7511c9bec
                                  • Instruction Fuzzy Hash: A2312F76D01629DBCB01DFA8C884ADEB7B4FF48761F014566ED15FB311D6709D048BA0
                                  APIs
                                  • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,00A7BB7C,00000000,?,00A55A32,80000002,00000000,00020019,00000000,SOFTWARE\Policies\,00000000,00000000), ref: 00A51289
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\regutil.cpp, xrefs: 00A512C6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\regutil.cpp
                                  • API String ID: 71445658-1128744096
                                  • Opcode ID: 64a14ae3f285a0f2d51edaa5ec36c2eda206c7be34d1f2334b62c85112a4e17b
                                  • Instruction ID: 1857c65c832c7f3f44d41e91ea63b8b44e48932ed772a5ca45f09602b6493d13
                                  • Opcode Fuzzy Hash: 64a14ae3f285a0f2d51edaa5ec36c2eda206c7be34d1f2334b62c85112a4e17b
                                  • Instruction Fuzzy Hash: 96F02432B00226738B310A968C04BFB7E95FB803F2F158035BD08DB220E571CC1187E5
                                  APIs
                                    • Part of subcall function 00A47B4B: GetOEMCP.KERNEL32(00000000,00A47DC1,00000000,00000000,00A41641,00A41641,00000000,75A8B38F,00000000), ref: 00A47B76
                                  • _free.LIBCMT ref: 00A47E1E
                                  • _free.LIBCMT ref: 00A47E54
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 5cbaa13baac9bb722ab256b147c69cb01242ac5f6459633f296232b6f56c02ce
                                  • Instruction ID: 080e23bca10ebffa4b02f6ad552fc90ab5c66b8e657a23b480beaf21938d9332
                                  • Opcode Fuzzy Hash: 5cbaa13baac9bb722ab256b147c69cb01242ac5f6459633f296232b6f56c02ce
                                  • Instruction Fuzzy Hash: 2131F275808289AFCB00DFA8C882B9E7BF4EF84310F1145A9F915972A1EB32DD51CB60
                                  APIs
                                  • GetProcessHeap.KERNEL32(?,?,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F0
                                  • RtlAllocateHeap.NTDLL(00000000,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: c30535802b62bad6a673377fe0085607eb625f1feaf7ee22402b570b62b46913
                                  • Instruction ID: 808b561482f860517ecc13c7ca59f8fdbeddd20aa04ca8e776d0c4a018822002
                                  • Opcode Fuzzy Hash: c30535802b62bad6a673377fe0085607eb625f1feaf7ee22402b570b62b46913
                                  • Instruction Fuzzy Hash: 0BC012321A030CAB8B00AFF8EC0EC9A3BACBB28603B008600B905C7160C738E0518B70
                                  APIs
                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000,00A7BB7C,00000000,00000000,?,?,00A28A07,WiX\Burn,PackageCache,00000000,00A7BB7C,00000000,00000000,00000000), ref: 00A55B17
                                    • Part of subcall function 00A513B0: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00A51426
                                    • Part of subcall function 00A513B0: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 00A5145E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: QueryValue$Close
                                  • String ID:
                                  • API String ID: 1979452859-0
                                  • Opcode ID: 28183aa21deb5eb552aea20f009ab2ec2f84a2ed498a3a2888e30a923c454336
                                  • Instruction ID: 28abf045c94edaf959a9f0abc967a42ab090de2781eeda6e609beed436d30113
                                  • Opcode Fuzzy Hash: 28183aa21deb5eb552aea20f009ab2ec2f84a2ed498a3a2888e30a923c454336
                                  • Instruction Fuzzy Hash: 8A118636C00629EBCF215FB8CD699AEF7A5FB04362B164139ED4267120E3354D54D7D0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,00A47DE3,00000220,00000000,?,75A8B38F,?,?,?,00A41641,00000000,75A8B38F,00000000), ref: 00A45FCB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 36b8c52e456fddf79379efe86110f884feaabf626d9f73267ce15e2b9b5c4d26
                                  • Instruction ID: 361296596299a884e80de325ce5e3929727f558ddffd84811c21a28ca6df9f77
                                  • Opcode Fuzzy Hash: 36b8c52e456fddf79379efe86110f884feaabf626d9f73267ce15e2b9b5c4d26
                                  • Instruction Fuzzy Hash: 90E0E539A01E1057DA2127B55C04B6A765CAFC27A0F110130AE45DA082CB60CC0989A2
                                  APIs
                                  • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000000,00000104,00000000,?,00A28AC1,0000001C,00000000,00000000,00000000,00000000), ref: 00A135C8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: FolderPath
                                  • String ID:
                                  • API String ID: 1514166925-0
                                  • Opcode ID: d41c07dc50ff69f23ead86dd0c1238925091732ae30625bf822ecac2251ac09d
                                  • Instruction ID: c91589eac736ceeff3c08ed97d3ad8db0ff509f726bc1e66cbc1fe773f975ccf
                                  • Opcode Fuzzy Hash: d41c07dc50ff69f23ead86dd0c1238925091732ae30625bf822ecac2251ac09d
                                  • Instruction Fuzzy Hash: A1E017723412247BAB016EA99D05DEB7B9DEF19BA2B004011FF44EA400DB61EA9157B0
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A4F7A0
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 545576f98a6f9115df4b20f337c63400f4e3c7a360411fd562b54108b4890f05
                                  • Instruction ID: 7f47cedf6bad0338c54fb901f2c9f1e19d0177272b2f941671303635c2fc21df
                                  • Opcode Fuzzy Hash: 545576f98a6f9115df4b20f337c63400f4e3c7a360411fd562b54108b4890f05
                                  • Instruction Fuzzy Hash: BBB012F52A8001BD324461082E06D37025CD0C0B21330D82AB408C4040EC684C454432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A4F7A0
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 753ee56c3d626f3514b16c54af2b6677c0ca436fa0780944f041d5cdb1fffb4b
                                  • Instruction ID: 745ccae274d8191bc3752d3f25b634915a3339d2c38c5577312f427b6bc3b730
                                  • Opcode Fuzzy Hash: 753ee56c3d626f3514b16c54af2b6677c0ca436fa0780944f041d5cdb1fffb4b
                                  • Instruction Fuzzy Hash: 1FB012F52A8101BD324461083D0AD37015CD0C0B31330D92AB408C4040E8684C844532
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A4F7A0
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 449d9dd3561913765c9d5dae6f9bcce412c980db099287ce065e0476708c733a
                                  • Instruction ID: ef94a7b9a75a2a820a6dcc532ee0dc16978d05941bfe922aa8bac3ce8cf376ea
                                  • Opcode Fuzzy Hash: 449d9dd3561913765c9d5dae6f9bcce412c980db099287ce065e0476708c733a
                                  • Instruction Fuzzy Hash: FFB012F52F8101BD324421042D06C37011CD1D0B22330D82AB80CC4040F8684C444432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A59836
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 50dacc4a89885008250ca99169dcd3ae3f01f8df89c3ff56d7d6a61b1baa8945
                                  • Instruction ID: 25bcb9f6965821b74a1404ba784d8687276f8cd0eec9e26bc9003bb99ebd4c64
                                  • Opcode Fuzzy Hash: 50dacc4a89885008250ca99169dcd3ae3f01f8df89c3ff56d7d6a61b1baa8945
                                  • Instruction Fuzzy Hash: 70B012F92BC001FD3248A1042D07D3B011CE5C0B23330D42ABC09C8041F8500C0C4032
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A59836
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 5c282593143e52928a92cc0247dcdd53336e334f3ee04d52d499f29c31938a74
                                  • Instruction ID: c1c53dc884ee1a32d7a68e49503c3829a23d5e3cbb2734c732f27a19b1eb8b6b
                                  • Opcode Fuzzy Hash: 5c282593143e52928a92cc0247dcdd53336e334f3ee04d52d499f29c31938a74
                                  • Instruction Fuzzy Hash: 9AB012F92AC109FD321821002E47C3B011DF1C1B33330C43AB806C8041A8500C484032
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00A59836
                                    • Part of subcall function 00A59B04: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00A59B0F
                                    • Part of subcall function 00A59B04: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A59B77
                                    • Part of subcall function 00A59B04: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A59B88
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                  • String ID:
                                  • API String ID: 697777088-0
                                  • Opcode ID: 4c246ef32a78875a012fbe48e1a697c8a6e3ea43cf9ae730448b6a2d1eabd6fa
                                  • Instruction ID: 4a89d8f6480a3a84aca06bdf770cf66f53986ecfa9a8c0c37f1f20f5abcfdc82
                                  • Opcode Fuzzy Hash: 4c246ef32a78875a012fbe48e1a697c8a6e3ea43cf9ae730448b6a2d1eabd6fa
                                  • Instruction Fuzzy Hash: 35B012F92AC201FD324861043E07D3B021CE0C0B23330C41AB809C9041EC500C094032
                                  APIs
                                  • lstrlenW.KERNEL32(?,?,00000000,00000004,?,00A122B1,00000000,?,?,00000000,?,00A4FAC7,?,00A5B534,?,?), ref: 00A114DC
                                    • Part of subcall function 00A13C5F: GetProcessHeap.KERNEL32(00000000,?,?,00A122D5,?,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A13C67
                                    • Part of subcall function 00A13C5F: HeapSize.KERNEL32(00000000,?,00A122D5,?,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A13C6E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$ProcessSizelstrlen
                                  • String ID:
                                  • API String ID: 3492610842-0
                                  • Opcode ID: 0a9bc20b577574008a446ed869da8a82f1bf20f1ba18b7b4072ebe207b7929d4
                                  • Instruction ID: 86488c14d1392570b4d351a9034fcee22c1d6b531440fb848e9b80aea57cfa67
                                  • Opcode Fuzzy Hash: 0a9bc20b577574008a446ed869da8a82f1bf20f1ba18b7b4072ebe207b7929d4
                                  • Instruction Fuzzy Hash: 0A01D832100124BBCF116F55DC80FCA7B6AAF41BB0F104111FF156B191C770AD8096A1
                                  Strings
                                  • Failed to copy local source path for pseudo bundle., xrefs: 00A3C149
                                  • Failed to allocate space for burn package payload inside of related bundle struct, xrefs: 00A3C093
                                  • c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp, xrefs: 00A3C087, 00A3C0C0, 00A3C1AF, 00A3C3E0
                                  • Failed to append relation type to install arguments for related bundle package, xrefs: 00A3C2B6
                                  • -%ls, xrefs: 00A3C05E
                                  • Failed to copy repair arguments for related bundle package, xrefs: 00A3C2DE
                                  • Failed to copy display name for pseudo bundle., xrefs: 00A3C45D
                                  • Failed to copy download source for pseudo bundle., xrefs: 00A3C177
                                  • Failed to copy version for pseudo bundle., xrefs: 00A3C43B
                                  • Failed to allocate space for burn payload inside of related bundle struct, xrefs: 00A3C0CC
                                  • Failed to append relation type to uninstall arguments for related bundle package, xrefs: 00A3C352
                                  • Failed to append relation type to repair arguments for related bundle package, xrefs: 00A3C2FF
                                  • Failed to copy install arguments for related bundle package, xrefs: 00A3C295
                                  • Failed to allocate memory for dependency providers., xrefs: 00A3C3EC
                                  • Failed to copy key for pseudo bundle payload., xrefs: 00A3C101
                                  • Failed to allocate memory for pseudo bundle payload hash., xrefs: 00A3C1BB
                                  • Failed to copy cache id for pseudo bundle., xrefs: 00A3C26D
                                  • Failed to copy uninstall arguments for related bundle package, xrefs: 00A3C331
                                  • Failed to copy key for pseudo bundle., xrefs: 00A3C24E
                                  • Failed to copy filename for pseudo bundle., xrefs: 00A3C125
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID: -%ls$Failed to allocate memory for dependency providers.$Failed to allocate memory for pseudo bundle payload hash.$Failed to allocate space for burn package payload inside of related bundle struct$Failed to allocate space for burn payload inside of related bundle struct$Failed to append relation type to install arguments for related bundle package$Failed to append relation type to repair arguments for related bundle package$Failed to append relation type to uninstall arguments for related bundle package$Failed to copy cache id for pseudo bundle.$Failed to copy display name for pseudo bundle.$Failed to copy download source for pseudo bundle.$Failed to copy filename for pseudo bundle.$Failed to copy install arguments for related bundle package$Failed to copy key for pseudo bundle payload.$Failed to copy key for pseudo bundle.$Failed to copy local source path for pseudo bundle.$Failed to copy repair arguments for related bundle package$Failed to copy uninstall arguments for related bundle package$Failed to copy version for pseudo bundle.$c:\agent\_work\79\s\src\burn\engine\pseudobundle.cpp
                                  • API String ID: 1357844191-1088614172
                                  • Opcode ID: c1fa5fa66786c5a456e973a607bd4fa1775ed9fea270d51381ef5fa1c3d399db
                                  • Instruction ID: 135613b7da570ee01877eb0e2c6911ce1b93c80e16794258dcf9c0c99d92400d
                                  • Opcode Fuzzy Hash: c1fa5fa66786c5a456e973a607bd4fa1775ed9fea270d51381ef5fa1c3d399db
                                  • Instruction Fuzzy Hash: 01C1B072640652FBDB659F78CC45FAAB7A8BB04B20F008629FC05FB241D770EC609B90
                                  APIs
                                  • EnterCriticalSection.KERNEL32(00A7C6EC,00000000,?), ref: 00A5021E
                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00A5022E
                                  • GetCurrentThreadId.KERNEL32 ref: 00A50237
                                  • GetLocalTime.KERNEL32(?), ref: 00A5024D
                                  • LeaveCriticalSection.KERNEL32(00A7C6EC,?,?,00000000,0000FDE9), ref: 00A50344
                                  Strings
                                  • %ls[%04X:%04X][%04hu-%02hu-%02huT%02hu:%02hu:%02hu]%hs%03d:%ls %ls%ls, xrefs: 00A502EA
                                  • _`AB, xrefs: 00A501F6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CriticalCurrentSection$EnterLeaveLocalProcessThreadTime
                                  • String ID: %ls[%04X:%04X][%04hu-%02hu-%02huT%02hu:%02hu:%02hu]%hs%03d:%ls %ls%ls$_`AB
                                  • API String ID: 296830338-2581194003
                                  • Opcode ID: 0f59599b7be3b919def9cd24664e2d3d5cafd12cfb0e5cdcdc937685c50ca3ce
                                  • Instruction ID: 0ba94c887b8a3607abb277a9c6e74d83cf3d1e3cf45dfcba9b8eeb087de28990
                                  • Opcode Fuzzy Hash: 0f59599b7be3b919def9cd24664e2d3d5cafd12cfb0e5cdcdc937685c50ca3ce
                                  • Instruction Fuzzy Hash: F4416C71900219ABDB21DFE4DC49AFF77B8FB48762F108425FA01EA190D7349D85CBA1
                                  APIs
                                  • UuidCreate.RPCRT4(?), ref: 00A3D1A5
                                  • StringFromGUID2.OLE32(?,?,00000027), ref: 00A3D1CE
                                  • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?), ref: 00A3D2B7
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00A3D2C1
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000064,?,?,?,?), ref: 00A3D35A
                                  • WaitForSingleObject.KERNEL32(00A5B500,000000FF,?,?,?,?), ref: 00A3D365
                                  • ReleaseMutex.KERNEL32(00A5B500,?,?,?,?), ref: 00A3D38F
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00A3D3B0
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00A3D3BE
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00A3D3F6
                                    • Part of subcall function 00A3D038: WaitForSingleObject.KERNEL32(?,000000FF,759230B0,00000000,?,?,?,00A3D334,?), ref: 00A3D057
                                    • Part of subcall function 00A3D038: ReleaseMutex.KERNEL32(?,?,?,00A3D334,?), ref: 00A3D06B
                                    • Part of subcall function 00A3D038: WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A3D0B0
                                    • Part of subcall function 00A3D038: ReleaseMutex.KERNEL32(?), ref: 00A3D0C3
                                    • Part of subcall function 00A3D038: SetEvent.KERNEL32(?), ref: 00A3D0CC
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A3D49F
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A3D4B7
                                  Strings
                                  • NetFxEvent.%ls, xrefs: 00A3D21D
                                  • c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp, xrefs: 00A3D1E3, 00A3D2E5, 00A3D3E2, 00A3D41A
                                  • Failed to create netfx chainer guid., xrefs: 00A3D1B2
                                  • %ls /pipe %ls, xrefs: 00A3D271
                                  • Failed to convert netfx chainer guid into string., xrefs: 00A3D1ED
                                  • D, xrefs: 00A3D29C
                                  • Failed to allocate event name., xrefs: 00A3D231
                                  • NetFxSection.%ls, xrefs: 00A3D1FB
                                  • Failed to allocate section name., xrefs: 00A3D20F
                                  • Failed to wait for netfx chainer process to complete, xrefs: 00A3D424
                                  • Failed to process netfx chainer message., xrefs: 00A3D33A
                                  • _`AB, xrefs: 00A3D139
                                  • Failed to get netfx return code., xrefs: 00A3D3EC
                                  • Failed to create netfx chainer., xrefs: 00A3D250
                                  • Failed to CreateProcess on path: %ls, xrefs: 00A3D2F0
                                  • Failed to allocate netfx chainer arguments., xrefs: 00A3D285
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Wait$ErrorLastMutexObjectReleaseSingle$CloseCreateHandleProcess$CodeEventExitFromMultipleObjectsStringUuid
                                  • String ID: %ls /pipe %ls$D$Failed to CreateProcess on path: %ls$Failed to allocate event name.$Failed to allocate netfx chainer arguments.$Failed to allocate section name.$Failed to convert netfx chainer guid into string.$Failed to create netfx chainer guid.$Failed to create netfx chainer.$Failed to get netfx return code.$Failed to process netfx chainer message.$Failed to wait for netfx chainer process to complete$NetFxEvent.%ls$NetFxSection.%ls$_`AB$c:\agent\_work\79\s\src\burn\engine\netfxchainer.cpp
                                  • API String ID: 1533322865-1370055583
                                  • Opcode ID: f127922b02d1105dd2a925ccf9c9cd37988e7ff725e583966c79fdc59ff28854
                                  • Instruction ID: e3ee2e391b3e50e960bbaeb5c138440d38d79c3f6906b168833975d07dfa552a
                                  • Opcode Fuzzy Hash: f127922b02d1105dd2a925ccf9c9cd37988e7ff725e583966c79fdc59ff28854
                                  • Instruction Fuzzy Hash: 7CA18A72D00328EBEB219BA8DD45BAEBBB8BB04711F118165F909FB251D7349D44CFA1
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000,00000000,?), ref: 00A28208
                                    • Part of subcall function 00A50B93: OpenProcessToken.ADVAPI32(?,00000008,?,?,?,?,?,?,00A28214,00000000), ref: 00A50BB1
                                    • Part of subcall function 00A50B93: GetLastError.KERNEL32(?,?,?,00A28214,00000000), ref: 00A50BBB
                                    • Part of subcall function 00A50B93: CloseHandle.KERNELBASE(?,?,?,?,00A28214,00000000), ref: 00A50C45
                                  • GetWindowsDirectoryW.KERNEL32(?,00000104,00000000), ref: 00A2822E
                                  • GetLastError.KERNEL32 ref: 00A28238
                                  • GetTempPathW.KERNEL32(00000104,?,00000000), ref: 00A282B5
                                  • GetLastError.KERNEL32 ref: 00A282BF
                                  • UuidCreate.RPCRT4(?), ref: 00A282FE
                                  Strings
                                  • Failed to create working folder guid., xrefs: 00A2830B
                                  • Failed to copy working folder path., xrefs: 00A28383
                                  • Failed to append bundle id on to temp path for working folder., xrefs: 00A28368
                                  • Failed to get windows path for working folder., xrefs: 00A28266
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 00A2825C, 00A282E3, 00A28334
                                  • _`AB, xrefs: 00A281BB
                                  • %ls%ls\, xrefs: 00A28350
                                  • Failed to get temp path for working folder., xrefs: 00A282ED
                                  • Failed to convert working folder guid into string., xrefs: 00A2833E
                                  • Failed to ensure windows path for working folder ended in backslash., xrefs: 00A28283
                                  • Failed to concat Temp directory on windows path for working folder., xrefs: 00A282A5
                                  • Temp\, xrefs: 00A2828D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Process$CloseCreateCurrentDirectoryHandleOpenPathTempTokenUuidWindows
                                  • String ID: %ls%ls\$Failed to append bundle id on to temp path for working folder.$Failed to concat Temp directory on windows path for working folder.$Failed to convert working folder guid into string.$Failed to copy working folder path.$Failed to create working folder guid.$Failed to ensure windows path for working folder ended in backslash.$Failed to get temp path for working folder.$Failed to get windows path for working folder.$Temp\$_`AB$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 266130487-3629876793
                                  • Opcode ID: b9bb800ca8fe1d3b13694fdec9b0105f99e27f806ac89ae580f8850bf46cf414
                                  • Instruction ID: b93608844f09dddddfbf33a1c8ef9c017b2278957ad71419e9d91ea8377bada3
                                  • Opcode Fuzzy Hash: b9bb800ca8fe1d3b13694fdec9b0105f99e27f806ac89ae580f8850bf46cf414
                                  • Instruction Fuzzy Hash: 4B41D676A52734B7D720D6E89D0AFDF73787B10B12F014661BD05FB180EB789D4586A0
                                  APIs
                                    • Part of subcall function 00A53D9B: GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00A53DEA
                                  • RegCloseKey.ADVAPI32(00000000,?,00A60F38,00020006,00000000,?,00000000,00000000,00000000,?,00000000,00000001,00000000,00000000), ref: 00A1F3E7
                                    • Part of subcall function 00A5178B: RegSetValueExW.ADVAPI32(?,00000005,00000000,00000004,?,00000004,00000001,?,00A1F234,00A60F38,Resume,00000005,?,00000000,00000000,00000000), ref: 00A517A0
                                  Strings
                                  • BundleResumeCommandLine, xrefs: 00A1F2EF, 00A1F382
                                  • Failed to write run key value., xrefs: 00A1F2E2
                                  • c:\agent\_work\79\s\src\burn\engine\registration.cpp, xrefs: 00A1F36B, 00A1F3B9
                                  • burn.runonce, xrefs: 00A1F281
                                  • Failed to write Resume value., xrefs: 00A1F23A
                                  • Failed to create run key., xrefs: 00A1F2C4
                                  • Failed to format resume command line for RunOnce., xrefs: 00A1F2A0
                                  • Failed to delete run key value., xrefs: 00A1F375
                                  • Failed to delete resume command line value., xrefs: 00A1F3C3
                                  • Resume, xrefs: 00A1F229
                                  • Installed, xrefs: 00A1F24C
                                  • Failed to write Installed value., xrefs: 00A1F25D
                                  • "%ls" /%ls, xrefs: 00A1F28C
                                  • Failed to write resume command line value., xrefs: 00A1F304
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CloseValueVersion
                                  • String ID: "%ls" /%ls$BundleResumeCommandLine$Failed to create run key.$Failed to delete resume command line value.$Failed to delete run key value.$Failed to format resume command line for RunOnce.$Failed to write Installed value.$Failed to write Resume value.$Failed to write resume command line value.$Failed to write run key value.$Installed$Resume$burn.runonce$c:\agent\_work\79\s\src\burn\engine\registration.cpp
                                  • API String ID: 2348918689-4238253642
                                  • Opcode ID: 6b37af0e74c5e87a9f12569f2969a3ddd5ab03dc0f1e3e646d756e0d8c19c297
                                  • Instruction ID: 62da5ef0b418dc5a43f0e9dd6a6ce99bfaa1bd286f3a44fba1caccb336be857d
                                  • Opcode Fuzzy Hash: 6b37af0e74c5e87a9f12569f2969a3ddd5ab03dc0f1e3e646d756e0d8c19c297
                                  • Instruction Fuzzy Hash: 2251F236D4076AFECF119BA4CD06AEEBA74BB00711F080536FD21BA090D7759A90AAD0
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,msi.dll,000000FF,http://appsyndication.org/2006/appsyn,000000FF,00000000,00000000,000002C0,?,00A58681,00000001,?), ref: 00A581B7
                                  • CompareStringW.KERNEL32(0000007F,00000000,digest,000000FF,002E0069,000000FF,?,00A58681,00000001,?), ref: 00A581D2
                                  • CompareStringW.KERNEL32(0000007F,00000000,name,000000FF,002E0069,000000FF,?,00A58681,00000001,?), ref: 00A581ED
                                  • CompareStringW.KERNEL32(0000007F,00000000,algorithm,000000FF,?,000000FF,?,00A58681,00000001,?), ref: 00A58259
                                  • CompareStringW.KERNEL32(0000007F,00000001,md5,000000FF,?,000000FF,?,00A58681,00000001,?), ref: 00A5827D
                                  • CompareStringW.KERNEL32(0000007F,00000001,sha1,000000FF,?,000000FF,?,00A58681,00000001,?), ref: 00A582A1
                                  • CompareStringW.KERNEL32(0000007F,00000001,sha256,000000FF,?,000000FF,?,00A58681,00000001,?), ref: 00A582C1
                                  • lstrlenW.KERNEL32(006C0064,?,00A58681,00000001,?), ref: 00A582DC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CompareString$lstrlen
                                  • String ID: algorithm$c:\agent\_work\79\s\src\libs\dutil\apuputil.cpp$digest$http://appsyndication.org/2006/appsyn$md5$msi.dll$name$sha1$sha256
                                  • API String ID: 1657112622-1078064088
                                  • Opcode ID: 7d25fd9accb9d31c4add6ac643b695416a9bab38a857bd84815dafc37181035e
                                  • Instruction ID: 68155023708d0ea7091ba582ce7c169da4bac15fdaa29032b801989fab75e4a8
                                  • Opcode Fuzzy Hash: 7d25fd9accb9d31c4add6ac643b695416a9bab38a857bd84815dafc37181035e
                                  • Instruction Fuzzy Hash: DA518231648B12BBEB205F449C46F597E61BB11B32F208715F934BE1E5DBB4E854C7A0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,?,00A1BACA,00000008,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B1DF
                                  • GetLastError.KERNEL32(?,00A1BACA,00000008,?,00000000,00000000,?,?,?,00000000,76EDC3F0,00000000), ref: 00A1B1EB
                                  • _memcmp.LIBVCRUNTIME ref: 00A1B293
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorHandleLastModule_memcmp
                                  • String ID: .wix$.wixburn$Bundle guid didn't match the guid in the PE Header in memory.$Failed to find Burn section.$Failed to find valid DOS image header in buffer.$Failed to find valid NT image header in buffer.$Failed to get module handle to process.$Failed to read section info, data to short: %u$Failed to read section info, unsupported version: %08x$burn$c:\agent\_work\79\s\src\burn\engine\section.cpp
                                  • API String ID: 3888311042-1220921555
                                  • Opcode ID: 7e37e3385e0df71ff4d2171b8d15eb00c821ef18caba1dc6b4500c28c09ac627
                                  • Instruction ID: 14c598098cbcdfd9ee3ee820da911117ed0869c40a00d6f94e195736f974d018
                                  • Opcode Fuzzy Hash: 7e37e3385e0df71ff4d2171b8d15eb00c821ef18caba1dc6b4500c28c09ac627
                                  • Instruction Fuzzy Hash: 19417B32290310F7D7209B418D42EEF6251BF51B23B298425FD126F181EB79C98E82B5
                                  APIs
                                  • GetSystemTime.KERNEL32(?), ref: 00A1608A
                                  • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,00000000,00000000), ref: 00A1609E
                                  • GetLastError.KERNEL32 ref: 00A160B0
                                  • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,?,00000000,?,00000000), ref: 00A16104
                                  • GetLastError.KERNEL32 ref: 00A1610E
                                  Strings
                                  • Failed to get the required buffer length for the Date., xrefs: 00A160D5
                                  • c:\agent\_work\79\s\src\burn\engine\variable.cpp, xrefs: 00A160CB, 00A16129
                                  • Failed to allocate the buffer for the Date., xrefs: 00A160EC
                                  • _`AB, xrefs: 00A16065
                                  • Failed to set variant value., xrefs: 00A1614C
                                  • Failed to get the Date., xrefs: 00A16133
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: DateErrorFormatLast$SystemTime
                                  • String ID: Failed to allocate the buffer for the Date.$Failed to get the Date.$Failed to get the required buffer length for the Date.$Failed to set variant value.$_`AB$c:\agent\_work\79\s\src\burn\engine\variable.cpp
                                  • API String ID: 2700948981-3821038866
                                  • Opcode ID: 0dec43975e4d53662130e43b63c1b2618248bcd288dd8cbd3adf274968355a38
                                  • Instruction ID: 35dad31f2622fb33cd7bd3ef946bd9076b32c468a702f034b70c5e730875196a
                                  • Opcode Fuzzy Hash: 0dec43975e4d53662130e43b63c1b2618248bcd288dd8cbd3adf274968355a38
                                  • Instruction Fuzzy Hash: BB319432A40329BBDB119BE8CD42FEFBA78BB04752F114525FE01F7281DA709D8586A1
                                  Strings
                                  • Failed to combine last source with source., xrefs: 00A2A103
                                  • Failed to copy source path., xrefs: 00A2A212
                                  • _`AB, xrefs: 00A2A027
                                  • WixBundleOriginalSource, xrefs: 00A2A0A5
                                  • WixBundleLayoutDirectory, xrefs: 00A2A15E
                                  • Failed to get current process directory., xrefs: 00A2A0E4
                                  • WixBundleLastUsedSource, xrefs: 00A2A08A
                                  • Failed to get bundle layout directory property., xrefs: 00A2A179
                                  • Failed to combine layout source with source., xrefs: 00A2A198
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirstlstrlen
                                  • String ID: Failed to combine last source with source.$Failed to combine layout source with source.$Failed to copy source path.$Failed to get bundle layout directory property.$Failed to get current process directory.$WixBundleLastUsedSource$WixBundleLayoutDirectory$WixBundleOriginalSource$_`AB
                                  • API String ID: 2767606509-109321133
                                  • Opcode ID: 257d6ab22aeb1482059a7af8140f298f6e683206b44e9643e87d9ecdf6be32e7
                                  • Instruction ID: f7942bb6473ca94758862267ea3670db46a750183748750f0e4e77482cb2cfc4
                                  • Opcode Fuzzy Hash: 257d6ab22aeb1482059a7af8140f298f6e683206b44e9643e87d9ecdf6be32e7
                                  • Instruction Fuzzy Hash: B5813872D00229EBDF15DFA8E941AEEBBB5BF18720F140139F910B72A1D7319D518BA1
                                  APIs
                                  • ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000040,00000000,00000000), ref: 00A131BC
                                  • GetLastError.KERNEL32 ref: 00A131C2
                                  • ExpandEnvironmentStringsW.KERNEL32(00000040,00000000,00000040,00000000,00000000), ref: 00A1321C
                                  • GetLastError.KERNEL32 ref: 00A13222
                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A132D6
                                  • GetLastError.KERNEL32 ref: 00A132E0
                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A13336
                                  • GetLastError.KERNEL32 ref: 00A13340
                                  Strings
                                  • @, xrefs: 00A13196
                                  • c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp, xrefs: 00A131E6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnvironmentExpandFullNamePathStrings
                                  • String ID: @$c:\agent\_work\79\s\src\libs\dutil\pathutil.cpp
                                  • API String ID: 1547313835-3275428685
                                  • Opcode ID: 226672fc99550abf353c4dba0dd80c69a3b116dab16a2e8a093119b9bf5b5957
                                  • Instruction ID: 782f380264bf63468c1a04caf859c354375bb0534dd70c35d763377d415960d8
                                  • Opcode Fuzzy Hash: 226672fc99550abf353c4dba0dd80c69a3b116dab16a2e8a093119b9bf5b5957
                                  • Instruction Fuzzy Hash: 45618F73D01229BBDF219FE58944BDEBA78AF00761F114261EE10BB150E7359F8087A4
                                  APIs
                                  • LoadBitmapW.USER32(?,00000001), ref: 00A2E16A
                                  • GetLastError.KERNEL32 ref: 00A2E176
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00A2E1BD
                                  • GetCursorPos.USER32(?), ref: 00A2E1DE
                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00A2E1F0
                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00A2E206
                                  Strings
                                  • Failed to load splash screen bitmap., xrefs: 00A2E1A4
                                  • (, xrefs: 00A2E1FD
                                  • _`AB, xrefs: 00A2E13A
                                  • c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp, xrefs: 00A2E19A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Monitor$BitmapCursorErrorFromInfoLastLoadObjectPoint
                                  • String ID: ($Failed to load splash screen bitmap.$_`AB$c:\agent\_work\79\s\src\burn\engine\splashscreen.cpp
                                  • API String ID: 2342928100-2937232581
                                  • Opcode ID: 94ffb57a91ba3863285cd9de7a957cce45b2b3e93a141024e9f750dc0ec1b2cc
                                  • Instruction ID: de5fcf6ac78363bcdb406979ef71e0aad3e10767014919f2945424670da2f173
                                  • Opcode Fuzzy Hash: 94ffb57a91ba3863285cd9de7a957cce45b2b3e93a141024e9f750dc0ec1b2cc
                                  • Instruction Fuzzy Hash: 85314F75A00215AFDB10CFBCD949A9EBBB4FF08711F048525F905EB281EB70E945CBA0
                                  APIs
                                  • GetCurrentProcessId.KERNEL32(?,00000000,?,?,00A5B500), ref: 00A25059
                                  • GetProcessId.KERNEL32(000000FF,?,?,open,00000000,00000000,?,000000FF,?,?), ref: 00A250F7
                                  • CloseHandle.KERNEL32(00000000), ref: 00A25110
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Process$CloseCurrentHandle
                                  • String ID: -q -%ls %ls %ls %u$Failed to allocate parameters for elevated process.$Failed to launch elevated child process: %ls$burn.elevated$open$runas
                                  • API String ID: 2815245435-1352204306
                                  • Opcode ID: 8ac3c72a12bde3a9e64ff550392ec937519e3f39ac3696ba40f3d633840a72d2
                                  • Instruction ID: 703445240483db6408701e7cb8144e531b4fa4b783c9c7aabe07d7b41eb83e22
                                  • Opcode Fuzzy Hash: 8ac3c72a12bde3a9e64ff550392ec937519e3f39ac3696ba40f3d633840a72d2
                                  • Instruction Fuzzy Hash: C7218075D00619FFCF019FA8ED418EEBBB8FF09355B10456AF911A2240D7319E509B90
                                  APIs
                                  • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A11184
                                  • GetModuleHandleW.KERNEL32(kernel32,?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A1118F
                                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00A1119D
                                  • GetLastError.KERNEL32(?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A111B8
                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00A111C0
                                  • GetLastError.KERNEL32(?,?,?,?,?,00A1111A,cabinet.dll,00000009,?,?,00000000), ref: 00A111D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressErrorLastProc$HandleHeapInformationModule
                                  • String ID: SetDefaultDllDirectories$SetDllDirectoryW$kernel32
                                  • API String ID: 3104334766-1824683568
                                  • Opcode ID: f19ad3b0a69e60eb35c8a437a1863d1ec27566c77f376bbe7000e3c480a4be78
                                  • Instruction ID: 10b50e2cb206b58dc856aa7a4742dde380f8a64a2b70d52b5a9f468433e6047d
                                  • Opcode Fuzzy Hash: f19ad3b0a69e60eb35c8a437a1863d1ec27566c77f376bbe7000e3c480a4be78
                                  • Instruction Fuzzy Hash: 8A017131310316BA9B10AFA6AC49DAFBB6CFB417637004515FE1692180E770DA89CBB1
                                  APIs
                                  • CompareStringW.KERNEL32(0000007F,00000000,7591DFD0,000000FF,type,000000FF,?,7591DFD0,7591DFD0,7591DFD0), ref: 00A57180
                                  • SysFreeString.OLEAUT32(00000000), ref: 00A571CB
                                  • SysFreeString.OLEAUT32(00000000), ref: 00A57247
                                  • SysFreeString.OLEAUT32(00000000), ref: 00A57293
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: String$Free$Compare
                                  • String ID: `)u$type$url
                                  • API String ID: 1324494773-3139739812
                                  • Opcode ID: e566617fb9c45c302dabedb1777bf43e385a6b88a51e80e82a4d102b9d88950b
                                  • Instruction ID: 386876f953ad8c80086a624ad37d11fcadea5fd84c1b320a45a9c5ceb45bf9c8
                                  • Opcode Fuzzy Hash: e566617fb9c45c302dabedb1777bf43e385a6b88a51e80e82a4d102b9d88950b
                                  • Instruction Fuzzy Hash: 03513B32905219FBCF15DBA4D948EEEBBB8BF04712F144299F911BB1A0DB319E48DB50
                                  APIs
                                  • _memcmp.LIBVCRUNTIME ref: 00A291F9
                                    • Part of subcall function 00A55922: GetLastError.KERNEL32(?,?,00A2921E,?,00000003,?,?), ref: 00A55941
                                  • _memcmp.LIBVCRUNTIME ref: 00A29233
                                  • GetLastError.KERNEL32 ref: 00A292AB
                                  Strings
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 00A292CF
                                  • Failed to find expected public key in certificate chain., xrefs: 00A2926E
                                  • _`AB, xrefs: 00A29171
                                  • Failed to get certificate public key identifier., xrefs: 00A292D9
                                  • Failed to read certificate thumbprint., xrefs: 00A2929F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorLast_memcmp
                                  • String ID: Failed to find expected public key in certificate chain.$Failed to get certificate public key identifier.$Failed to read certificate thumbprint.$_`AB$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 3428363238-793200336
                                  • Opcode ID: 5dafb3a4784954011adece9db928b616fbf79941a74d99ee3a9ec1abfbcbf441
                                  • Instruction ID: 762e30d8cf4cef6ccbe825dc74ec8027a8c3f3b592e4e3d91b91508e1609c3a1
                                  • Opcode Fuzzy Hash: 5dafb3a4784954011adece9db928b616fbf79941a74d99ee3a9ec1abfbcbf441
                                  • Instruction Fuzzy Hash: BD414A72E00225EBEB10DBA9D981AEFB7B8BF08B10F004169F905B7241D635ED44CBA4
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,759230B0,00000000,?,?,?,00A3D334,?), ref: 00A3D057
                                  • ReleaseMutex.KERNEL32(?,?,?,00A3D334,?), ref: 00A3D06B
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A3D0B0
                                  • ReleaseMutex.KERNEL32(?), ref: 00A3D0C3
                                  • SetEvent.KERNEL32(?), ref: 00A3D0CC
                                  Strings
                                  • Failed to send files in use message from netfx chainer., xrefs: 00A3D110
                                  • Failed to get message from netfx chainer., xrefs: 00A3D0ED
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: MutexObjectReleaseSingleWait$Event
                                  • String ID: Failed to get message from netfx chainer.$Failed to send files in use message from netfx chainer.
                                  • API String ID: 2608678126-3424578679
                                  • Opcode ID: 46562e720242a8fa8a15cf3df681212eb657c30c192572a59ae43413055c1c6a
                                  • Instruction ID: ea746fd4460356ed257e3d078f6c9c0dd3a043e0b3c147ae9606bc09c1390d80
                                  • Opcode Fuzzy Hash: 46562e720242a8fa8a15cf3df681212eb657c30c192572a59ae43413055c1c6a
                                  • Instruction Fuzzy Hash: 3131067290061AFFCB01DFA4DC45EEEBBB8BF05325F148366F515A2291C774DA518BA0
                                  APIs
                                    • Part of subcall function 00A139DF: GetProcessHeap.KERNEL32(?,?,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F0
                                    • Part of subcall function 00A139DF: RtlAllocateHeap.NTDLL(00000000,?,00A1237C,?,00000001,75A8B390,8000FFFF,?,?,00A5058B,?,?,00000000,00000000,8000FFFF), ref: 00A139F7
                                  • CreateWellKnownSid.ADVAPI32(00000000,00000000,00000000,00000000,00000044,00000001,00000000,00000000,?,?,00A28D01,0000001A,00000000,00000000,00000000,00000000), ref: 00A28152
                                  • GetLastError.KERNEL32(?,?,00A28D01,0000001A,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00A2815C
                                  Strings
                                  • Failed to create well known SID., xrefs: 00A2818A
                                  • c:\agent\_work\79\s\src\burn\engine\cache.cpp, xrefs: 00A28130, 00A28180
                                  • Failed to allocate memory for well known SID., xrefs: 00A2813A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCreateErrorKnownLastProcessWell
                                  • String ID: Failed to allocate memory for well known SID.$Failed to create well known SID.$c:\agent\_work\79\s\src\burn\engine\cache.cpp
                                  • API String ID: 2186923214-3348081855
                                  • Opcode ID: 5a445440469f95d2b97f0aed2d2e4254ff111a4ffbcca08b5b7390f56785c737
                                  • Instruction ID: 821a79d6da6f6994991b4ef21d5fd0a5022f18d0d907846510a98ba708aeba71
                                  • Opcode Fuzzy Hash: 5a445440469f95d2b97f0aed2d2e4254ff111a4ffbcca08b5b7390f56785c737
                                  • Instruction Fuzzy Hash: 4E012F33652231B7E7216759AE06E9F596CEF41F62B150125FD04BB1C0EE788E4281E0
                                  APIs
                                  • FormatMessageW.KERNEL32(00A142CC,00A154CB,?,00000000,00000000,00000000,?,80070656,?,?,?,00A2E5DB,00000000,00A154CB,00000000,80070656), ref: 00A120A9
                                  • GetLastError.KERNEL32(?,?,?,00A2E5DB,00000000,00A154CB,00000000,80070656,?,?,00A2403F,00A154CB,?,80070656,00000001,crypt32.dll), ref: 00A120B6
                                  • LocalFree.KERNEL32(00000000,?,00000000,00000000,?,?,?,00A2E5DB,00000000,00A154CB,00000000,80070656,?,?,00A2403F,00A154CB), ref: 00A120FD
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\strutil.cpp, xrefs: 00A120DA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFormatFreeLastLocalMessage
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\strutil.cpp
                                  • API String ID: 1365068426-2901571208
                                  • Opcode ID: cd6bbee169aa906c223d40d770c5953dbdbda669dacc05968d3cc41bb315ddf8
                                  • Instruction ID: 4b1eef3c7bd5147a12f459f607fe27c387da798d93898159e9d693ba6c03abbf
                                  • Opcode Fuzzy Hash: cd6bbee169aa906c223d40d770c5953dbdbda669dacc05968d3cc41bb315ddf8
                                  • Instruction Fuzzy Hash: 5E016DB795112AFBEB20DB94DD09ADFBAACEF08751F014161BE01E7140E634CE50DBA0
                                  APIs
                                  • CreateFileW.KERNEL32(002E0032,40000000,00000001,00000000,00000002,00000080,00000000,00A20455,00000000,?,00A1F499,00A5B500,00000080,002E0032,00000000), ref: 00A55033
                                  • GetLastError.KERNEL32(?,00A1F499,00A5B500,00000080,002E0032,00000000,?,00A20455,crypt32.dll,00000094,?,?,?,?,?,00000000), ref: 00A55040
                                  • CloseHandle.KERNEL32(00000000,00000000,00A5B500,00A1F499,?,00A1F499,00A5B500,00000080,002E0032,00000000,?,00A20455,crypt32.dll,00000094), ref: 00A55094
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00A55064
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLast
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 2528220319-3405085980
                                  • Opcode ID: 58407c76771eaef482b0697b1337c34c205528041edcd5e929d53b490384b6eb
                                  • Instruction ID: 873e2cc017387a70e3d37e4d19efb0c0f2cc7f7cf4c439944305b896e7850d43
                                  • Opcode Fuzzy Hash: 58407c76771eaef482b0697b1337c34c205528041edcd5e929d53b490384b6eb
                                  • Instruction Fuzzy Hash: 4A01BC33A41A256BDA314AB99C19F9F3A24BB40B73F010210FE25AB1E0D7718C0196E0
                                  APIs
                                  • CLSIDFromProgID.OLE32(Microsoft.Update.AutoUpdate,00A154A3,?,00000000,00A154A3,?,?,?), ref: 00A54050
                                  • CoCreateInstance.OLE32(00000000,00000000,00000001,00A77AAC,?), ref: 00A54068
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: CreateFromInstanceProg
                                  • String ID: Microsoft.Update.AutoUpdate$_`AB
                                  • API String ID: 2151042543-2876930070
                                  • Opcode ID: 480d56be343da9c3c77356e5e5182b748d6922f1a14523da24cd578834bb7ec9
                                  • Instruction ID: f904673fbd983aad5a57a57b90f651f253ccfd5f8a278b035bfe48f08f122236
                                  • Opcode Fuzzy Hash: 480d56be343da9c3c77356e5e5182b748d6922f1a14523da24cd578834bb7ec9
                                  • Instruction Fuzzy Hash: 51F03A71610208BBEB00DBE8DD05AEFB7B8EF48751F504465EA01F6190D670AA0986B2
                                  APIs
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp, xrefs: 00A56274
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\dlutil.cpp
                                  • API String ID: 1659193697-1613074858
                                  • Opcode ID: db8a971e173aadbea5067a03e9eef0681003b8f9f3d31a934373922c4ffd479a
                                  • Instruction ID: 0fa51bb6545e87ecf299b3f6e69847fc6c5da8d30f3ba961127ca78f3127b2b5
                                  • Opcode Fuzzy Hash: db8a971e173aadbea5067a03e9eef0681003b8f9f3d31a934373922c4ffd479a
                                  • Instruction Fuzzy Hash: 5F51A072D0062AABDB219FE48C80AEFBBB9BF48752F554124FD04A7210DB30DD45DBA0
                                  APIs
                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,?,00A54218,?,?,?), ref: 00A550C6
                                  • GetLastError.KERNEL32(?,?,00A54218,?,?,?), ref: 00A550D0
                                  Strings
                                  • c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp, xrefs: 00A550F9
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: c:\agent\_work\79\s\src\libs\dutil\fileutil.cpp
                                  • API String ID: 442123175-3405085980
                                  • Opcode ID: d4b5008857983ba5ff61033e52af0019b7c23336eb44ea65f5eff8e2170fb4b1
                                  • Instruction ID: 1d5896783911f01514825da2feebb33b2d148b0f133674d230bbc3cbc4887c19
                                  • Opcode Fuzzy Hash: d4b5008857983ba5ff61033e52af0019b7c23336eb44ea65f5eff8e2170fb4b1
                                  • Instruction Fuzzy Hash: 2BF06D33A00629ABDB10CEAADD45EDFBB69BB40B62B114221FD04E6180E670A900C6E0
                                  APIs
                                  • GetProcAddress.KERNEL32(RegDeleteKeyExW,AdvApi32.dll), ref: 00A51133
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3297635874.0000000000A11000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00A10000, based on PE: true
                                  • Associated: 00000003.00000002.3297603093.0000000000A10000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297783757.0000000000A5B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297848804.0000000000A7B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                  • Associated: 00000003.00000002.3297905107.0000000000A7E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_a10000_EMA3D.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: AdvApi32.dll$RegDeleteKeyExW
                                  • API String ID: 190572456-850864035
                                  • Opcode ID: 9b14c97ec6c0672b62a7c57d8f0a1021679292d28afe261247b700055bb6800e
                                  • Instruction ID: 434f7bfa88416864c7ca9c3a1f8ca9f5920f6473a141ca7edc706ca2a92361ab
                                  • Opcode Fuzzy Hash: 9b14c97ec6c0672b62a7c57d8f0a1021679292d28afe261247b700055bb6800e
                                  • Instruction Fuzzy Hash: 32E0EC31A41721ABC725DF9CFD057513AA0F700B67F01C66CE50C96260DBB14ACACF90