Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
winrar-x64-701(1).exe

Overview

General Information

Sample name:winrar-x64-701(1).exe
Analysis ID:1530646
MD5:46c17c999744470b689331f41eab7df1
SHA1:b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256:c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:40%

Compliance

Score:48
Range:0 - 100

Signatures

Drops PE files to the user root directory
Writes a notice file (html or txt) to demand a ransom
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
EXE planting / hijacking vulnerabilities found
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Sigma detected: Classes Autorun Keys Modification
Stores files to the Windows start menu directory

Classification

  • System is w7x64
  • winrar-x64-701(1).exe (PID: 3368 cmdline: "C:\Users\user\Desktop\winrar-x64-701(1).exe" MD5: 46C17C999744470B689331F41EAB7DF1)
    • Uninstall.exe (PID: 3688 cmdline: "C:\Users\user\uninstall.exe" /setup MD5: 4783F1A5F0BBA7A6A40CB74BC8C41217)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: , EventID: 13, EventType: SetValue, Image: C:\Users\user\Uninstall.exe, ProcessId: 3688, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\(Default)
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\WinRAR.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\RarExtInstaller.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\Rar.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\Uninstall.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\UnRAR.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\WinRAR.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\RarExtInstaller.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\Rar.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\Uninstall.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeEXE: C:\Users\user\UnRAR.exeJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\ReadMe.txtJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\License.txtJump to behavior
Source: winrar-x64-701(1).exeStatic PE information: certificate valid
Source: winrar-x64-701(1).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, Default32.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\build\winrar64\Release\WinRAR.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon32\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon32.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-701(1).exe
Source: Binary string: D:\Projects\WinRAR\rarext\build\64\Release\rarext.pdb, source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, RarExt.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Zip32.SFX.0.dr
Source: Binary string: se\uninstall.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\Projects\WinRAR\rarext\build\64\Release\rarext.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, RarExt.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\unrar64\Release\UnRAR.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, UnRAR.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon64\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\uninstall\build\uninstall64\Release\uninstall.pdb source: Uninstall.exe, 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmp, Uninstall.exe, 00000004.00000000.384135535.000000013FA72000.00000002.00000001.01000000.0000000C.sdmp, Uninstall.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, Default.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Zip.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Rar.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon64\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\Installer\x64\Release\RarExtInstaller.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, RarExtInstaller.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\build\32\Release\rarext.pdb6 source: RarExt32.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701(1).exe
Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Rar.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\build\32\Release\rarext.pdb source: RarExt32.dll.0.dr
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F791F08 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_000000013F791F08
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B9B40 FindFirstFileExW,0_2_000000013F7B9B40
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A34D0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_000000013F7A34D0
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA49B10 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_000000013FA49B10
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA66DC0 FindFirstFileExW,4_2_000000013FA66DC0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Rar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: winrar-x64-701(1).exe, UnRAR.exe.0.dr, RarExtInstaller.exe.0.dr, WinRAR.exe.0.dr, Uninstall.exe.0.dr, RarExt32.dll.0.dr, RarExt.dll.0.dr, 7zxa.dll.0.dr, Rar.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: Order.htm.0.drString found in binary or memory: https://www.rarlab.com/registration.php
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drString found in binary or memory: https://www.rarlab.com/reminder.php?language=$L&source=rarlab&architecture=$A&version=$Vorder.htmInt
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drString found in binary or memory: https://www.rarlab.com/themes.htm
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, Uninstall.exe, 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmp, Order.htm.0.dr, Uninstall.exe.0.drString found in binary or memory: https://www.win-rar.com
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drString found in binary or memory: https://www.win-rar.comIhttps://notifier.win-rar.com/buyredirect?L=0&BL=0&src=wrr&arch=64&ver=701H
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile dropped: C:\Users\user\Rar.txt -> decrypt archive data and it cannot merge or create volumes. if no switches are specified, 'ch' command just copies the archive data without modification. if used with -amr switch to restore the saved archive name and time, other archive modification switches are ignored. example: set archive time to latest file: rar ch -tl files.rar cw write archive comment to specified file. format of output file depends on -sc switch. if output file name is not specified, comment data will be sent to stdout. examples: 1) rar cw arc comment.txt 2) rar cw -scuc arc unicode.txt 3) rar cw arc d delete files from archive. if this command removes all files from archive, the empty archive is removed. e extract files without archived paths. extract fJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A0A20 SetWindowLongPtrW,NtdllDefWindowProc_W,NtdllDefWindowProc_W,0_2_000000013F7A0A20
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F78C4E0: CreateFileW,CloseHandle,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_000000013F78C4E0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F78DE980_2_000000013F78DE98
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F795B4C0_2_000000013F795B4C
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A5ABC0_2_000000013F7A5ABC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7969600_2_000000013F796960
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A49300_2_000000013F7A4930
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7853300_2_000000013F785330
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F79D3C00_2_000000013F79D3C0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A41D00_2_000000013F7A41D0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F79EEF00_2_000000013F79EEF0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F797FC80_2_000000013F797FC8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7BCFAC0_2_000000013F7BCFAC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B7D400_2_000000013F7B7D40
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A1CE80_2_000000013F7A1CE8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B1D940_2_000000013F7B1D94
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B9B400_2_000000013F7B9B40
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7BCB100_2_000000013F7BCB10
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F788BE00_2_000000013F788BE0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B1B900_2_000000013F7B1B90
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F79F9B00_2_000000013F79F9B0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B19840_2_000000013F7B1984
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7989780_2_000000013F798978
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B28400_2_000000013F7B2840
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B78AC0_2_000000013F7B78AC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7877540_2_000000013F787754
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B17800_2_000000013F7B1780
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7847780_2_000000013F784778
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7C15180_2_000000013F7C1518
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B35D40_2_000000013F7B35D4
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B65C00_2_000000013F7B65C0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B15740_2_000000013F7B1574
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7994DC0_2_000000013F7994DC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B83C00_2_000000013F7B83C0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B13700_2_000000013F7B1370
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F78A1EC0_2_000000013F78A1EC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B31D00_2_000000013F7B31D0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F79F04C0_2_000000013F79F04C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA6CC504_2_000000013FA6CC50
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA4BA0C4_2_000000013FA4BA0C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA48F984_2_000000013FA48F98
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5C7804_2_000000013FA5C780
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA52FD84_2_000000013FA52FD8
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA4C7E04_2_000000013FA4C7E0
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5DFC04_2_000000013FA5DFC0
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA6C7044_2_000000013FA6C704
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5BF604_2_000000013FA5BF60
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA62D9C4_2_000000013FA62D9C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5C57C4_2_000000013FA5C57C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA6F5C84_2_000000013FA6F5C8
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA66DC04_2_000000013FA66DC0
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5BD5C4_2_000000013FA5BD5C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA69D304_2_000000013FA69D30
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5C3704_2_000000013FA5C370
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5DBBC4_2_000000013FA5DBBC
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA632304_2_000000013FA63230
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5D22C4_2_000000013FA5D22C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5C16C4_2_000000013FA5C16C
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA6A1CC4_2_000000013FA6A1CC
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA619284_2_000000013FA61928
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA638B04_2_000000013FA638B0
Source: Joe Sandbox ViewDropped File: C:\Users\user\7zxa.dll DB3D0484228ED14AD8D3763F4880D36024FB27B189C91720FF147B92D46BCB5A
Source: Joe Sandbox ViewDropped File: C:\Users\user\Default.SFX B83A105DDA4806F7AC5E9F3B6546829B37D42D85911D1C4487B1E95BFEA91E9D
Source: C:\Users\user\Uninstall.exeCode function: String function: 000000013FA41B9C appears 145 times
Source: C:\Users\user\Uninstall.exeCode function: String function: 000000013FA4E30C appears 35 times
Source: winrar-x64-701(1).exeBinary or memory string: OriginalFilename vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRarExtInstaller.exeD vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUninstall.exeD vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000000.351469154.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinRAR.exeD vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinRAR.exeD vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRarExt.dllD vs winrar-x64-701(1).exe
Source: winrar-x64-701(1).exeBinary or memory string: OriginalFilenameWinRAR.exeD vs winrar-x64-701(1).exe
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: sus24.rans.winEXE@3/38@0/0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F78BA38 GetLastError,FormatMessageW,LocalFree,0_2_000000013F78BA38
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA4853C GetDiskFreeSpaceExW,4_2_000000013FA4853C
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A02DC CLSIDFromString,CoCreateInstance,0_2_000000013F7A02DC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A1FEC FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GlobalUnlock,GlobalFree,0_2_000000013F7A1FEC
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\__tmp_rar_sfx_access_check_7330424Jump to behavior
Source: winrar-x64-701(1).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Uninstall.exeString found in binary or memory: -install -extall
Source: Uninstall.exeString found in binary or memory: -install
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile read: C:\Users\user\Desktop\winrar-x64-701(1).exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\winrar-x64-701(1).exe "C:\Users\user\Desktop\winrar-x64-701(1).exe"
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess created: C:\Users\user\Uninstall.exe "C:\Users\user\uninstall.exe" /setup
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess created: C:\Users\user\Uninstall.exe "C:\Users\user\uninstall.exe" /setupJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: dui70.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: cscdll.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: devrtl.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Uninstall.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: WinRAR.lnk.4.drLNK file: ..\..\..\..\..\..\..\WinRAR.exe
Source: WinRAR help.lnk.4.drLNK file: ..\..\..\..\..\..\..\WinRAR.chm
Source: Console RAR manual.lnk.4.drLNK file: ..\..\..\..\..\..\..\Rar.txt
Source: What is new in the latest version.lnk.4.drLNK file: ..\..\..\..\..\..\..\WhatsNew.txt
Source: WinRAR.lnk0.4.drLNK file: ..\..\..\..\..\..\Users\user\WinRAR.exe
Source: WinRAR help.lnk0.4.drLNK file: ..\..\..\..\..\..\Users\user\WinRAR.chm
Source: Console RAR manual.lnk0.4.drLNK file: ..\..\..\..\..\..\Users\user\Rar.txt
Source: What is new in the latest version.lnk0.4.drLNK file: ..\..\..\..\..\..\Users\user\WhatsNew.txt
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeAutomated click: OK
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeAutomated click: Install
Source: C:\Users\user\Uninstall.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Uninstall.exeWindow detected: Number of UI elements: 33
Source: winrar-x64-701(1).exeStatic PE information: certificate valid
Source: winrar-x64-701(1).exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: winrar-x64-701(1).exeStatic file information: File size 3948120 > 1048576
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: winrar-x64-701(1).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: winrar-x64-701(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, Default32.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\build\winrar64\Release\WinRAR.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon32\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon32.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-701(1).exe
Source: Binary string: D:\Projects\WinRAR\rarext\build\64\Release\rarext.pdb, source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, RarExt.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Zip32.SFX.0.dr
Source: Binary string: se\uninstall.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\Projects\WinRAR\rarext\build\64\Release\rarext.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, RarExt.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\unrar64\Release\UnRAR.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, UnRAR.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon64\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\uninstall\build\uninstall64\Release\uninstall.pdb source: Uninstall.exe, 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmp, Uninstall.exe, 00000004.00000000.384135535.000000013FA72000.00000002.00000001.01000000.0000000C.sdmp, Uninstall.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, Default.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Zip.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Rar.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rar\build\sfxcon64\Release\sfxcon.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinCon.SFX.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\Installer\x64\Release\RarExtInstaller.pdb source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, RarExtInstaller.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\build\32\Release\rarext.pdb6 source: RarExt32.dll.0.dr
Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701(1).exe
Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Rar.exe.0.dr
Source: Binary string: D:\Projects\WinRAR\rarext\build\32\Release\rarext.pdb source: RarExt32.dll.0.dr
Source: winrar-x64-701(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: winrar-x64-701(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: winrar-x64-701(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: winrar-x64-701(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: winrar-x64-701(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\__tmp_rar_sfx_access_check_7330424Jump to behavior
Source: winrar-x64-701(1).exeStatic PE information: section name: .didat
Source: winrar-x64-701(1).exeStatic PE information: section name: _RDATA
Source: Rar.exe.0.drStatic PE information: section name: _RDATA
Source: RarExtInstaller.exe.0.drStatic PE information: section name: _RDATA
Source: Uninstall.exe.0.drStatic PE information: section name: _RDATA
Source: UnRAR.exe.0.drStatic PE information: section name: _RDATA
Source: WinRAR.exe.0.drStatic PE information: section name: .didat
Source: WinRAR.exe.0.drStatic PE information: section name: _RDATA
Source: RarExt.dll.0.drStatic PE information: section name: _RDATA
Source: WinCon.SFX.0.drStatic PE information: section name: .didat
Source: WinCon.SFX.0.drStatic PE information: section name: _RDATA
Source: WinCon32.SFX.0.drStatic PE information: section name: .didat
Source: Zip.SFX.0.drStatic PE information: section name: .didat
Source: Zip.SFX.0.drStatic PE information: section name: _RDATA
Source: Zip32.SFX.0.drStatic PE information: section name: .didat
Source: Default.SFX.0.drStatic PE information: section name: .didat
Source: Default.SFX.0.drStatic PE information: section name: _RDATA
Source: Default32.SFX.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExtInstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Rar.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\UnRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\7zxa.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt32.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExtInstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Rar.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\UnRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\7zxa.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt32.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\ReadMe.txtJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\License.txtJump to behavior

Boot Survival

barindex
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExtInstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Rar.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Default32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\UnRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\WinCon32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\7zxa.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\RarExt32.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeFile created: C:\Users\user\Zip.SFXJump to dropped file
Source: C:\Users\user\Uninstall.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRARJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR help.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\Console RAR manual.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\What is new in the latest version.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRARJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR help.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\Console RAR manual.lnkJump to behavior
Source: C:\Users\user\Uninstall.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\What is new in the latest version.lnkJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeMemory allocated: 2EA0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeMemory allocated: 5FE0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\WinRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\RarExtInstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\WinCon.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\Zip32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\Default.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\Default32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\Rar.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\RarExt.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\UnRAR.exeJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\7zxa.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\WinCon32.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\RarExt32.dllJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeDropped PE file which has not been started: C:\Users\user\Zip.SFXJump to dropped file
Source: C:\Users\user\Desktop\winrar-x64-701(1).exe TID: 3444Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F791F08 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_000000013F791F08
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7B9B40 FindFirstFileExW,0_2_000000013F7B9B40
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A34D0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_000000013F7A34D0
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA49B10 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_000000013FA49B10
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA66DC0 FindFirstFileExW,4_2_000000013FA66DC0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A88A0 VirtualQuery,GetSystemInfo,0_2_000000013F7A88A0
Source: winrar-x64-701(1).exe, 00000000.00000003.383527806.000000000043E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qEmulateIE8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7AFEC8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013F7AFEC8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7BB630 GetProcessHeap,0_2_000000013F7BB630
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A9D00 SetUnhandledExceptionFilter,_invalid_parameter_noinfo,0_2_000000013F7A9D00
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7AFEC8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013F7AFEC8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A9458 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000013F7A9458
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7AA354 SetUnhandledExceptionFilter,0_2_000000013F7AA354
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7AA170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013F7AA170
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA54E10 SetUnhandledExceptionFilter,_invalid_parameter_noinfo,4_2_000000013FA54E10
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA5AE38 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000000013FA5AE38
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA55488 SetUnhandledExceptionFilter,4_2_000000013FA55488
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA55298 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000000013FA55298
Source: C:\Users\user\Uninstall.exeCode function: 4_2_000000013FA547F8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_000000013FA547F8
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A4930 SetDlgItemTextW,EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,ShowWindow,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,ShowWindow,ShowWindow,SetDlgItemTextW,ShowWindow,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SetDlgItemTextW,DeleteObject,DeleteObject,SendDlgItemMessageW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,SetForegroundWindow,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,0_2_000000013F7A4930
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeProcess created: C:\Users\user\Uninstall.exe "C:\Users\user\uninstall.exe" /setupJump to behavior
Source: winrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drBinary or memory string: %%=%c:%%=%c:EDITtooltips_class32CMDWNDADDCMDWNDOTHERCMDWNDCONVERTCMDWNDFINDCMDWNDBENCHCMDWNDREAD* %sHELPExecArcCmdInterface\CmdWin\%sDoneCMDMODETaskbarCreatedProgmanHELPCmdMode
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F79AEE4 cpuid 0_2_000000013F79AEE4
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: GetLocaleInfoW,0_2_000000013F7A2954
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\WinRAR.exe VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\WinRAR.chm VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\Rar.txt VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\WhatsNew.txt VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\WinRAR.exe VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\Rar.txt VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Uninstall.exeQueries volume information: C:\Users\user\WhatsNew.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F7A41D0 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,0_2_000000013F7A41D0
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeCode function: 0_2_000000013F792D64 GetVersionExW,0_2_000000013F792D64
Source: C:\Users\user\Desktop\winrar-x64-701(1).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Exploitation for Privilege Escalation
121
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
12
Process Injection
2
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Search Order Hijacking
1
Registry Run Keys / Startup Folder
12
Process Injection
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Search Order Hijacking
1
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials36
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Search Order Hijacking
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
winrar-x64-701(1).exe0%VirustotalBrowse
winrar-x64-701(1).exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\7zxa.dll0%ReversingLabs
C:\Users\user\7zxa.dll0%VirustotalBrowse
C:\Users\user\Default.SFX0%ReversingLabs
C:\Users\user\Default.SFX1%VirustotalBrowse
C:\Users\user\Default32.SFX0%ReversingLabs
C:\Users\user\Default32.SFX0%VirustotalBrowse
C:\Users\user\Rar.exe0%ReversingLabs
C:\Users\user\Rar.exe0%VirustotalBrowse
C:\Users\user\RarExt.dll0%ReversingLabs
C:\Users\user\RarExt.dll0%VirustotalBrowse
C:\Users\user\RarExt32.dll0%ReversingLabs
C:\Users\user\RarExt32.dll0%VirustotalBrowse
C:\Users\user\RarExtInstaller.exe0%ReversingLabs
C:\Users\user\RarExtInstaller.exe0%VirustotalBrowse
C:\Users\user\UnRAR.exe0%ReversingLabs
C:\Users\user\UnRAR.exe0%VirustotalBrowse
C:\Users\user\Uninstall.exe3%ReversingLabs
C:\Users\user\Uninstall.exe3%VirustotalBrowse
C:\Users\user\WinCon.SFX0%ReversingLabs
C:\Users\user\WinCon.SFX0%VirustotalBrowse
C:\Users\user\WinCon32.SFX0%ReversingLabs
C:\Users\user\WinCon32.SFX0%VirustotalBrowse
C:\Users\user\WinRAR.exe0%ReversingLabs
C:\Users\user\WinRAR.exe0%VirustotalBrowse
C:\Users\user\Zip.SFX0%ReversingLabs
C:\Users\user\Zip.SFX1%VirustotalBrowse
C:\Users\user\Zip32.SFX0%ReversingLabs
C:\Users\user\Zip32.SFX0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.rarlab.com/themes.htm0%VirustotalBrowse
https://www.win-rar.com1%VirustotalBrowse
https://www.rarlab.com/reminder.php?language=$L&source=rarlab&architecture=$A&version=$Vorder.htmInt0%VirustotalBrowse
https://www.rarlab.com/registration.php0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.rarlab.com/themes.htmwinrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drfalseunknown
https://www.win-rar.comIhttps://notifier.win-rar.com/buyredirect?L=0&BL=0&src=wrr&arch=64&ver=701Hwinrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006FF4000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drfalse
    unknown
    https://www.rarlab.com/registration.phpOrder.htm.0.drfalseunknown
    https://www.win-rar.comwinrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, Uninstall.exe, 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmp, Order.htm.0.dr, Uninstall.exe.0.drfalseunknown
    https://www.rarlab.com/reminder.php?language=$L&source=rarlab&architecture=$A&version=$Vorder.htmIntwinrar-x64-701(1).exe, 00000000.00000003.383302856.0000000006BB0000.00000004.00000020.00020000.00000000.sdmp, WinRAR.exe.0.drfalseunknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1530646
    Start date and time:2024-10-10 10:17:38 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 51s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:winrar-x64-701(1).exe
    Detection:SUS
    Classification:sus24.rans.winEXE@3/38@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 117
    • Number of non-executed functions: 147
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 2.21.22.114, 2.21.22.106, 93.184.221.240
    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, wu.azureedge.net, download.windowsupdate.com.edgesuite.net
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    04:18:29API Interceptor237x Sleep call for process: winrar-x64-701(1).exe modified
    04:18:44API Interceptor54x Sleep call for process: Uninstall.exe modified
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\7zxa.dllnIoRMxnlzt.exeGet hashmaliciousCobaltStrikeBrowse
      nIoRMxnlzt.exeGet hashmaliciousCobaltStrikeBrowse
        XmS_Project.rarGet hashmaliciousUnknownBrowse
          TT ViewBot v3.7.zipGet hashmaliciousUnknownBrowse
            test.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
              https://www.mediafire.com/file/0k1qpxynn6wl5z6/Purchase+Inquiry++Uzbekistan+&+Greece+Customers.tgz/fileGet hashmaliciousAgentTeslaBrowse
                C:\Users\user\Default.SFXnIoRMxnlzt.exeGet hashmaliciousCobaltStrikeBrowse
                  nIoRMxnlzt.exeGet hashmaliciousCobaltStrikeBrowse
                    XmS_Project.rarGet hashmaliciousUnknownBrowse
                      TT ViewBot v3.7.zipGet hashmaliciousUnknownBrowse
                        test.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                          https://www.mediafire.com/file/0k1qpxynn6wl5z6/Purchase+Inquiry++Uzbekistan+&+Greece+Customers.tgz/fileGet hashmaliciousAgentTeslaBrowse
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Wed Apr 24 11:35:16 2024, length=108383, window=hide
                            Category:dropped
                            Size (bytes):832
                            Entropy (8bit):4.7875179191521875
                            Encrypted:false
                            SSDEEP:12:8ZZ2v4RCrOvSpiseNMlWlEaXolZFp6NwuG3YilMMEpxRljKZTdc7y/Tdc7X:8jLRExIseNkWCqolAw3q0yW7yr
                            MD5:23290A796D6B01E8596D5EBA1FEBA453
                            SHA1:599D519ED8C757AF58D0D86033032E7EC17F4E1A
                            SHA-256:6ED10475A1DC040602E50A384F69494C23DD45498E52A7B70FF5B225151B89A0
                            SHA-512:6EC511EF4429BA9112FF93AE5A302EC00836E126A0852FF7450CC4CBFF6826FA2EB3EB18EA0C59FE331B59D3C411A027896B6438A31DC63564592EF7BCE9DEBC
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... .....=.......=.......L.C..._............................DG..Yr?.D..U..k0.~.t...CFSF..2._....Xid .Rar.txt...t.Y^...H.g.3..(.....gVA.G..k...<......JYVBJYVB*.........................R.a.r...t.x.t...B...i...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\Rar.txt.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.%.....\.....\.....\.....\.....\.....\.U.s.e.r.s.\.A.l.b.u.s.\.R.a.r...t.x.t...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Sun May 12 09:02:33 2024, length=46292, window=hide
                            Category:dropped
                            Size (bytes):863
                            Entropy (8bit):4.790126072770396
                            Encrypted:false
                            SSDEEP:12:8GSf4BgaRaCMZzIislYMlWlEaszElZFp6NwuG3YilMMEpxRljKZTddy/TddX:8mBhaZz7slYkWCXzElAw3q0q7P
                            MD5:2E6B9A14988C1987299CB72453E53290
                            SHA1:DFD1316E253DE0B08AACFF3039B2E6773FD13EF7
                            SHA-256:98981B824606A9993140460F03208F2F4EA6B015D47578C95DD5A19E6263B46D
                            SHA-512:EB108BAAB05F1A71ACF79FB68ECF8FD2FEF96F8B1BF070703BD6533E5D5B4532640DF75A37BE66529CA2E7D2F492BED9F55F9E053429AD9EF526BCBABA8A0718
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... ...c.?.....c.?.......y.S...............................DG..Yr?.D..U..k0..t.".CFSF..2.....XQP .WhatsNew.txt....t.Y^...H.g.3..(.....gVA.G..k...F......JYVBJYVB*.........................W.h.a.t.s.N.e.w...t.x.t...H...n...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WhatsNew.txt.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.*.....\.....\.....\.....\.....\.....\.U.s.e.r.s.\.A.l.b.u.s.\.W.h.a.t.s.N.e.w...t.x.t...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:44 2024, mtime=Thu Oct 10 07:18:44 2024, atime=Sun May 12 09:17:28 2024, length=324272, window=hide
                            Category:dropped
                            Size (bytes):851
                            Entropy (8bit):4.816525321852148
                            Encrypted:false
                            SSDEEP:12:8R19p4mJHLLC75PszWis4MlWlEaUcsz3SFp6NwuG3YilMMEpxRljKZTd0Cy/Td0i:8R1oeH3w4ls4kWCy4Jw3q0at7ai
                            MD5:ED0A7FAE3C8BAD80FA5A2372CEFE6A37
                            SHA1:D64965072069F756EB4BD3C27758579671D7A258
                            SHA-256:F76FB4A2FC1632BC423C1CB58FDE78973A9E71F2A564666A1D5AD22833395C26
                            SHA-512:7A6435677447D44A30BF32FF020D7123F1C7DF48704AA886CCAFB28CAAE542A9551E1BD5D0534BFEDD44C0F57EB6B9A7FFD7C342CD897E7C498E74D83B2277D5
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... .................E.n.U................................DG..Yr?.D..U..k0..t. .CFSF..2......X/R .WinRAR.chm....t.Y^...H.g.3..(.....gVA.G..k...B......JYWBJYWB*.........................W.i.n.R.A.R...c.h.m...F...l...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WinRAR.chm.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.(.....\.....\.....\.....\.....\.....\.U.s.e.r.s.\.A.l.b.u.s.\.W.i.n.R.A.R...c.h.m...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Wed May 15 06:35:22 2024, length=3286680, window=hide
                            Category:dropped
                            Size (bytes):851
                            Entropy (8bit):4.7921618322653865
                            Encrypted:false
                            SSDEEP:12:8mRp4m7CwoFszAvisWMlWlEaUcszAUmTFp6NwuG3YilMMEpxRljKZTdIy/TdIX:8mkuy4bsWkWCy4fw3q057u
                            MD5:EF850AC9735C9770F0CD99714FE3E04E
                            SHA1:AFDB93F049961B9E0991EAC65214BD27F8C9A188
                            SHA-256:43047A93F9386C76A7C2C755538C11E2C85E81D3E8AB62417995EF9F33210C25
                            SHA-512:0EC29F76B4CAFFC49A0867C145BF65CD2ED2ED5D7F2EC0522480F736B855165AA084C52B1EFFC9329B74233F8777B82680AC296D69D456FFCB7BA5B0CF079B56
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... ...e.R.....e.R........q.....&2..........................DG..Yr?.D..U..k0..t. .CFSF..2..&2..Xl< .WinRAR.exe....t.Y^...H.g.3..(.....gVA.G..k...B......JYVBJYVB*.........................W.i.n.R.A.R...e.x.e...F...l...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WinRAR.exe.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.(.....\.....\.....\.....\.....\.....\.U.s.e.r.s.\.A.l.b.u.s.\.W.i.n.R.A.R...e.x.e...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):226456
                            Entropy (8bit):6.366028824236922
                            Encrypted:false
                            SSDEEP:3072:+ftOtcS7lCZc9Ltue1C+zV2zUmiRvgWDFSaRPQIDCuPK1gSBvAGfPFjaRv+PB7PT:etViwgLtun+soC1vx2Hr0/NG1E
                            MD5:04D3E794624A82228A7E683FDF22E182
                            SHA1:114B74E926913BB0A588E671025F9EB38E8B854B
                            SHA-256:DB3D0484228ED14AD8D3763F4880D36024FB27B189C91720FF147B92D46BCB5A
                            SHA-512:B5767971F9075B5E483F9E77DCB50637EB81D70DA86D655A230DA6AD3DC5337D2A08038261F32E3867FDE68FD33BF23A75B50E0381762BECB46E859404E78D82
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: nIoRMxnlzt.exe, Detection: malicious, Browse
                            • Filename: nIoRMxnlzt.exe, Detection: malicious, Browse
                            • Filename: XmS_Project.rar, Detection: malicious, Browse
                            • Filename: TT ViewBot v3.7.zip, Detection: malicious, Browse
                            • Filename: test.pdf.lnk.mal.lnk, Detection: malicious, Browse
                            • Filename: , Detection: malicious, Browse
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........qt9...j...j...j.gj...j.aj...j...j...j.tj...jt..k...j.wj...j.b.k...j.`j...j.fj...j.bj...jRich...j........PE..d......f.........." .....r...2.......S....................................................`......................................... ...........P................&...L...(..............................................................p............................text....q.......r.................. ..`.rdata...............v..............@..@.data....]... ......................@....pdata...&.......(..................@..@.rsrc................,..............@..@.reloc...............D..............@..B................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Wed Apr 24 11:35:16 2024, length=108383, window=hide
                            Category:dropped
                            Size (bytes):814
                            Entropy (8bit):4.795556189671133
                            Encrypted:false
                            SSDEEP:12:8ZZ2v4RCrOvSpiseNMlWlEa4iolZFp6NwuG3YilMMEpxRljKZTdc7y/Tdc7X:8jLRExIseNkWChiolAw3q0yW7yr
                            MD5:383AF18C044E861871C050791F1C43A2
                            SHA1:E2A169B2230C238CB5F421E7FC7D40F9621FB0AE
                            SHA-256:AA889C2AE6CB4F6FD44955686D2B07FF30068FC6234D47966FD6B693B42BD9A4
                            SHA-512:02FBE6F47CE09580A80485B96C25CEADEF58639ABDD4C2AF0E97FB5DCDFCFAF58CBB92E684125810EED3FC17045061B9D8A7CDDE66B22D241B97F407EAA4D066
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... .....=.......=.......L.C..._............................DG..Yr?.D..U..k0.~.t...CFSF..2._....Xid .Rar.txt...t.Y^...H.g.3..(.....gVA.G..k...<......JYVBJYVB*.........................R.a.r...t.x.t...B...i...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\Rar.txt.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.......\.....\.....\.....\.....\.....\.....\.R.a.r...t.x.t...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Sun May 12 09:02:33 2024, length=46292, window=hide
                            Category:dropped
                            Size (bytes):845
                            Entropy (8bit):4.806329182189861
                            Encrypted:false
                            SSDEEP:12:8GSf4BgaRaCMZzIislYMlWlEaOpzElZFp6NwuG3YilMMEpxRljKZTddy/TddX:8mBhaZz7slYkWCzzElAw3q0q7P
                            MD5:3D0FB82CB0516162B465A2B3FA818F87
                            SHA1:C7C8293D5D70A1A02DF91728864A5CE93624AEF1
                            SHA-256:812AFD1FC5E9627663AC7B2ABA8DE2D81F485E32372FDF14215E5C71E438865E
                            SHA-512:4D6808259AFAFAB3CE8176647004114C6B5383C5EE7D1AA4F0D57286649B2DBD55D26EA8B392EDA6E618D452CE942D80D8D7DE1F55080E10560C4F80873394CA
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.... ...c.?.....c.?.......y.S...............................DG..Yr?.D..U..k0..t.".CFSF..2.....XQP .WhatsNew.txt....t.Y^...H.g.3..(.....gVA.G..k...F......JYVBJYVB*.........................W.h.a.t.s.N.e.w...t.x.t...H...n...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WhatsNew.txt.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.!.....\.....\.....\.....\.....\.....\.....\.W.h.a.t.s.N.e.w...t.x.t...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:44 2024, mtime=Thu Oct 10 07:18:44 2024, atime=Sun May 12 09:17:28 2024, length=324272, window=hide
                            Category:dropped
                            Size (bytes):833
                            Entropy (8bit):4.829783343698719
                            Encrypted:false
                            SSDEEP:12:8R19p4mJHLLC75PszWis4MlWlEarcWxsz3SFp6NwuG3YilMMEpxRljKZTd0Cy/TN:8R1oeH3w4ls4kWCyx4Jw3q0at7ai
                            MD5:FEF5D29980CF84DB0FBA74871B533BB7
                            SHA1:FE984FBB0DB29FE932861AF56AE9261FC67B12E6
                            SHA-256:410F13D53393AD75499E6398E25B697C61D7DD32892562BC2057D6B0B803EF82
                            SHA-512:4025FB0A477DB8CCF7CBB405C1B55654AB69C07CC4C00761111BACF8F1DDD13E2DBA16F6D77EE8DDCE7DF86DAD06D40837F88149CE52E4403AC981BD04AB5859
                            Malicious:false
                            Preview:L..................F.... .................E.n.U................................DG..Yr?.D..U..k0..t. .CFSF..2......X/R .WinRAR.chm....t.Y^...H.g.3..(.....gVA.G..k...B......JYWBJYWB*.........................W.i.n.R.A.R...c.h.m...F...l...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WinRAR.chm.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.......\.....\.....\.....\.....\.....\.....\.W.i.n.R.A.R...c.h.m...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 10 07:18:43 2024, mtime=Thu Oct 10 07:18:43 2024, atime=Wed May 15 06:35:22 2024, length=3286680, window=hide
                            Category:dropped
                            Size (bytes):833
                            Entropy (8bit):4.806228346687001
                            Encrypted:false
                            SSDEEP:12:8mRp4m7CwoFszAvisWMlWlEarcWxszAUmTFp6NwuG3YilMMEpxRljKZTdIy/TdIX:8mkuy4bsWkWCyx4fw3q057u
                            MD5:3CA6780E7BF7ECC5ED8583BB4FFDBA77
                            SHA1:4716B016A2C55D1293CBA022497B4EE78D7D78EA
                            SHA-256:2872125D3B46562B89D81063E6ED5AC848E33A6AAB1DED3EC06DED270F09E077
                            SHA-512:0ED070A74F74FDC2787F13F1873A4FA1E46D845BF1564368C0F84C78510CFACB1DB9F3B7DF5A6609361C7F0FD29BBFC8F6C3E9098B9B40244B8D7754B3BD6BE2
                            Malicious:false
                            Preview:L..................F.... ...e.R.....e.R........q.....&2..........................DG..Yr?.D..U..k0..t. .CFSF..2..&2..Xl< .WinRAR.exe....t.Y^...H.g.3..(.....gVA.G..k...B......JYVBJYVB*.........................W.i.n.R.A.R...e.x.e...F...l...............-...8...[...........Dg.v.....C:\Users\..#...................\\971342\Users.user\WinRAR.exe.*.P.r.o.c.e.s.s. .R.A.R.,. .Z.I.P. .a.n.d. .o.t.h.e.r. .a.r.c.h.i.v.e. .f.o.r.m.a.t.s.......\.....\.....\.....\.....\.....\.....\.W.i.n.R.A.R...e.x.e...C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.e.s.k.t.o.p.........................|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8...8.....[....
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):448000
                            Entropy (8bit):6.477949014491552
                            Encrypted:false
                            SSDEEP:12288:xyveQB/fTHIGaPkKEYzURNAwbAgB2X+t4:xuDXTIGaPhEYzUzA0/0
                            MD5:AB1C239D68D65D84EE139DD0C8CE8A52
                            SHA1:1A638556DE77369151839BF7A570D972410360E3
                            SHA-256:B83A105DDA4806F7AC5E9F3B6546829B37D42D85911D1C4487B1E95BFEA91E9D
                            SHA-512:EA2306628F2079BDF5420C12AF3D097C78FB3D3CD90AE2283C6F591E0751325F3AF675BB257B812BABB4D03F7493E2819B97FCA969DC9B5031EC07BB8517ECFB
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 1%, Browse
                            Joe Sandbox View:
                            • Filename: nIoRMxnlzt.exe, Detection: malicious, Browse
                            • Filename: nIoRMxnlzt.exe, Detection: malicious, Browse
                            • Filename: XmS_Project.rar, Detection: malicious, Browse
                            • Filename: TT ViewBot v3.7.zip, Detection: malicious, Browse
                            • Filename: test.pdf.lnk.mal.lnk, Detection: malicious, Browse
                            • Filename: , Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i..i.\.i..b.\.i..g.\.`.].C.\..Y.R.\..\.a.\...a.\..^.a.\.Rich`.\.........PE..d...#.@f.........."....!.h...8.................@..........................................`.............................................4......P.......`.......l0..............p....6..T....................7..(......@....................... ....................text...ng.......h.................. ..`.rdata...(.......*...l..............@..@.data...\...........................@....pdata..l0.......2..................@..@.didat..`...........................@..._RDATA..\...........................@..@.rsrc...`...........................@..@.reloc..p...........................@..B........................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):366592
                            Entropy (8bit):6.676160748927781
                            Encrypted:false
                            SSDEEP:6144:pVJQ3KJxNVhbU3y83OI1SFc+gcYjhLPNVOIopJrX+t4rR8o:7Jf/DdUC83OIgFc+tYjhLFH8rX+t498o
                            MD5:C5BCFD921F209366B9CFED632B174A3B
                            SHA1:332E2AEB7BC2D4491CBE4B994DBB8FF8E55FFF9F
                            SHA-256:476E3F779D2638238EA185DF6019E4FCB54B3704AD12DBD051399FCF26E6E1BF
                            SHA-512:72C0D13FA20A7648074601D5726F02C46EA7E62761F80366C2EBDCE40D95568543E11D42907D789864D178D5DA73992FC50400A50FC777B1BC02A02F9276FC55
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b#Rich2.b#........................PE..L.....@f...............!.............e............@.......................................@.........................p}..4....}..P.......`....................p...*...E..T....................F......X...@...................,r.. ....................text...,........................... ..`.rdata..............................@..@.data................t..............@....didat.......p......................@....rsrc...`...........................@..@.reloc...*...p...,...l..............@..B................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1984
                            Entropy (8bit):4.660424973452362
                            Encrypted:false
                            SSDEEP:48:1dilPla18jQ1TfzG7D6nmoLP0UTdfwGQ68Z:1VfwoLMUTO9
                            MD5:84846ABC52DC17020E4E934D3C94B4E6
                            SHA1:94562A3E13B3EDCCF1848EC0743CAF0E32ED5E3E
                            SHA-256:3449FD40D054C96285FAB92011E732174C7CD000EDA67470376F26F0D431F1F2
                            SHA-512:9B8CF7844D346B806E2FF6FE9D165D82FC7B4F764846C0F9B30443672E585F588399CF915DF728743E420FC8E58008F0373F7570C8483A2E408567AA1026900E
                            Malicious:false
                            Preview:7zxa.dll 7z decompression library..Default32.SFX 32 bit GUI RAR SFX module..Default.SFX 64 bit GUI RAR SFX module..Descript.ion File descriptions..License.txt License for use and distribution..Order.htm Registration information..Rar.exe Console RAR..Rar.txt Console RAR manual..RarLng.dll Language resources..RarExt.dll WinRAR shell extension..RarExt32.dll WinRAR shell extension for Windows x86..RarExt64.dll WinRAR shell extension for Windows x64..RarExtInstaller.exe Tool to install and uninstall WinRAR shell extension..RarExtLogo.altform-unplated_targetsize-32.png Graphic file for WinRAR shell extension..RarExtLogo.altform-unplated_targetsize-48.png Graphic file for WinRAR shell extension..RarExtLogo.altform-unplated_targetsize-64.png Graphic file for WinRAR shell extension..RarExtLogo_Default.altform-unplated_targetsize-32.png Graphic file for WinRAR shell extension..R
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6880
                            Entropy (8bit):4.374157879775667
                            Encrypted:false
                            SSDEEP:96:1ikG8jtbvVq93CLbKTy2tqxULp6C2t1fAOzm44owhAV4aOY5X3Uq2teNAZjweJ:k4DVqQKuABQvpDBEFtey6A
                            MD5:672064CF19DB0B083B981CF0BE7662B0
                            SHA1:C200C77558CA77C044A2C2D794C98F8437FFD2B4
                            SHA-256:9FC8AA33CCAFA04C1CE4C0A61047B341297D720ADAB1B77F67B5FE59F43BB59F
                            SHA-512:A016B287B6D1A4320BD5AB5790163F837A28B54D8BCCA56A51DC8B6A50374AACB35C0341D42915CD97D3B135DBF1F363087A4631DEB69F82811D41DB2F78A0A8
                            Malicious:false
                            Preview: END USER LICENSE AGREEMENT.... The following agreement regarding RAR (and its Windows version - WinRAR).. archiver - referred to as "software" - is made between win.rar GmbH -.. referred to as "licensor" - and anyone who is installing, accessing.. or in any other way using the software - referred to as "user"..... 1. The author and holder of the copyright of the software is.. Alexander L. Roshal. The licensor and as such issuer of the license.. and bearer of the worldwide exclusive usage rights including the rights.. to reproduce, distribute and make the software available to the public.. in any form is win.rar GmbH, Marienstr. 12, 10117 Berlin, Germany..... 2. The software is distributed as try before you buy. This means that.. anyone may use the software during a test period of a maximum of 40 days.. at no charge. Following this test period, the user must purchase.. a license to continue using the software..... 3. The software's tri
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:HTML document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3416
                            Entropy (8bit):5.03176338065389
                            Encrypted:false
                            SSDEEP:48:Mq9YxlbkLgrjd0M8LTyMMNnkVZcJE5NRQ3aTN1x2LJJ/krkhA/lSDFOeGfVKrlx:MTsgSJZcJETRkaqr1UlS5zGfVclx
                            MD5:5C336DE3B3D794322AD9E5915E3A509F
                            SHA1:5256262A417E9A29FE23E8CCA09782C7A3532FC9
                            SHA-256:BCE29EF3B95306CB7B304FB8C3039BE7157356D9F9D4E7E1C6BFBF02A117F48F
                            SHA-512:7243C9B8EB39FC8AA10EC8B5C290E27D44FA1C245F0478B75AE77964C178D41E9C1F651F987316F1153C1A7176EECEBC269FFB0C42CED5BD0B12E5CC1B95DA04
                            Malicious:false
                            Preview:<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN".. "http://www.w3.org/TR/html4/loose.dtd">..<html>....<head>..<title>How to buy WinRAR and RAR license</title>....<script type="text/javascript">.. ..function px(addr)..{.. for (I=0;I<addr.length;I++).. if (addr.charAt(I)=='z' && I+1<addr.length && addr.charAt(I+1)=='y').. I++.. else.. document.write(addr.charAt(I));..}....function mx(addr,text)..{.. document.write("<a href=\"mailto:");.. px(addr);.. document.write("\">");.. px(text);.. document.write("<\a>");..}..//-->..</script>....<style type="text/css">..body {font-family: "Arial",serif; font-size: smaller; background-color: #ffffff;}..h4 {text-align: center;}..</style>..</head>....<body>....<h4>How to buy WinRAR and RAR license.</h4>....<p>If you wish to use WinRAR and RAR after the evaluation period of 40 days,..you need to purchase its license from one of the regional dealers..<a href="https://www.rarlab.com/registration.php">listed here
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (console) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):762520
                            Entropy (8bit):6.480895043803242
                            Encrypted:false
                            SSDEEP:12288:F09QJ3MbqLyQx5ooXTAl080ejQsg6Udqmoy6jEIq+EpNUstSpx:G9C3MbqyeOojATzjaPiyQq+EpNlSpx
                            MD5:16659AE52CE03889AD19DB1F5710C6AA
                            SHA1:66B814FE3BE64229E2CC19F0A4460E123BA74971
                            SHA-256:0B1866B627D8078D296E7D39583C9F856117BE79C1D226B8C9378FE075369118
                            SHA-512:F9DD360C3A230131C08C4D5F838457F690ED4094EC166ACD9F141B7603F649CFA71A47EA80E9FF41B8296246BDC1C72A75288F9A836C18431E06C2E8E3FC8398
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Sg`.................................}......}......}.......~......}..!....~.............}..^...}......}......Rich............................PE..d....@f.........."....!............@..........@.....................................8....`..................................................^.......0..H........N...z...(..............T.......................(.......@............................................text............................... ..`.rdata...q.......r..................@..@.data...\A.......6...b..............@....pdata...N.......P..................@..@_RDATA..\.... ......................@..@.rsrc...H....0......................@..@.reloc...............n..............@..B................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):108383
                            Entropy (8bit):4.26316643545334
                            Encrypted:false
                            SSDEEP:768:FoxKukh1SIfjcjKVbRZHqT9E1qYiHSzoOKyGi018e5xCwVxD+wb+WkOPMYC7:FoxKuOKKV9Z699S7Kyi1ZbF7iWBXK
                            MD5:B954981A253F5E1EE25585037A0C5FEE
                            SHA1:96566E5C591DF1C740519371EE6953AC1DC6A13F
                            SHA-256:59E40B34B09BE2654B793576035639C459AD6E962F9F9CD000D556FA21B1C7CD
                            SHA-512:6A7772C6B404CD7FEE50110B894FF0C470E5813264E605852B8DCC06BFAEB62B8CC79ADCB695B3DA149E42D5372A0D730CC7E8ED893C0BD0EDB015FC088B7531
                            Malicious:true
                            Preview: User's Manual.. ~~~~~~~~~~~~~.. RAR 7.01 console version.. ~~~~~~~~~~~~~~~~~~~~~~~~.... =-=-=-=-=-=-=-=-=-=-=-=-=-=-.. Welcome to the RAR Archiver!.. -=-=-=-=-=-=-=-=-=-=-=-=-=-=.... Introduction.. ~~~~~~~~~~~~.... RAR is a console application allowing to manage archive files.. in command line mode. RAR provides compression, encryption,.. data recovery and many other functions described in this manual..... RAR supports only RAR format archives, which have .rar file name.. extension by default. ZIP and other formats are not supported... Even if you specify .zip extension when creating an archive, it will.. still be in RAR format. Windows users may install WinRAR, which supports.. more archive types including RAR and ZIP formats..... WinRAR provides both graphical user interface and command line mode... Wh
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):651416
                            Entropy (8bit):6.694392253598639
                            Encrypted:false
                            SSDEEP:12288:CheO83S/X2oc1fZy4CArT0pLGbNUnaC7PeUnBd3X3uK:CheOIS/GzfZpopLGbNUL2UnBd3X39
                            MD5:1E86C3BFCC0688BDBE629ED007B184B0
                            SHA1:793FADA637D0D462E3511AF3FFAEC26C33248FAC
                            SHA-256:7B08DAEE81A32F72DBC10C5163B4D10EB48DA8BB7920E9253BE296774029F4EF
                            SHA-512:4F8AE58BBF55ACB13600217ED0EEF09FA5F124682CEDD2BFC489D83D921F609B66B0294D8450ACB1A85D838ADB0E8394DADF5282817DBA576571E730704F43AC
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......gYP.#8>G#8>G#8>Gh@=F$8>Gh@;F.8>G.C.G'8>G.C:F38>G.C=F)8>G.C;F.8>Gh@:F28>Gh@8F"8>Gh@?F48>G#8?G'9>G.C7F.8>G.C>F"8>G.C.G"8>G#8.G"8>G.C<F"8>GRich#8>G................PE..d.....@f.........." ...!.8...z............................................................`A............................................l...,........0..8........].......(...........)..T....................*..(...`(..@............P...............................text....6.......8.................. ..`.rdata...n...P...p...<..............@..@.data...............................@....pdata...].......^..................@..@_RDATA..\.... ......................@..@.rsrc...8....0......................@..@.reloc..............................@..B........................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):554648
                            Entropy (8bit):6.907707531547957
                            Encrypted:false
                            SSDEEP:12288:WM7zuNOwsIJur4LnQkAifUsogbesSEpwpDBd3X3uQDc:WSz/ug4LQdh2es8pDBd3X3hc
                            MD5:24F6FAA5D2E9C8FB15AE0C936BFA4545
                            SHA1:17F85D25F0F0C15A164EB11A34F498268677DCB0
                            SHA-256:BD3F01E7C100422A6FAAE60D76DA16158F6D8B3868D474E81FD657EC3C0127EF
                            SHA-512:CD3F4DD020CAD0357BE2CC18459E7051D65F05B5DF60A8D980152179DFF6CC8DEDF9FEF758224E9B6ADC87DE9033D18DAA3E09AEA8AF2E2A1860EFC753A01380
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........l.....................h...t.......t.......t.......t.................................z.......z.......z..............z.......Rich....................PE..L.....@f...........!...!.v...................................................p......~0....@A.........................p..l...Lq..........8............N...(...0..T1.../..T...................@0......./..@...............(............................text....u.......v.................. ..`.rdata...............z..............@..@.data................n..............@....rsrc...8............~..............@..@.reloc..T1...0...2..................@..B........................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):186008
                            Entropy (8bit):6.251929166363143
                            Encrypted:false
                            SSDEEP:3072:YCXGYJKNlePjzWBEFxwk6m9xy7n/covzScPdpKatjS:YCXpAmzWGSk6mYc4rLDG
                            MD5:F5B54D16610A819BBC6099BDC92ADD2C
                            SHA1:7C680A87233FF7E75866657E9C1ACF97D69F6579
                            SHA-256:46F533007FB231D0B0AF058A0997AB5E6B44A1B02AE327621F04FDC4B2E18964
                            SHA-512:A120A2EE6C926CD6F6B8D1BE68FF471294552B049BAA637A474D1210FE3CA83E66D0834217D1A5EEA0491D080CEA1795EE328FDD4CB54F6A132BE2DC2E58E4A8
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l.....N...N...N.f.O...N.f.O...N.f.OC..NIv.O...NIv.O...NIv.O...N.uEN...N.f.O...N...N...NGv.O...NGv)N...N..AN...NGv.O...NRich...N................PE..d.....@f.........."....!.....&.......~.........@..........................................`..................................................w..................l........(......,....I..p............................G..@............................................text............................... ..`.rdata..............................@..@.data...p*...........n..............@....pdata..l...........................@..@_RDATA..\...........................@..@.rsrc...............................@..@.reloc..,...........................@..B........................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                            Category:dropped
                            Size (bytes):2183
                            Entropy (8bit):7.892242389507994
                            Encrypted:false
                            SSDEEP:48:XJu59Mz9ZOj4v0y+ptQo0QOKNxO4a9hOAZ0CZLFua1Q1WGl:XJK9MZ8K+pio0Q13OFWAZ0SLFFO1WO
                            MD5:85EE643E6B0837849E300B11395422C4
                            SHA1:4634019350AD8DD59FD6C99B4AABEA99CDF06BDD
                            SHA-256:8D42F3961E0E381EE32D3E1E144BFBB59294D43A9965E895FC75B8827ACD98E6
                            SHA-512:C744A6B2D64121A7AA279CD197790512C9B97264E70D7399BE992FC6F53BAE31B7143ED299B1A47E5DB1AD9BB82D982AE0988CDDF5E4E52814C5A3EADD107D95
                            Malicious:false
                            Preview:.PNG........IHDR... ... .....szz....NIDATX..Y..U..?g...2...m....i...4.....`.q..../jLT....#...E....1.<H.F.D.........e...s....v...p......y......]~.w.=^J~.._S...y.?7z..|.x.*...(epY.H...{.N....,[.G...R...*5....Lv.g.(..#.<...C......\.l...~.^/e....2.>0.4......0q5...,.K%.Z.........wZ....O.. ].BX.:.8...L..$.U./.d.+.a..........[.A.A..R.@=.F.....7......4.K.o...g.K`..V-......%0?...6s......g..$t.N.^\"..}....2*......&.C.l...`....p.. /...~.;y.,.B.d...J.[G...7r..:{..J..2....k%o..d..NZ......,.K.%P.PR0.+Y.[.;.^..ePz..96.o..Lh.-..aW.h..YH...t...NC.P.z.Zyg.G..._.G.1...j(.....ix.........3.g..K2..b2ow.1)'.\>.}..0[&k....y.p~>..p...2P1..X....9s...i{MUi.f..XNHy..j.....I=.^............2............}.d.. 3....j..J..T..Qh...V..F.r0.j...<.DcyC~Q.7^7..C.Le. t..Z....\c.Zc#...].F@.....w.0.kl.U.......+..(..J.j.@D.J.%.+.b(..yQR...Aj.J..U9<..S.c.Ch....7$.".s..6..k....]6v.2.{w......5x...Y....e..yT..=.M..?..V.-uXB.....[v36v..Z...Jk.V.R......iM.y.,g.....;>...f......o....OC.c.j<..(
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                            Category:dropped
                            Size (bytes):4179
                            Entropy (8bit):7.941638225376268
                            Encrypted:false
                            SSDEEP:96:HsNP4L15zRkIEBdPWt+zIeofvdWIcq4dkuRQVRv6hKXUvBzpoLb+qSEsYqw/m+wC:MNP015zRk/uczQfsIcq4SuiVx6KXaBzk
                            MD5:EC177CBE676473543E8C9B5D9FB0B797
                            SHA1:0D1BB7649D090831D2AB1F2FB44F580E0D4004D3
                            SHA-256:5E3C8BBCD81CD0C08819EDCBE04772DBD157F79373A0171B7BD914CF7A2CDEF9
                            SHA-512:925A86B5BE1C9FE91CC587B71A3E0D2FBF8EDDEF06093A8356BFFA955B63C296A041729DB38A9538DFC811B723E0ACA4B7A183AB0E9D12D0A302D1239DB12374
                            Malicious:false
                            Preview:.PNG........IHDR...0...0.....W.......IDATh..K.f.u..k.}...~..zWwU..v.6....+(....l).@+J.(AH.d..+(R..D...2.H.D....!A..A@..+...v...U....{o..=.c.V..[..KL...Ogp......_...o.o.oi...-....0...5'D....K.q..{A.......y................/P.~...* . .....O.T.....,..'...G..a.....Sd~.a...O.={..&{%E..............;...(..;..|.\.Sp.5..._....}.[..>.+....C...p...&G.c.mX.7..O.'.5....]..*....b.e...;...~...v.....h...-G.PRxG.. ...1.......fq#.Z.D...=6..o~.....~.{..?..#....2u......ABg.?.c..z....B.K.`6......5.}k...1.o...../*6RR.. ........CM.#:m^...@l`}.&6.....?3....5..o....t...W.....6_3?\a(.....|..>...7x..ekLL...9.].....O...#..+7.>~,prp..#.O8..;.....f...0..)..s.oX.#.~....[.O..M&.....:.Y<Xs...|..........T#.PO1W...........'H...9....h..r.-Yh...D....1|....h,..H.[.....rxx..L{.C.Q.W....q......?..s.X..Da...I<^@..|.|.B....:.,N..8.7<..Q........C...2..R..b.M{L...&Xg.&.{$...4.H=...|........).&G.."lS.E`[..(.g..$.i8.N79..R.a.9>.;.b.Y..z".....I.V.G.......X.d....h.{4e....p...(
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                            Category:dropped
                            Size (bytes):6234
                            Entropy (8bit):7.9623011066892895
                            Encrypted:false
                            SSDEEP:192:F7LhuPsvwxZKPeCHV6sZ68EUDfHZkmoWsm:F7SxEDHV6sZd3Nsm
                            MD5:248FA2B659874A14B43B5E0E17AC1CFF
                            SHA1:B6B0671E015104EE7F4BAC4E6ABF961EC55FDB12
                            SHA-256:ED99246EBC6FAD80103F1E887DD8388F67EB509FCBBA187AAA13556B8D884AB2
                            SHA-512:1A8E9F0C13D565CDAE77CC17942792E33861F056F73422EB2DF79FBA5DC241A37106C0BF7173F9BA83F517E2016E9D3B8E117DF2BD2D5972155781DBF147F90A
                            Malicious:false
                            Preview:.PNG........IHDR...@...@......iq....!IDATx..Y.^...k.}.7....5:UI%.......M..4$.R.@..~@B.7@<.3.... .H./-!.....A.PBe.RT..*..l.....^..}.]e...<um....g..............._..V7~...z.+.......H.4.. ..D.04.1'............../.......KW@.h....`. L....F.6.........6`.!.5c.g.6..B..F.s!..........W.....vu...........'......./.."ORx.=....- ....n.....=].....pn.....0S.*1.......}`I.Y.Z..m.4...O....h..3......p...l..t[...SB......N.@1..3..u...q.".J .y.....s..?d.)9;..G.a..G....K.49r...=...i2......Pq..6..o1............N....4aZy....G.v...[.j.8T.......?.*...=N*B.T._.h|...l.l6.L7.......}...^~./..e~.@#Ml8z...W......[|..|.q...>.Z.7.6=......W.........#..c.....h&..j...)..4..m..0..r..}.z.f..b.4.....i..^.G.;...}>B...eH...h..v....Z...Oq.._..~.f.F.M.l.dH....=......W..{..>....Y..cz.i4#=..G.G............y:.Y.G.....A.. ........'..t......._.....?z..j..'w=.<).........%.7x...X~.......h]d..S."a.X....... ..%b.C...6.3..~.2...5.U..Q..#.dSz..5...._."....-6.._9...L.<i....g....zLo..\.;.
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:Zip archive data, at least v4.5 to extract, compression method=store
                            Category:dropped
                            Size (bytes):24440
                            Entropy (8bit):7.925485516468654
                            Encrypted:false
                            SSDEEP:384:DBR015ziBz4oqvhFv+qkDmm0fxPZp7SxEDHV6sZd3NsSkI8mvC4j9tEIkTXBHhjA:PYzMzHshFvbkD9oZ06MsZd3w/abEIABS
                            MD5:4EBEB72C7DA644A296A0026C061DB51D
                            SHA1:6F94EA0EAE2664C8341265D62FF7D871DA702A76
                            SHA-256:DE451E233072B0D34ACECF04DDC38BCAD61B56A1E0218041CA0A80AD752BACCF
                            SHA-512:B4937191D5A61EBC41497938DA51F6C741D3DA6A9213E236CD62F82B106D311DB597C613BC924C18E3BDC654F3F8526F43CF13EDE0F00380AC22382713570153
                            Malicious:false
                            Preview:PK..-......z.X................StoreLogo.png.PNG........IHDR...2...2......?......sRGB.........gAMA......a.....pHYs..........o.d...WIDAThC.... .......)...I.k?.5?.n?.H...#5Fj....1Rc..H...#5Fj....1Rc..H...#5Fj....1Rc.e..<..`........IEND.B`.PK..@.k.................PK..-......z.X................Square150x150Logo.png.PNG........IHDR.............<.q.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....0..........o.......e..V....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H....H......|"A.(.2.....IEND.B`.PK..^bO.................PK..-......z.X............-...RarExtLogo.altform-unplated_targetsize-48.png.PNG........IHDR...0...0.....W.......IDATh..K.f.u..k.}...~..zWwU..v.6....+
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1306
                            Entropy (8bit):4.704353931608651
                            Encrypted:false
                            SSDEEP:24:XB0Ku+6fYEbsaoprp2Xc9wARVo+iL/5BiiUWeiaQPxvjf:xvSQEEpT2AXG/rPfP5
                            MD5:E70E22D45ECB35217D66A4CE30F081FA
                            SHA1:A5F6C6E1335596D50E89F99267773E30BEBE159E
                            SHA-256:9EB1099D7231CD24D8740609D3AC6985139F2334730356DF983AB01D7896AD6F
                            SHA-512:638AB88BCF95AA16E2F15036F3DE1C5803A30B518B1A283464444A9B2F04B45F7927FB3C4BF666740C8D042C991D872B6D5749BBD9A721A42DDE6DBF9F549CD3
                            Malicious:false
                            Preview:; File order list for solid archiving..;..; Here you may modify the file list which tells RAR the order in which..; to add files to a solid archive...;..; This file may contain file names, wildcards and a special entry - $default...; The default entry defines the position in the order list for files not..; matched with other entries in this file. Lines beginning with the semicolon..; symbol ';' are considered as comments and not processed...;..; Place this file in the same directory as RAR.EXE...;..; Tips to provide improved compression and speed of operation:..;..; - files containing similar information should be grouped together in the..; archive if possible;..; - frequently accessed files should be placed at the beginning...;..file_id.diz..descript.ion..read.*..readme.*..*.nfo..*.doc..*.txt..*.htm..*.html..*.shtml..*.css..*.xsl..*.xml..*.js..*.php..*.lst..*.log..*.ini..*.bat..*.cmd..*.h..*.hpp..*.c..*.cpp..*.java..*.asm..*.bas..*.bak..*.cue..*.rtf..*.hlp..*.inf..*.com..*.exe..*.dl
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1288
                            Entropy (8bit):4.706456912766128
                            Encrypted:false
                            SSDEEP:24:wT562i+znj04COlBEaT336uSXqzcrfMLosGPjJn9kn7f28hUHT16:wT562i6j04PBnj3PSXKEfKoseTc7f28v
                            MD5:00D0A57A6D64EE3DE8F4D5529D6C6447
                            SHA1:56C7A7FEFB01AA0A032A8E0F91EA9EFF53BEE1F3
                            SHA-256:FCD13E1B97AF47B8B923BA97AE15E9731C66093609667C3171D5DD24A6F7F2E6
                            SHA-512:A644967D0CD6EF47324B2E8C52698318C658D1B3B37E5F4DE5E6897AF9CA951B0611CEBA5C6D3E087CA9958286E481BECF9BBFA1C483CB11EBD2F4BE7526F474
                            Malicious:false
                            Preview: This archive contains WinRAR multifunctional archive manager..... WinRAR features:.... * WinRAR introduces an original compression algorithm. It provides.. a high compression ratio on executable files, object libraries,.. large text files, etc..... * Internally RAR format does not limit archive and file sizes.. also as a number of files in archive. These values may be limited by.. file and operating systems also as by available memory..... * WinRAR provides complete support for RAR and ZIP 2.0 archives.. and is able to unpack 7Z, ARJ, BZ2, CAB, GZ, ISO, JAR, LZ, LZH,.. TAR, UUE, XZ, Z, ZST archives..... * WinRAR offers both a classic interactive Windows interface.. and the command line interface..... * WinRAR provides functionality for creating a 'solid' archive,.. which can raise the compression ratio by 10% - 50% over more common.. methods, particularly when packing large numbers of small files..... * WinRAR offers the ability to create customizable SFX archive
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1640
                            Entropy (8bit):3.946312688270784
                            Encrypted:false
                            SSDEEP:48:W8LxIIwIIrIITIIk1Wx32oG9hwTrazcOIIshUdIIwMIIwhIIw1yF:WIOI9IcIEI7TGMTWyInKIYIfIvF
                            MD5:43CB15C1F1CC705305AEBA33B0A9EE73
                            SHA1:52B4CBF1C3ED4494837F54EAFA3E7294BA8E5485
                            SHA-256:A7BB097441D9F06DD7A8D08874D70E7495626760C05284CA1AE3A208C11B52F0
                            SHA-512:179DDA1518AEC276AE01BD7966272BBD545072077B34FB07396EC47C5B11ADBDDD00AB385D4EE2131A3C1C5265857434A51BE4F33AC7CCD8C4E4B4DFDA8D9C6F
                            Malicious:false
                            Preview:mrm_pri2....h... ... ...........[mrm_decn_info].................[mrm_pridescex].............P...[mrm_hschemaex] ........@...x...[mrm_res_map2_].................[mrm_dataitem] .................[mrm_dataitem] .............h...[mrm_dataitem] .........h...h...[mrm_dataitem] .............h...[mrm_decn_info]...................................................................,.......d.......,.......,.......................................................................................3.2...U.N.P.L.A.T.E.D...4.8...6.4.............[mrm_pridescex].........P...................................................P...[mrm_hschemaex] ........x...............[def_hnamesx] .........Z..z........m.s.-.a.p.p.x.:././.R.a.r.E.x.t.I.n.s.t.a.l.l.e.r./...R.a.r.E.x.t.I.n.s.t.a.l.l.e.r.............................K...................F..0........A.. ........R.. ........S.. '.......S.. =............................Files.AppxManifest.xml.RarExtLogo.png.Square150x150Logo.png.StoreLogo.png..........x...[mrm_res_map2_].
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (console) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):506008
                            Entropy (8bit):6.4284173495366845
                            Encrypted:false
                            SSDEEP:6144:yY8mmN3YWYGAj9JwXScp39ioIKzKVEKfr01//bbh3S62Wt3A3ksFqXqjh6AusDyn:yY8XiWYGAkXh3Qqia/zAot3A6AhezSpK
                            MD5:98CCD44353F7BC5BAD1BC6BA9AE0CD68
                            SHA1:76A4E5BF8D298800C886D29F85EE629E7726052D
                            SHA-256:E51021F6CB20EFBD2169F2A2DA10CE1ABCA58B4F5F30FBF4BAE931E4ECAAC99B
                            SHA-512:D6E8146A1055A59CBA5E2AAF47F6CB184ACDBE28E42EC3DAEBF1961A91CEC5904554D9D433EBF943DD3639C239EF11560FA49F00E1CFF02E11CD8D3506C4125F
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g.}............|.&.....|.$.J...|.%.....H}*.....H}./....H}./.....~P.....H}./.....~D.........z...F}./....F}(.....F}./....Rich............PE..d.....@f.........."....!.b.....................@.....................................'....`.................................................|...........H........4.......(......8...0I..T....................J..(....G..@............................................text....a.......b.................. ..`.rdata...3.......4...f..............@..@.data...............................@....pdata...4.......6..................@..@_RDATA..\...........................@..@.rsrc...H...........................@..@.reloc..8...........................@..B................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):488600
                            Entropy (8bit):7.025557043139148
                            Encrypted:false
                            SSDEEP:12288:9Z5zraThq5dDnHEJt1kXm+wBhvBJ/+5IISY1A9h:9Z5n2hsdDnkGXm9Bhvn/+r1+h
                            MD5:4783F1A5F0BBA7A6A40CB74BC8C41217
                            SHA1:A22B9DC8074296841A5A78EA41F0E2270F7B7AD7
                            SHA-256:F376AAA0D4444D0727DB5598E8377F9F1606400ADBBB4772D39D1E4937D5F28C
                            SHA-512:463DFF17F06ECA41AE76E3C0B2EFC4EF36529AA2EAED5163EEC0A912FE7802C9FB38C37ACFE94B82972861AAF1ACF02823A5948FBB3292BB4743641ACB99841E
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 3%
                            • Antivirus: Virustotal, Detection: 3%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A....................d...z.v.....z....z....z................................t....t.t.....t......Rich............PE..d.....@f.........."....!.............O.........@............................. ......@v....`.................................................D).......0..T......../...L...(......T...0...T.......................(.......@............ ..p............................text...^........................... ..`.rdata..".... ......................@..@.data........@......."..............@....pdata.../.......0...8..............@..@_RDATA..\.... .......h..............@..@.rsrc........0.......j..............@..@.reloc..T............B..............@..B................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):793
                            Entropy (8bit):4.866183859305658
                            Encrypted:false
                            SSDEEP:24:vY7Opm2lX+KBJlHchkyiQyaI6qI8I1Xou6qu8u1Xm:gAXNHYkyi3cP1had1W
                            MD5:6EEEFCB85673C14201D024B6E6AC6258
                            SHA1:DD3BBAD1B014F8D8E9F981AC0DEB9F2F343C5CF4
                            SHA-256:B75FDEE208D2834AB147DACB51F4E7D70E44457C8B639048FE67B252B8D61F1F
                            SHA-512:D68322F4B861F05876E9B3F349D135B3DF115A52B93C52590A1DC240089AB0DCDB256F91FCA01FD65DC8E689EE53CBD106337BBDA42D402D12B9DCA90434671B
                            Malicious:false
                            Preview:7zxa.dll..Default32.SFX..Descript.ion..License.txt..Order.htm..Rar.exe..Rar.txt..RarExt.dll..RarExt64.dll..RarFiles.lst..ReadMe.txt..Uninstall.exe..Uninstall.lst..UnRAR.exe..WhatsNew.txt..WinCon32.SFX..WinRAR.chm..WinRAR.exe..Zip32.SFX..rarlng.dll..rarnew.dat..zipnew.dat..rar.lng..rarext.lng..setup.lng..sfx.lng..uninstall.lng..winrar.lng..winrar.chw..Default.SFX..Zip.SFX..WinCon.SFX..RarExt32.dll..RarExtInstaller.exe..RarExtInstaller.exe.manifest..RarExtPackage.msix..RarExtLogo.altform-unplated_targetsize-32.png..RarExtLogo.altform-unplated_targetsize-48.png..RarExtLogo.altform-unplated_targetsize-64.png..RarExtLogo_Default.altform-unplated_targetsize-32.png..RarExtLogo_Default.altform-unplated_targetsize-48.png..RarExtLogo_Default.altform-unplated_targetsize-64.png..Resources.pri..
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):46292
                            Entropy (8bit):4.525159711057252
                            Encrypted:false
                            SSDEEP:384:cZIEmAyhs0z4NNVmF5OgUDBA2XCh9Iq1IAnUc9joBHLKp63xUA5B33vX6TBcxAfL:cZ41kVEbUDbwXic9p63Df3fXxuWJo4c
                            MD5:1C44C85FDAB8E9C663405CD8E4C3DBBD
                            SHA1:74D44E9CB2BF6F4C152AADB61B2FFC6B6CCD1C88
                            SHA-256:33108DD40B4E07D60E96E1BCFA4AD877EB4906DE2CC55844E40360E5D4DAFB5D
                            SHA-512:46D3FB4F2D084D51B6FD01845823100ABC81913EBD1B0BCFEB52EF18E8222199D282AA45CAE452F0716E0E2BF5520F7A6A254363D22B65F7AB6C10F11292EE2D
                            Malicious:false
                            Preview: WinRAR - What's new in the latest version...... Version 7.01.... 1. Bugs fixed:.... a) updating an encrypted file in a solid RAR archive produced.. a corrupt archive if updated file was the first in archive,.. no password was specified when starting updating and file name.. encryption in the updated archive wasn't enabled;.... b) WinRAR 7.00 crashed after switching to "Flat folders view" mode.. from archive subfolder;.... c) switch -ep4 duplicated the specified path instead of excluding it.. when extracting;.... d) if archive created by Unix RAR version contained symlinks with.. path separator characters in target paths, these characters could be.. broken when modifying such archive with Windows RAR;.... e) invalid file name was displayed in file rename and file execute.. WinRAR error messages;.... f) SFX "Shortcut" command failed to recognize empty parameters.. def
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (console) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):382976
                            Entropy (8bit):6.2782769555064935
                            Encrypted:false
                            SSDEEP:6144:KSyrfN+mx1KqjlxAGcQn6vGF3tUImBV15dp6zOmBjC/TGq39YyperSp:KSy731KkuQwtVXdpGjA39YPrSp
                            MD5:11217B1A96E83FF6B0DF1DFC0CD804E7
                            SHA1:FB824D799554180D7A1C42827C942EB31BEDFD60
                            SHA-256:F73F4751DC2B4493CB99E644E6A94F55B4B956B40F0709E205DDAFB512CD1296
                            SHA-512:82528862BD375E724DFD6976C3411AF95472AB8355C381064D103DE14376263BC497B73B2A9B343E05467CDC05C5F4A4ECC0A413EE39D40D59D999F963D51E19
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......}...9..X9..X9..X.G0X1..X.G2X...X.G3X4..X..<X;..X...Y+..X...Y3..X0.FX8..X...Y...X0.RX0..X9..X...X...Y...X...Y8..X..>X8..X...Y8..XRich9..X........................PE..d.....@f.........."....!.......................@..........................................`.............................................4.......P....P..H.......,+..............@...@...T...........................@3..@...............0...\...`....................text............................... ..`.rdata..............................@..@.data...l........&..................@....pdata..,+.......,..................@..@.didat..p....0.......D..............@..._RDATA..\....@.......F..............@..@.rsrc...H....P.......H..............@..@.reloc..@...........................@..B................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):315904
                            Entropy (8bit):6.438879283746244
                            Encrypted:false
                            SSDEEP:6144:Jc+iPZ8eA2KjsnHocFconGhZeD774evVSp4:5ZsKjsHpFconKeD77XSp4
                            MD5:E5F0C2C4F60BD298855DFE0019C63043
                            SHA1:C741358D77584D9BF055C35BB7D0AC8E44231291
                            SHA-256:A339A384B1B69D58BBAAD230C2648944B08030F823E1EF2C41E870053188F878
                            SHA-512:311805305F1C9D1D0F9B605E29799AC100E7889B36678E1B87009E71D79271C170DFCC36E589F2E79D74228E4706D8C2C6065F18BC3EFFF255FA7627FEFA8FF7
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.....M..M..M.HRM..M.HPM..M.HQM..M..^M..M...L..M...L..M.. M..M...L'.M..0M..M..M..M...L<.M...L..M..\M..M...L..MRich..M................PE..L.....@f...............!.D...H...............`....@.......................................@.............................4.......P.... ..H........................#.. ...T..............................@............`..........`....................text...<B.......D.................. ..`.rdata.......`.......H..............@..@.data........0......................@....didat..8............(..............@....rsrc...H.... .......*..............@..@.reloc...#.......$..................@..B........................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:MS Windows HtmlHelp Data
                            Category:dropped
                            Size (bytes):324272
                            Entropy (8bit):7.939215029789359
                            Encrypted:false
                            SSDEEP:6144:0HQbQuhUP/yv4J15/8Z0lIiFiDoQRkx79WftE+qby/919rRj+g8HR:JQuayv4V8ZMokx79WfGxI9LrPcR
                            MD5:6CA1BC8BFE8B929F448E1742DACB8E7F
                            SHA1:ECA3E637DB230FA179DCD6C6499BD7D616F211E8
                            SHA-256:997184B6F08D36DEDC2CD12EE8DC5AFB5E6E4BF77F7AB10F7ADE9EEFDB163344
                            SHA-512:D823F2C960A4D92129B9BDA0F4F9195D32E64B929082B5EFB9149546B5053021255D1DD03CB443F0A03106314554F76B94173E280A553A81E4AC2AC282877973
                            Malicious:false
                            Preview:ITSF....`.......r.........|.{.......".....|.{......."..`...............x.......T@.......@..............................ITSP....T...........................................j..].!......."..T...............PMGLQ................/..../#IDXHDR...3.../#ITBITS..../#STRINGS...[.Z./#SYSTEM..&."./#TOPICS...3.0./#URLSTR...G.../#URLTBL...c.d./#WINDOWS...K.L./$FIftiMain...k..H./$OBJINST...,.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...(../$WWKeywordLinks/..../$WWKeywordLinks/BTree......L./$WWKeywordLinks/Data...c.+./$WWKeywordLinks/Map....z./$WWKeywordLinks/Property.... ./html/..../html/HELPAcknowledgments.htm.....d./html/HELPAddShortcut.htm.....r./html/HELPAppData.htm...x.../html/HELPArcComment.htm...?. ./html/HELPArcEncryption.htm...A.~./html/HELPArchiveTypes.htm.....I./html/HELPArcLocking.htm...d.f./html/HELPArcNonRAR.htm......./html/HELPArcOptimal.htm...J.[./html/HELPArcPassword.htm...^.A./html/HELPArcRecovery.htm..._.../html/HELPArcRecVolumes.htm...h.d./html/HELPArcSFX.htm...L.u.
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):3286680
                            Entropy (8bit):6.864323385790075
                            Encrypted:false
                            SSDEEP:49152:olh7WxDi+U/pcCz7PZTZlzdOZlUkJLF1Uac+3+fESa6HYlGBzNwui0hBdH3XK:oMgZeD+hBBquTBpnK
                            MD5:53CF9BACC49C034E9E947D75FFAB9224
                            SHA1:7DB940C68D5D351E4948F26425CD9AEE09B49B3F
                            SHA-256:3B214FD9774C6D96332E50A501C5E467671B8B504070BBB17E497083B7E282C3
                            SHA-512:44C9154B1FDBCF27AB7FAEE6BE5B563A18B2BAEAD3E68B3EA788C6C76CF582F52F3F87BD447A4F6E25EC7D4690761332211659D754FB4E0630C22A372E470BDA
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}...9...9...9...r.......*.?......+......1......}...r...0...r.......r...8...r..."...9...4...9...?..........(.8......8...Rich9...........PE..d....@f.........."....!.....D......`..........@............................. 7.....DK2...`..................................................D".......(.L.....(.`.....1..(....7.....4...T.......................(....k..@....................@".@....................text............................... ..`.rdata..@...........................@..@.data........."......b".............@....pdata..`.....(.......#.............@..@.didat........(.......#.............@..._RDATA..\.....(.......#.............@..@.rsrc.........(.......#.............@..@.reloc........7.......1.............@..B................................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):387584
                            Entropy (8bit):6.458529414773216
                            Encrypted:false
                            SSDEEP:6144:p5aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ/WX+t4:pOxPkPjQeqQ1Y53KR/WX+t4
                            MD5:CD7BB857DE39A930085360674B5D78E9
                            SHA1:77AA6120D04B05C387FEAA9E3563B1E4D0CD4662
                            SHA-256:8AFBE21A3F3BCCAC6345AAB8D99C2E8F6E01CBD96D9F0FFE58F6CB881E4638FE
                            SHA-512:0B64FE30C4704AF1ED404B287C081AD1EACBADDE153A1D9B14849868BCB950F7A41D7A36E5B03AD3CCC9C0F8E2690BE5D74D87AA606004854E4FD2EE81805D7C
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 1%, Browse
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........B#..,p..,p..,p.:.p..,p.:.p5.,p.:.p..,p<..p..,p<.(q..,p<./q..,p<.)q..,p..p..,p..p..,p..p..,p..-p..,p2.)q..,p2.,q..,p2..p..,p2..q..,pRich..,p................PE..d...+.@f.........."....!.....".......f.........@..........................................`............................................4.......P.......`........*..............8....`..T....................a..(.......@............................................text.............................. ..`.rdata..............................@..@.data...\...........................@....pdata...*.......,..................@..@.didat..............................@..._RDATA..\...........................@..@.rsrc...`...........................@..@.reloc..8...........................@..B................................................................................................................................
                            Process:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):323072
                            Entropy (8bit):6.679575531692226
                            Encrypted:false
                            SSDEEP:6144:au3rMuh4risIXF9sQJlBBYuiTj+7HiR1juTIosSeX+t4sh:xX4riL9sU/BYuCQHipeeX+t4M
                            MD5:E0A8B12266260CB8597D0D5ECAE30362
                            SHA1:69D5B706B7B11462B4279592535C95E78CC090CF
                            SHA-256:6EA28B1B5DA1D2F13DC3787D1348934F0C2BF6A186535D691818FD9FE8A90294
                            SHA-512:5BE1E9E4BDF75E490867150D82CBE8FB3D25B32D0E1009774BF41AF02565FE488BEFE133A959E4187B4457CCAB63059609370C314404C674174CB085021552BB
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..y..y....~.y....|.!y....}.y..+.r.y..+...y..+...y..+...y.....y.....y..y..x..%...y..%...y..%.p.y..%...y..Rich.y..................PE..L...'.@f...............!............@........ ....@.......................................@.............................4...$...P.......`.......................@/.. ...T............................F..@............ ..L............................text...|........................... ..`.rdata..4.... ......................@..@.data...x...........................@....didat..|...........................@....rsrc...`...........................@..@.reloc..@/.......0..................@..B........................................................................................................................................................................................................................................
                            Process:C:\Users\user\Uninstall.exe
                            File Type:RAR archive data, v5
                            Category:dropped
                            Size (bytes):24
                            Entropy (8bit):4.053508854797679
                            Encrypted:false
                            SSDEEP:3:uv6L4fz0mkl:uv6cLkl
                            MD5:C69D0B5902A959577C02E9DCDDA77DE0
                            SHA1:6233724F8B3AC18649DC248D1C778E2BCA78A7F2
                            SHA-256:4301EC2E9592E7A22262D1C046954545033B73BE322B33A8117D201556C4254B
                            SHA-512:2E8945172EF567D4AE84D6317EFCE63502A6D9496CAA48B8DC09CF12D1CEEC3E89D033D6D9FCEEBA82F403107D15341BCDB72B4A6F60BA3E6DF4D2A2CB6E48CD
                            Malicious:false
                            Preview:Rar!......_V.....wVQ....
                            Process:C:\Users\user\Uninstall.exe
                            File Type:Zip archive data (empty)
                            Category:dropped
                            Size (bytes):22
                            Entropy (8bit):1.0476747992754052
                            Encrypted:false
                            SSDEEP:3:pjt/l:Nt
                            MD5:76CDB2BAD9582D23C1F6F4D868218D6C
                            SHA1:B04F3EE8F5E43FA3B162981B50BB72FE1ACABB33
                            SHA-256:8739C76E681F900923B900C9DF0EF75CF421D39CABB54650C4B9AD19B6A76D85
                            SHA-512:5E2F959F36B66DF0580A94F384C5FC1CEEEC4B2A3925F062D7B68F21758B86581AC2ADCFDDE73A171A28496E758EF1B23CA4951C05455CDAE9357CC3B5A5825F
                            Malicious:false
                            Preview:PK....................
                            File type:PE32+ executable (GUI) x86-64, for MS Windows
                            Entropy (8bit):7.955285356381258
                            TrID:
                            • Win64 Executable GUI (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:winrar-x64-701(1).exe
                            File size:3'948'120 bytes
                            MD5:46c17c999744470b689331f41eab7df1
                            SHA1:b8a63127df6a87d333061c622220d6d70ed80f7c
                            SHA256:c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
                            SHA512:4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
                            SSDEEP:98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
                            TLSH:8206231AF7A904F5D077E178C9A34607E6727C9D4771928F23E60A492F277909E3E322
                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u...u...u...v...u...p.P.u.J.....u.J.q...u.J.v...u.J.p...u...q...u...s...u...t...u...t...u.D.|...u.D.u...u.D.....u.D.w...u
                            Icon Hash:3b3b336b696ab269
                            Entrypoint:0x140029e90
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66409736 [Sun May 12 10:17:26 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:39da3cace27ab9503fa46001ce968ea6
                            Signature Valid:true
                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                            Signature Validation Error:The operation completed successfully
                            Error Number:0
                            Not Before, Not After
                            • 8/7/2023 5:00:00 PM 8/7/2026 4:59:59 PM
                            Subject Chain
                            • CN=win.rar GmbH, O=win.rar GmbH, L=Berlin, S=Berlin, C=DE, SERIALNUMBER=HRB 109885, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.1=Charlottenburg, OID.1.3.6.1.4.1.311.60.2.1.2=Berlin, OID.1.3.6.1.4.1.311.60.2.1.3=DE
                            Version:3
                            Thumbprint MD5:4E14FDD2231019D7E676235D9D81BCAE
                            Thumbprint SHA-1:729AE1F8B489DE176CC099FF49937F85F9E412F7
                            Thumbprint SHA-256:E0F8ABF2A732B2D82369C6CDF5657C85C231A924C82528D853AA8F38E0B3ACD9
                            Serial:048B08399EC703623C72CD2077AD65D9
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007F25489F4AC8h
                            dec eax
                            add esp, 28h
                            jmp 00007F25489F440Fh
                            int3
                            int3
                            dec eax
                            mov eax, esp
                            dec eax
                            mov dword ptr [eax+08h], ebx
                            dec eax
                            mov dword ptr [eax+10h], ebp
                            dec eax
                            mov dword ptr [eax+18h], esi
                            dec eax
                            mov dword ptr [eax+20h], edi
                            inc ecx
                            push esi
                            dec eax
                            sub esp, 20h
                            dec ebp
                            mov edx, dword ptr [ecx+38h]
                            dec eax
                            mov esi, edx
                            dec ebp
                            mov esi, eax
                            dec eax
                            mov ebp, ecx
                            dec ecx
                            mov edx, ecx
                            dec eax
                            mov ecx, esi
                            dec ecx
                            mov edi, ecx
                            inc ecx
                            mov ebx, dword ptr [edx]
                            dec eax
                            shl ebx, 04h
                            dec ecx
                            add ebx, edx
                            dec esp
                            lea eax, dword ptr [ebx+04h]
                            call 00007F25489F4C1Fh
                            mov eax, dword ptr [ebp+04h]
                            and al, 66h
                            neg al
                            mov eax, 00000001h
                            sbb edx, edx
                            neg edx
                            add edx, eax
                            test dword ptr [ebx+04h], edx
                            je 00007F25489F45A3h
                            dec esp
                            mov ecx, edi
                            dec ebp
                            mov eax, esi
                            dec eax
                            mov edx, esi
                            dec eax
                            mov ecx, ebp
                            call 00007F25489F6AFFh
                            dec eax
                            mov ebx, dword ptr [esp+30h]
                            dec eax
                            mov ebp, dword ptr [esp+38h]
                            dec eax
                            mov esi, dword ptr [esp+40h]
                            dec eax
                            mov edi, dword ptr [esp+48h]
                            dec eax
                            add esp, 20h
                            inc ecx
                            pop esi
                            ret
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            nop word ptr [eax+eax+00000000h]
                            dec eax
                            sub esp, 10h
                            dec esp
                            mov dword ptr [esp], edx
                            dec esp
                            mov dword ptr [esp+08h], ebx
                            dec ebp
                            xor ebx, ebx
                            dec esp
                            lea edx, dword ptr [esp+18h]
                            dec esp
                            sub edx, eax
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x54f500x34.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x54f840x50.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x26090.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x660000x3ff0.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x3c15c00x2898
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x930000x944.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x4f3400x54.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x4f4000x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x44d000x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x440000x518.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5412c0x100.rdata
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x4217e0x422003b541339cc9e14f15b888d0479b3133fFalse0.5534137228260869DOS executable (COM)6.465496377863431IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x440000x120960x1220068b3387c3dedeaa3b1e5cd69a387443cFalse0.4515355603448276SysEx File - Matsushita5.2033734091823645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x570000xe4040x1200615b97fd5c58191151507c5357520b77False0.2573784722222222data3.0651893813727122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x660000x3ff00x40001b12bb5f5c27bc0ec26e22d952efe46aFalse0.47430419921875data5.202190058981855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .didat0x6a0000x3380x4007a4026fb8d4e9aa87fe9f6aaaaa650d9False0.244140625data2.9226525026637282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            _RDATA0x6b0000x15c0x200c2a487c68e9b43cb7d57799aad555ea0False0.40625data3.3261253179891916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x6c0000x270000x262000e7c014a9728ac20034e79955ae49a9bFalse0.8942943135245902data7.756954915676745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x930000x9440xa00c5a48e3ca994dee11a564d2249cdf0a4False0.476171875data5.252204538581881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            PNG0x6c5cc0x3318PNG image data, 256 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9983944954128441
                            PNG0x6f8e40xdc20PNG image data, 512 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000461385576377
                            RT_ICON0x7d5040x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4031791907514451
                            RT_ICON0x7da6c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.6425992779783394
                            RT_ICON0x7e3140xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.6156716417910447
                            RT_ICON0x7f1bc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.43439716312056736
                            RT_ICON0x7f6240x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.5175891181988743
                            RT_ICON0x806cc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.5034232365145228
                            RT_ICON0x82c740xd646PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9980675976227805
                            RT_DIALOG0x902bc0xdcdataEnglishUnited States0.7090909090909091
                            RT_DIALOG0x903980x12edataEnglishUnited States0.5927152317880795
                            RT_DIALOG0x904c80x338dataEnglishUnited States0.45145631067961167
                            RT_DIALOG0x908000x37adataEnglishUnited States0.5348314606741573
                            RT_STRING0x90b7c0x178dataEnglishUnited States0.4308510638297872
                            RT_STRING0x90cf40x1b4dataEnglishUnited States0.4426605504587156
                            RT_STRING0x90ea80x19adataEnglishUnited States0.4902439024390244
                            RT_STRING0x910440x146dataEnglishUnited States0.5153374233128835
                            RT_STRING0x9118c0x1fcdataEnglishUnited States0.4547244094488189
                            RT_STRING0x913880xd6Matlab v4 mat-file (little endian) E, numeric, rows 0, columns 0EnglishUnited States0.46261682242990654
                            RT_STRING0x914600x9adataEnglishUnited States0.5974025974025974
                            RT_STRING0x914fc0x3adataEnglishUnited States0.6896551724137931
                            RT_STRING0x915380xd6dataEnglishUnited States0.5747663551401869
                            RT_GROUP_ICON0x916100x68dataEnglishUnited States0.7019230769230769
                            RT_VERSION0x916780x2c8dataEnglishUnited States0.46207865168539325
                            RT_MANIFEST0x919400x750XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3969017094017094
                            DLLImport
                            KERNEL32.dllGetLastError, FormatMessageW, LocalFree, SetLastError, CreateHardLinkW, SetFileTime, GetCurrentProcess, CloseHandle, CreateFileW, DeviceIoControl, RemoveDirectoryW, DeleteFileW, GetLongPathNameW, GetShortPathNameW, MoveFileW, GetStdHandle, WriteFile, ReadFile, SetFilePointer, SetEndOfFile, FlushFileBuffers, GetFileType, CreateDirectoryW, GetFileAttributesW, SetFileAttributesW, GetCurrentProcessId, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, SetThreadExecutionState, CompareStringW, AllocConsole, AttachConsole, WriteConsoleW, Sleep, FreeConsole, ExitProcess, GetSystemDirectoryW, LoadLibraryW, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, CreateThread, WaitForSingleObject, GetProcessAffinityMask, CreateSemaphoreW, CreateEventW, ReleaseSemaphore, SetThreadPriority, SetEvent, ResetEvent, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, SystemTimeToFileTime, LocalFileTimeToFileTime, TzSpecificLocalTimeToSystemTime, GetSystemTime, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, IsDBCSLeadByte, GlobalAlloc, SizeofResource, LoadResource, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GetDateFormatW, GetTimeFormatW, GlobalMemoryStatusEx, GetLocaleInfoW, GetNumberFormatW, GetCommandLineW, OpenFileMappingW, MapViewOfFile, UnmapViewOfFile, SetEnvironmentVariableW, GetLocalTime, GetTickCount, CreateFileMappingW, MoveFileExW, GetTempPathW, GetExitCodeProcess, GetConsoleMode, GetConsoleOutputCP, HeapSize, SetFilePointerEx, GetStringTypeW, SetStdHandle, GetProcessHeap, LCMapStringW, FlsFree, FlsSetValue, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, HeapFree, HeapAlloc, HeapReAlloc, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, FlsAlloc, FlsGetValue
                            OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                            gdiplus.dllGdipFree, GdipAlloc, GdipCloneImage, GdipDisposeImage, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipCreateBitmapFromStream
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:04:18:29
                            Start date:10/10/2024
                            Path:C:\Users\user\Desktop\winrar-x64-701(1).exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\winrar-x64-701(1).exe"
                            Imagebase:0x13f780000
                            File size:3'948'120 bytes
                            MD5 hash:46C17C999744470B689331F41EAB7DF1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:4
                            Start time:04:18:44
                            Start date:10/10/2024
                            Path:C:\Users\user\Uninstall.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\uninstall.exe" /setup
                            Imagebase:0x13fa40000
                            File size:488'600 bytes
                            MD5 hash:4783F1A5F0BBA7A6A40CB74BC8C41217
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 3%, ReversingLabs
                            • Detection: 3%, Virustotal, Browse
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:15.3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:17.2%
                              Total number of Nodes:1336
                              Total number of Limit Nodes:23
                              execution_graph 27205 13f7a9d1c 27230 13f7a97a4 27205->27230 27208 13f7a9e68 27333 13f7aa170 7 API calls 2 library calls 27208->27333 27209 13f7a9d38 __scrt_acquire_startup_lock 27211 13f7a9e72 27209->27211 27213 13f7a9d56 27209->27213 27334 13f7aa170 7 API calls 2 library calls 27211->27334 27214 13f7a9d7b 27213->27214 27217 13f7a9d98 __scrt_release_startup_lock 27213->27217 27238 13f7b6c04 27213->27238 27215 13f7a9e7d BuildCatchObjectHelperInternal 27218 13f7a9e01 27217->27218 27330 13f7b5f00 47 API calls __GSHandlerCheck_EH 27217->27330 27243 13f7aa2bc 27218->27243 27220 13f7a9e06 27246 13f7b6b94 27220->27246 27335 13f7a9fb0 27230->27335 27233 13f7a97cf 27233->27208 27233->27209 27234 13f7a97d3 27337 13f7b6aac 27234->27337 27239 13f7b6c09 27238->27239 27240 13f7b6c3a 27238->27240 27239->27240 27587 13f7a9d00 27239->27587 27595 13f781190 27239->27595 27240->27217 27687 13f7abb80 27243->27687 27247 13f7baa60 67 API calls 27246->27247 27248 13f7b6ba3 27247->27248 27249 13f7a9e0e 27248->27249 27689 13f7bad9c 47 API calls 27248->27689 27251 13f7a41d0 27249->27251 27690 13f79a548 27251->27690 27255 13f7a4210 27782 13f7a2794 27255->27782 27257 13f7a421a 27258 13f7826bc shared_ptr 2 API calls 27257->27258 27259 13f7a4226 27258->27259 27260 13f7826bc shared_ptr 2 API calls 27259->27260 27261 13f7a4232 27260->27261 27262 13f7826bc shared_ptr 2 API calls 27261->27262 27263 13f7a423e 27262->27263 27264 13f7826bc shared_ptr 2 API calls 27263->27264 27265 13f7a424a memcpy_s 27264->27265 27787 13f7a461c 27265->27787 27330->27218 27333->27211 27334->27215 27336 13f7a97c6 __scrt_dllmain_crt_thread_attach 27335->27336 27336->27233 27336->27234 27338 13f7bb65c 27337->27338 27339 13f7a97d8 27338->27339 27344 13f7ba99c 27338->27344 27359 13f7baa60 27338->27359 27365 13f7b9440 27338->27365 27339->27233 27343 13f7ac698 7 API calls 2 library calls 27339->27343 27343->27233 27345 13f7ba9bf 27344->27345 27346 13f7ba9c9 27345->27346 27380 13f7b9488 EnterCriticalSection 27345->27380 27348 13f7baa3b 27346->27348 27371 13f7b6ea0 27346->27371 27348->27338 27360 13f7baab2 27359->27360 27361 13f7baa6d 27359->27361 27360->27338 27384 13f7b73b4 27361->27384 27366 13f7b9448 27365->27366 27368 13f7b9479 27366->27368 27370 13f7b9475 27366->27370 27580 13f7bb3e8 27366->27580 27586 13f7b94b0 DeleteCriticalSection 27368->27586 27370->27338 27381 13f7bb780 EnterCriticalSection LeaveCriticalSection BuildCatchObjectHelperInternal 27371->27381 27373 13f7b6ea9 27374 13f7b6eb8 27373->27374 27382 13f7bb7d0 47 API calls 4 library calls 27373->27382 27376 13f7b6ec1 IsProcessorFeaturePresent 27374->27376 27378 13f7b6eeb BuildCatchObjectHelperInternal 27374->27378 27377 13f7b6ed0 27376->27377 27383 13f7afec8 14 API calls 3 library calls 27377->27383 27381->27373 27382->27374 27383->27378 27385 13f7b73e0 FlsSetValue 27384->27385 27386 13f7b73c5 FlsGetValue 27384->27386 27388 13f7b73d2 27385->27388 27389 13f7b73ed 27385->27389 27387 13f7b73da 27386->27387 27386->27388 27387->27385 27390 13f7b73d8 27388->27390 27391 13f7b6ea0 BuildCatchObjectHelperInternal 47 API calls 27388->27391 27428 13f7b9568 11 API calls memcpy_s 27389->27428 27405 13f7ba72c 27390->27405 27393 13f7b7455 27391->27393 27394 13f7b73fc 27395 13f7b741a FlsSetValue 27394->27395 27396 13f7b740a FlsSetValue 27394->27396 27398 13f7b7438 27395->27398 27399 13f7b7426 FlsSetValue 27395->27399 27397 13f7b7413 27396->27397 27429 13f7b7738 27397->27429 27435 13f7b7088 11 API calls memcpy_s 27398->27435 27399->27397 27402 13f7b7440 27404 13f7b7738 __free_lconv_mon 11 API calls 27402->27404 27404->27390 27406 13f7ba99c 67 API calls 27405->27406 27407 13f7ba761 27406->27407 27437 13f7ba42c 27407->27437 27412 13f7ba797 27413 13f7b7738 __free_lconv_mon 11 API calls 27412->27413 27414 13f7ba77e 27413->27414 27414->27360 27415 13f7ba7a6 27451 13f7baadc 27415->27451 27418 13f7ba8a2 27462 13f7b7718 11 API calls memcpy_s 27418->27462 27420 13f7ba8a7 27422 13f7b7738 __free_lconv_mon 11 API calls 27420->27422 27421 13f7ba8fd 27424 13f7ba964 27421->27424 27463 13f7ba25c 47 API calls 4 library calls 27421->27463 27422->27414 27423 13f7ba8bc 27423->27421 27426 13f7b7738 __free_lconv_mon 11 API calls 27423->27426 27425 13f7b7738 __free_lconv_mon 11 API calls 27424->27425 27425->27414 27426->27421 27428->27394 27430 13f7b773d HeapFree 27429->27430 27431 13f7b7418 27429->27431 27430->27431 27432 13f7b7758 GetLastError 27430->27432 27431->27388 27433 13f7b7765 __free_lconv_mon 27432->27433 27436 13f7b7718 11 API calls memcpy_s 27433->27436 27435->27402 27436->27431 27464 13f7b580c 27437->27464 27440 13f7ba44c GetOEMCP 27442 13f7ba473 27440->27442 27441 13f7ba45e 27441->27442 27443 13f7ba463 GetACP 27441->27443 27442->27414 27444 13f7b7774 27442->27444 27443->27442 27445 13f7b77bf 27444->27445 27446 13f7b7783 memcpy_s 27444->27446 27478 13f7b7718 11 API calls memcpy_s 27445->27478 27446->27445 27447 13f7b77a6 RtlAllocateHeap 27446->27447 27475 13f7b5a10 27446->27475 27447->27446 27449 13f7b77bd 27447->27449 27449->27412 27449->27415 27452 13f7ba42c 49 API calls 27451->27452 27453 13f7bab09 27452->27453 27454 13f7bac5f 27453->27454 27456 13f7bab46 IsValidCodePage 27453->27456 27461 13f7bab60 memcpy_s 27453->27461 27496 13f7a92f0 27454->27496 27456->27454 27458 13f7bab57 27456->27458 27459 13f7bab86 GetCPInfo 27458->27459 27458->27461 27459->27454 27459->27461 27485 13f7ba544 27461->27485 27462->27420 27463->27424 27465 13f7b582b 27464->27465 27466 13f7b5830 27464->27466 27465->27440 27465->27441 27466->27465 27472 13f7b72e0 47 API calls 3 library calls 27466->27472 27468 13f7b584b 27473 13f7b77d4 47 API calls __swprintf_l 27468->27473 27470 13f7b586e 27474 13f7b7840 47 API calls __swprintf_l 27470->27474 27472->27468 27473->27470 27474->27465 27479 13f7b5a50 27475->27479 27478->27449 27484 13f7b9488 EnterCriticalSection 27479->27484 27486 13f7ba581 GetCPInfo 27485->27486 27487 13f7ba677 27485->27487 27486->27487 27493 13f7ba594 27486->27493 27488 13f7a92f0 _log10_special 8 API calls 27487->27488 27490 13f7ba716 27488->27490 27490->27454 27505 13f7bc390 27493->27505 27497 13f7a92f9 27496->27497 27498 13f7a9490 IsProcessorFeaturePresent 27497->27498 27499 13f7a9304 27497->27499 27500 13f7a94a8 27498->27500 27499->27418 27499->27423 27578 13f7a9684 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 27500->27578 27502 13f7a94bb 27579 13f7a9458 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27502->27579 27506 13f7b580c 47 API calls 27505->27506 27507 13f7bc3d2 27506->27507 27525 13f7bae58 27507->27525 27526 13f7bae61 MultiByteToWideChar 27525->27526 27578->27502 27581 13f7bb170 5 API calls 27580->27581 27582 13f7bb41e 27581->27582 27583 13f7bb43d InitializeCriticalSectionAndSpinCount 27582->27583 27584 13f7bb423 InitializeCriticalSectionEx 27582->27584 27585 13f7bb448 27583->27585 27584->27585 27585->27366 27586->27370 27598 13f7aa354 SetUnhandledExceptionFilter 27587->27598 27599 13f789534 27595->27599 27628 13f7932c4 27599->27628 27604 13f7826bc shared_ptr 2 API calls 27605 13f78955f 27604->27605 27606 13f7826bc shared_ptr 2 API calls 27605->27606 27607 13f78956c 27606->27607 27608 13f7826bc shared_ptr 2 API calls 27607->27608 27609 13f789579 27608->27609 27610 13f7826bc shared_ptr 2 API calls 27609->27610 27611 13f789586 27610->27611 27612 13f7826bc shared_ptr 2 API calls 27611->27612 27613 13f789593 27612->27613 27614 13f7826bc shared_ptr 2 API calls 27613->27614 27615 13f7895a0 27614->27615 27616 13f7826bc shared_ptr 2 API calls 27615->27616 27617 13f7895ad 27616->27617 27618 13f7826bc shared_ptr 2 API calls 27617->27618 27619 13f7895ba 27618->27619 27620 13f7826bc shared_ptr 2 API calls 27619->27620 27621 13f7895c7 27620->27621 27622 13f7826bc shared_ptr 2 API calls 27621->27622 27623 13f7895d4 shared_ptr 27622->27623 27636 13f798640 27623->27636 27625 13f789622 shared_ptr 27641 13f789640 27625->27641 27629 13f7932d9 shared_ptr 27628->27629 27644 13f793328 27629->27644 27632 13f7826bc 27633 13f7826ca shared_ptr 27632->27633 27653 13f782654 27633->27653 27635 13f7826cf 27635->27604 27662 13f781da4 27636->27662 27642 13f793328 shared_ptr 2 API calls 27641->27642 27643 13f78964e shared_ptr 27642->27643 27645 13f79333e memcpy_s 27644->27645 27648 13f79b084 27645->27648 27651 13f79b038 GetCurrentProcess GetProcessAffinityMask 27648->27651 27652 13f789546 27651->27652 27652->27632 27654 13f782668 shared_ptr 27653->27654 27655 13f78269b shared_ptr 27654->27655 27658 13f78250c 27654->27658 27655->27635 27661 13f7824e8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task 27658->27661 27660 13f782518 27661->27660 27663 13f781db2 shared_ptr 27662->27663 27670 13f781d54 27663->27670 27666 13f798770 27668 13f79878a shared_ptr 27666->27668 27667 13f798667 27667->27625 27668->27667 27686 13f7986d4 92 API calls memcpy_s 27668->27686 27671 13f781d59 27670->27671 27672 13f781d98 27670->27672 27676 13f781ba0 27671->27676 27672->27666 27674 13f781d6e shared_ptr 27684 13f781c08 47 API calls shared_ptr 27674->27684 27677 13f781baf shared_ptr 27676->27677 27678 13f781bc3 27677->27678 27679 13f781b70 27677->27679 27685 13f781b5c 49 API calls 2 library calls 27678->27685 27682 13f78250c shared_ptr 2 API calls 27679->27682 27681 13f781bc8 27683 13f781b85 27682->27683 27683->27674 27684->27672 27685->27681 27686->27667 27688 13f7aa2d3 GetStartupInfoW 27687->27688 27688->27220 27689->27248 27803 13f7a9f40 27690->27803 27692 13f79a571 GetModuleHandleW 27693 13f79a5a0 GetProcAddress 27692->27693 27694 13f79a5e5 27692->27694 27695 13f79a5c2 GetProcAddress 27693->27695 27696 13f79a5b5 27693->27696 27697 13f79aa48 27694->27697 27870 13f7b56d0 50 API calls _invalid_parameter_noinfo_noreturn 27694->27870 27695->27694 27698 13f79a5d7 27695->27698 27696->27695 27805 13f794964 27697->27805 27698->27694 27701 13f79aa51 27813 13f793400 27701->27813 27702 13f79a92a 27702->27697 27704 13f79a934 27702->27704 27705 13f794964 50 API calls 27704->27705 27706 13f79a93d 27705->27706 27708 13f79a947 CreateFileW 27706->27708 27709 13f79a97b SetFilePointer 27708->27709 27710 13f79aa35 CloseHandle 27708->27710 27709->27710 27711 13f79a994 ReadFile 27709->27711 27713 13f782254 collate 47 API calls 27710->27713 27711->27710 27715 13f79a9b8 27711->27715 27713->27697 27717 13f79a9cc 27715->27717 27718 13f79ad37 27715->27718 27716 13f79aa83 CompareStringW 27732 13f79aa5f 27716->27732 27720 13f7820b4 49 API calls 27717->27720 27882 13f7a9564 8 API calls 27718->27882 27722 13f79a9e5 27720->27722 27726 13f7826bc shared_ptr 2 API calls 27722->27726 27724 13f79ad3c 27725 13f79aaf7 27731 13f7820b4 49 API calls 27725->27731 27738 13f7936b8 49 API calls 27725->27738 27747 13f782254 collate 47 API calls 27725->27747 27755 13f79160c 53 API calls 27725->27755 27761 13f79ab4b 27725->27761 27742 13f79a9f0 27726->27742 27728 13f79ab59 27736 13f792a74 9 API calls 27728->27736 27729 13f79acf4 27730 13f782254 collate 47 API calls 27729->27730 27734 13f79acfd 27730->27734 27731->27725 27732->27716 27732->27725 27817 13f792a74 27732->27817 27822 13f79ad40 27732->27822 27844 13f7820b4 27732->27844 27848 13f7936b8 27732->27848 27852 13f782254 27732->27852 27856 13f79160c 27732->27856 27737 13f782254 collate 47 API calls 27734->27737 27735 13f79aa21 27739 13f782254 collate 47 API calls 27735->27739 27740 13f79ab67 27736->27740 27741 13f79ad07 27737->27741 27738->27725 27743 13f79aa2b 27739->27743 27744 13f79ac39 27740->27744 27745 13f79ab72 27740->27745 27746 13f7a92f0 _log10_special 8 API calls 27741->27746 27742->27735 27752 13f79ad40 51 API calls 27742->27752 27871 13f799c24 49 API calls shared_ptr 27742->27871 27748 13f782254 collate 47 API calls 27743->27748 27750 13f799f58 52 API calls 27744->27750 27749 13f79ad40 51 API calls 27745->27749 27751 13f79ad16 27746->27751 27747->27725 27748->27710 27753 13f79ab7e 27749->27753 27754 13f79ac7a AllocConsole 27750->27754 27774 13f794a5c GetCurrentDirectoryW 27751->27774 27752->27742 27756 13f79ad40 51 API calls 27753->27756 27757 13f79ac2f 27754->27757 27758 13f79ac84 GetCurrentProcessId AttachConsole 27754->27758 27755->27725 27759 13f79ab8a 27756->27759 27763 13f782254 collate 47 API calls 27757->27763 27760 13f79ac9c 27758->27760 27872 13f79788c 27759->27872 27767 13f79aca9 GetStdHandle WriteConsoleW Sleep FreeConsole 27760->27767 27761->27728 27761->27729 27765 13f79aceb ExitProcess 27763->27765 27767->27757 27769 13f79788c 49 API calls 27770 13f79ac02 27769->27770 27771 13f7820b4 49 API calls 27770->27771 27772 13f79ac0f 27771->27772 27773 13f782254 collate 47 API calls 27772->27773 27773->27757 27775 13f794aba 27774->27775 27776 13f794a77 27774->27776 27775->27255 27777 13f781da4 shared_ptr 49 API calls 27776->27777 27778 13f794a83 shared_ptr 27777->27778 27779 13f794a9b GetCurrentDirectoryW 27778->27779 27780 13f794aaf shared_ptr 27779->27780 28057 13f78129c 27780->28057 27783 13f79ad40 51 API calls 27782->27783 27784 13f7a27a9 OleInitialize 27783->27784 27785 13f7a27cf 27784->27785 27786 13f7a27d9 GdiplusStartup SHGetMalloc 27785->27786 27786->27257 28061 13f7837f4 27787->28061 27789 13f7a4631 27790 13f7837f4 47 API calls 27789->27790 27791 13f7a463e 27790->27791 27792 13f7837f4 47 API calls 27791->27792 27793 13f7a464b 27792->27793 27794 13f7837f4 47 API calls 27793->27794 27795 13f7a4274 27794->27795 27796 13f7a419c 27795->27796 27797 13f782254 collate 47 API calls 27796->27797 27798 13f7a41ae 27797->27798 27799 13f782254 collate 47 API calls 27798->27799 27800 13f7a41b7 27799->27800 27801 13f782254 collate 47 API calls 27800->27801 27802 13f7a41c0 27801->27802 27804 13f7a9f6a 27803->27804 27804->27692 27804->27804 27806 13f781da4 shared_ptr 49 API calls 27805->27806 27807 13f79497c shared_ptr 27806->27807 27808 13f7949df shared_ptr 27807->27808 27810 13f79497f shared_ptr 27807->27810 27809 13f7820b4 49 API calls 27808->27809 27812 13f7949f4 27809->27812 27810->27807 27810->27808 27811 13f794996 GetModuleFileNameW 27810->27811 27811->27810 27812->27701 27814 13f793414 27813->27814 27883 13f789768 27814->27883 27818 13f792a98 GetVersionExW 27817->27818 27819 13f792acb 27817->27819 27818->27819 27820 13f7a92f0 _log10_special 8 API calls 27819->27820 27821 13f792af8 27820->27821 27821->27732 27823 13f781da4 shared_ptr 49 API calls 27822->27823 27824 13f79ad76 shared_ptr 27823->27824 27825 13f79ad8c GetSystemDirectoryW 27824->27825 27826 13f79ad9b 27825->27826 27829 13f79ae0b 27825->27829 27827 13f7826bc shared_ptr 2 API calls 27826->27827 27828 13f79ada4 27827->27828 27830 13f7820b4 49 API calls 27828->27830 27831 13f7a92f0 _log10_special 8 API calls 27829->27831 27832 13f79adb1 shared_ptr 27830->27832 27833 13f79ae24 27831->27833 27834 13f7820b4 49 API calls 27832->27834 27833->27732 27835 13f79adc7 27834->27835 27907 13f7938e4 27835->27907 27838 13f782254 collate 47 API calls 27839 13f79ade3 27838->27839 27840 13f782254 collate 47 API calls 27839->27840 27841 13f79aded 27840->27841 27842 13f79adf6 LoadLibraryW 27841->27842 27843 13f782254 collate 47 API calls 27842->27843 27843->27829 27845 13f7820c2 shared_ptr 27844->27845 27846 13f781f88 49 API calls 27845->27846 27847 13f7820dd 27846->27847 27847->27732 27849 13f7936c7 27848->27849 27961 13f794b8c 27849->27961 27851 13f794b87 27851->27732 27853 13f7821e4 shared_ptr 27852->27853 27854 13f7821d8 shared_ptr 47 API calls 27853->27854 27855 13f78221c shared_ptr 27853->27855 27854->27855 27855->27732 27967 13f78128c 27856->27967 27870->27702 27871->27742 27873 13f79781c 27872->27873 27968 13f796614 27873->27968 27876 13f797843 LoadStringW 27877 13f797877 27876->27877 27878 13f79785f LoadStringW 27876->27878 27879 13f799f58 27877->27879 27878->27877 27987 13f799f84 27879->27987 27882->27724 27886 13f789804 27883->27886 27887 13f789829 shared_ptr 27886->27887 27892 13f786d94 27887->27892 27889 13f789834 27897 13f781f88 27889->27897 27891 13f78977c 27891->27732 27893 13f786d9e 27892->27893 27894 13f786da3 27892->27894 27893->27889 27905 13f786dac 49 API calls 27894->27905 27898 13f781faa 27897->27898 27899 13f78209d 27898->27899 27902 13f781fb3 shared_ptr 27898->27902 27906 13f781dc0 49 API calls std::_Xinvalid_argument 27899->27906 27903 13f78250c shared_ptr 2 API calls 27902->27903 27904 13f781fd8 shared_ptr 27902->27904 27903->27904 27904->27891 27920 13f78a120 27907->27920 27909 13f793911 27911 13f793936 27909->27911 27932 13f7938b8 49 API calls 27909->27932 27924 13f781294 27911->27924 27913 13f793943 27928 13f783be4 27913->27928 27916 13f782254 collate 47 API calls 27917 13f79395b 27916->27917 27918 13f7a92f0 _log10_special 8 API calls 27917->27918 27919 13f793968 27918->27919 27919->27838 27921 13f78a12e shared_ptr 27920->27921 27933 13f78a02c 27921->27933 27923 13f78a145 27923->27909 27925 13f7812cc 27924->27925 27927 13f781315 shared_ptr 27925->27927 27944 13f781450 27925->27944 27927->27913 27929 13f783bf5 shared_ptr 27928->27929 27930 13f783c0e 27929->27930 27960 13f781a50 49 API calls 27929->27960 27930->27916 27932->27911 27934 13f78a050 27933->27934 27935 13f78a119 27934->27935 27938 13f78a059 shared_ptr 27934->27938 27943 13f781dc0 49 API calls std::_Xinvalid_argument 27935->27943 27939 13f78250c shared_ptr 2 API calls 27938->27939 27942 13f78a07c shared_ptr 27938->27942 27939->27942 27942->27923 27945 13f781478 27944->27945 27946 13f781484 27945->27946 27947 13f781565 27945->27947 27950 13f78250c shared_ptr 2 API calls 27946->27950 27958 13f781dc0 49 API calls std::_Xinvalid_argument 27947->27958 27951 13f7814a3 shared_ptr 27950->27951 27952 13f781517 27951->27952 27954 13f7821d8 27951->27954 27952->27927 27955 13f78218c shared_ptr 27954->27955 27957 13f7821a3 27955->27957 27959 13f782160 47 API calls 2 library calls 27955->27959 27959->27957 27962 13f786d94 49 API calls 27961->27962 27963 13f794bba shared_ptr 27962->27963 27965 13f794bd9 27963->27965 27966 13f794fd8 49 API calls shared_ptr 27963->27966 27965->27851 27966->27965 27975 13f7964b4 27968->27975 27972 13f796658 27973 13f7a92f0 _log10_special 8 API calls 27972->27973 27974 13f796671 27973->27974 27974->27876 27974->27877 27978 13f7964dc shared_ptr 27975->27978 27976 13f7a92f0 _log10_special 8 API calls 27977 13f79657b 27976->27977 27977->27972 27981 13f796584 27977->27981 27980 13f796541 27978->27980 27985 13f7b5058 47 API calls 2 library calls 27978->27985 27980->27976 27982 13f79659c shared_ptr 27981->27982 27984 13f7965d1 27982->27984 27986 13f7b5058 47 API calls 2 library calls 27982->27986 27984->27972 27985->27980 27986->27984 27988 13f7826bc shared_ptr 2 API calls 27987->27988 27989 13f799fb8 27988->27989 28003 13f799e80 27989->28003 27994 13f799fd6 27996 13f79a032 27994->27996 28011 13f789a50 49 API calls shared_ptr 27994->28011 28012 13f79a384 27994->28012 27995 13f79a050 27998 13f782254 collate 47 API calls 27995->27998 27996->27995 28015 13f789a50 49 API calls shared_ptr 27996->28015 27999 13f79a05b 27998->27999 28001 13f7a92f0 _log10_special 8 API calls 27999->28001 28002 13f799f78 28001->28002 28002->27769 28004 13f799f3f 28003->28004 28005 13f799eae 28003->28005 28007 13f78fe94 28004->28007 28005->28004 28006 13f78156c 49 API calls 28005->28006 28006->28005 28008 13f78fea6 shared_ptr 28007->28008 28016 13f78fd70 28008->28016 28010 13f78feb2 28010->27994 28011->27994 28027 13f791ce0 28012->28027 28015->27995 28017 13f78fd93 28016->28017 28018 13f78fe8b 28017->28018 28021 13f78fd9c shared_ptr 28017->28021 28026 13f781dc0 49 API calls std::_Xinvalid_argument 28018->28026 28024 13f78250c shared_ptr 2 API calls 28021->28024 28025 13f78fdc1 shared_ptr 28021->28025 28024->28025 28025->28010 28028 13f791cfd __swprintf_l 28027->28028 28031 13f7b4808 28028->28031 28032 13f7b4862 28031->28032 28033 13f7b4887 28032->28033 28034 13f7b48c3 28032->28034 28053 13f7b00c8 47 API calls _invalid_parameter_noinfo_noreturn 28033->28053 28054 13f7b2bc0 50 API calls _invalid_parameter_noinfo_noreturn 28034->28054 28037 13f7b4a25 28040 13f7b4a3b 28037->28040 28056 13f7afda8 47 API calls 2 library calls 28037->28056 28038 13f7b48b1 28038->28037 28055 13f7afda8 47 API calls 2 library calls 28038->28055 28043 13f7a92f0 _log10_special 8 API calls 28040->28043 28041 13f7b7738 __free_lconv_mon 11 API calls 28041->28038 28045 13f791d1e 28043->28045 28044 13f7b495e 28046 13f7b49ca 28044->28046 28047 13f7b4970 28044->28047 28048 13f7b49a4 28044->28048 28051 13f7b4979 28044->28051 28045->27994 28046->28048 28049 13f7b49d4 28046->28049 28047->28048 28047->28051 28048->28041 28052 13f7b7738 __free_lconv_mon 11 API calls 28049->28052 28050 13f7b7738 __free_lconv_mon 11 API calls 28050->28038 28051->28050 28052->28038 28053->28038 28054->28044 28055->28037 28056->28040 28058 13f7812a4 shared_ptr 28057->28058 28060 13f781974 49 API calls shared_ptr 28058->28060 28062 13f78380c shared_ptr 28061->28062 28064 13f783819 28062->28064 28065 13f7821e4 28062->28065 28064->27789 28067 13f7821f6 shared_ptr 28065->28067 28066 13f78221c shared_ptr 28066->28064 28067->28066 28068 13f7821d8 shared_ptr 47 API calls 28067->28068 28068->28066 28069 13f7a0a20 28070 13f7a0a49 SetWindowLongPtrW 28069->28070 28071 13f7a0a63 NtdllDefWindowProc_W 28069->28071 28074 13f7a0a90 28070->28074 28073 13f7ea1e0 28071->28073 28075 13f7a0ab4 shared_ptr 28074->28075 28076 13f7a0b4d 28075->28076 28087 13f7a933c 28075->28087 28076->28071 28078 13f7a0ac9 28078->28076 28096 13f7a02dc CLSIDFromString CoCreateInstance 28078->28096 28080 13f7a0af7 28080->28076 28081 13f7a0b84 28080->28081 28082 13f7a0bb6 28080->28082 28083 13f792f78 SysAllocString 28081->28083 28100 13f792f78 28082->28100 28085 13f7a0b89 28083->28085 28104 13f792ef8 SysFreeString 28085->28104 28089 13f7a9347 28087->28089 28088 13f7a9360 28088->28078 28089->28088 28090 13f7b5a10 memcpy_s 2 API calls 28089->28090 28091 13f7a9366 28089->28091 28090->28089 28094 13f7a9371 28091->28094 28105 13f7a9f90 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::_Xinvalid_argument 28091->28105 28106 13f7824c8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task std::_Xinvalid_argument 28094->28106 28095 13f7a9377 28099 13f7a0337 28096->28099 28097 13f7a92f0 _log10_special 8 API calls 28098 13f7a03ca 28097->28098 28098->28080 28099->28097 28101 13f792f8d 28100->28101 28103 13f792fa2 28101->28103 28107 13f792f2c SysAllocString 28101->28107 28103->28085 28104->28076 28106->28095 28107->28103 28108 13f79d3c0 28123 13f79d270 28108->28123 28110 13f79d3fb memcpy_s 28110->28110 28112 13f79d7af 28110->28112 28129 13f7956b0 28110->28129 28139 13f79b37c 28110->28139 28154 13f79eef0 102 API calls 28110->28154 28155 13f79d860 106 API calls 28110->28155 28156 13f79b3fc 91 API calls 28110->28156 28157 13f79dbd4 101 API calls _log10_special 28110->28157 28158 13f79dde0 111 API calls _log10_special 28110->28158 28145 13f79e888 28112->28145 28114 13f79d7ca memcpy_s 28115 13f7a92f0 _log10_special 8 API calls 28114->28115 28118 13f79d819 28115->28118 28124 13f79d28c memcpy_s 28123->28124 28125 13f79d36f 28124->28125 28159 13f7a96f8 28124->28159 28125->28110 28127 13f79d314 memcpy_s 28127->28125 28163 13f78b634 84 API calls 28127->28163 28132 13f795700 memcpy_s 28129->28132 28135 13f7956f3 28129->28135 28130 13f795848 28176 13f79a4f8 28130->28176 28132->28130 28134 13f795768 28132->28134 28172 13f78aeb0 28132->28172 28134->28110 28135->28132 28135->28134 28167 13f790b30 28135->28167 28140 13f79b39d 28139->28140 28141 13f79b3a2 28139->28141 28222 13f79b220 28140->28222 28143 13f79b3b3 28141->28143 28227 13f79b3fc 91 API calls 28141->28227 28143->28110 28152 13f79e8b2 shared_ptr memcpy_s 28145->28152 28146 13f79eb7e 28147 13f79edb4 101 API calls 28146->28147 28149 13f79eb94 28146->28149 28147->28149 28149->28114 28150 13f79eac4 28150->28146 28254 13f79fb88 49 API calls shared_ptr 28150->28254 28152->28150 28239 13f79edb4 28152->28239 28248 13f795870 28152->28248 28154->28110 28155->28110 28156->28110 28157->28110 28158->28110 28160 13f7a9729 28159->28160 28161 13f7a974f 28160->28161 28164 13f78b050 28160->28164 28161->28127 28165 13f798640 shared_ptr 92 API calls 28164->28165 28166 13f78b05e std::exception_ptr::_Current_exception 28165->28166 28166->28160 28169 13f790b5e 28167->28169 28171 13f790b65 28167->28171 28168 13f790cb8 GetStdHandle ReadFile GetLastError GetLastError GetFileType 28168->28171 28169->28132 28182 13f79234c 28169->28182 28171->28168 28171->28169 28192 13f78b688 87 API calls 28171->28192 28173 13f78aec1 28172->28173 28174 13f78aed6 28173->28174 28193 13f797a7c 8 API calls 2 library calls 28173->28193 28174->28130 28177 13f79a501 28176->28177 28178 13f79a51b 28177->28178 28194 13f78b9b8 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 28177->28194 28180 13f79a535 SetThreadExecutionState 28178->28180 28195 13f78b9b8 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 28178->28195 28183 13f792369 28182->28183 28186 13f79236e 28182->28186 28196 13f792400 28183->28196 28184 13f7923cc 28184->28132 28186->28184 28188 13f7a933c 4 API calls 28186->28188 28191 13f79239c 28186->28191 28189 13f79238a 28188->28189 28208 13f79b0a8 28189->28208 28217 13f788868 93 API calls 2 library calls 28191->28217 28193->28174 28194->28178 28195->28180 28197 13f79243f 28196->28197 28198 13f7924ef 28196->28198 28197->28198 28199 13f7a933c 4 API calls 28197->28199 28207 13f79246c 28197->28207 28201 13f7a92f0 _log10_special 8 API calls 28198->28201 28202 13f79245a 28199->28202 28200 13f7924e6 28218 13f79b3fc 91 API calls 28200->28218 28204 13f79256f 28201->28204 28205 13f79b0a8 90 API calls 28202->28205 28204->28186 28205->28207 28206 13f79b37c 93 API calls 28206->28207 28207->28200 28207->28206 28209 13f79b0c5 28208->28209 28219 13f79af54 InitializeCriticalSection 28209->28219 28211 13f79b0fd CreateSemaphoreW CreateEventW 28212 13f79b133 28211->28212 28214 13f79b166 28212->28214 28220 13f78b75c 87 API calls 2 library calls 28212->28220 28214->28191 28215 13f79b155 28221 13f78b9b8 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 28215->28221 28217->28184 28218->28198 28219->28211 28220->28215 28221->28214 28223 13f79b266 28222->28223 28224 13f79b238 28222->28224 28223->28141 28224->28223 28226 13f79b255 SetThreadPriority 28224->28226 28228 13f79af80 CreateThread 28224->28228 28226->28224 28227->28143 28229 13f79afdf 28228->28229 28230 13f79afb8 28228->28230 28229->28224 28236 13f78b75c 87 API calls 2 library calls 28230->28236 28232 13f79afcb 28237 13f78baa8 87 API calls 3 library calls 28232->28237 28234 13f79afd0 28238 13f78b9b8 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 28234->28238 28236->28232 28237->28234 28238->28229 28240 13f79eddb 28239->28240 28241 13f79ee4b 28240->28241 28245 13f79edf4 28240->28245 28242 13f79ee69 28241->28242 28243 13f79ee9c 101 API calls 28241->28243 28255 13f79ee9c 28242->28255 28243->28242 28246 13f79ee9c 101 API calls 28245->28246 28247 13f79ee49 28245->28247 28246->28245 28247->28152 28249 13f7958af 28248->28249 28250 13f795896 memcpy_s 28248->28250 28249->28250 28259 13f7909b0 28249->28259 28252 13f7958dd 28250->28252 28253 13f79234c 96 API calls 28250->28253 28253->28252 28254->28146 28256 13f79eebf 28255->28256 28257 13f79eed1 28255->28257 28258 13f795870 101 API calls 28256->28258 28257->28247 28258->28257 28260 13f7909dc 28259->28260 28261 13f7909e3 28259->28261 28263 13f7a92f0 _log10_special 8 API calls 28260->28263 28262 13f7909ed GetStdHandle 28261->28262 28266 13f7909fb 28261->28266 28262->28266 28264 13f790b1f 28263->28264 28264->28250 28265 13f790a56 WriteFile 28265->28266 28266->28260 28266->28265 28267 13f790a16 WriteFile 28266->28267 28270 13f790ae0 28266->28270 28276 13f78b6e8 89 API calls 28266->28276 28267->28266 28268 13f790a4c 28267->28268 28268->28266 28268->28267 28271 13f7820b4 49 API calls 28270->28271 28272 13f790af1 28271->28272 28277 13f78b6c8 87 API calls 28272->28277 28276->28266 28278 13f782280 28281 13f78228d 28278->28281 28284 13f7822b3 28278->28284 28280 13f7822b9 28282 13f78229d 28281->28282 28285 13f7b01b4 47 API calls _invalid_parameter_noinfo_noreturn 28281->28285 28286 13f7824c8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task std::_Xinvalid_argument 28284->28286 28286->28280 28287 13f7a32f8 28288 13f7826bc shared_ptr 2 API calls 28287->28288 28289 13f7a3327 28288->28289 28290 13f7a3338 28289->28290 28291 13f7a3366 28289->28291 28292 13f79788c 49 API calls 28290->28292 28293 13f79788c 49 API calls 28291->28293 28294 13f7a3342 28292->28294 28295 13f7a3370 28293->28295 28296 13f799f58 52 API calls 28294->28296 28297 13f799f58 52 API calls 28295->28297 28298 13f7a3352 28296->28298 28299 13f7a3380 28297->28299 28300 13f7837f4 47 API calls 28298->28300 28301 13f7837f4 47 API calls 28299->28301 28302 13f7a335f 28300->28302 28301->28302 28303 13f782254 collate 47 API calls 28302->28303 28304 13f7a3397 28303->28304 28305 13f7a33ad SetDlgItemTextW 28304->28305 28306 13f782254 collate 47 API calls 28305->28306 28307 13f7a33c6 28306->28307 28308 13f7a92f0 _log10_special 8 API calls 28307->28308 28309 13f7a33d8 28308->28309 28310 13f7a8475 28313 13f7a8b00 28310->28313 28339 13f7a8754 28313->28339 28316 13f7a8b8b 28318 13f7a8a64 DloadReleaseSectionWriteAccess 6 API calls 28316->28318 28317 13f7a8bb4 28320 13f7a8c3d LoadLibraryExA 28317->28320 28321 13f7a8ca9 28317->28321 28324 13f7a8cbd 28317->28324 28327 13f7a8d85 28317->28327 28319 13f7a8b98 RaiseException 28318->28319 28332 13f7a84b4 28319->28332 28320->28321 28322 13f7a8c54 GetLastError 28320->28322 28321->28324 28328 13f7a8cb4 FreeLibrary 28321->28328 28325 13f7a8c69 28322->28325 28326 13f7a8c7e 28322->28326 28323 13f7a8d1b GetProcAddress 28323->28327 28331 13f7a8d30 GetLastError 28323->28331 28324->28323 28324->28327 28325->28321 28325->28326 28330 13f7a8a64 DloadReleaseSectionWriteAccess 6 API calls 28326->28330 28347 13f7a8a64 28327->28347 28328->28324 28333 13f7a8c8b RaiseException 28330->28333 28334 13f7a8d45 28331->28334 28333->28332 28334->28327 28335 13f7a8a64 DloadReleaseSectionWriteAccess 6 API calls 28334->28335 28336 13f7a8d67 RaiseException 28335->28336 28337 13f7a8754 6 API calls 28336->28337 28338 13f7a8d81 28337->28338 28338->28327 28340 13f7a876a 28339->28340 28341 13f7a87cf 28339->28341 28355 13f7a8800 28340->28355 28341->28316 28341->28317 28344 13f7a87ca 28346 13f7a8800 DloadReleaseSectionWriteAccess 3 API calls 28344->28346 28346->28341 28348 13f7a8a74 28347->28348 28349 13f7a8acd 28347->28349 28350 13f7a8800 DloadReleaseSectionWriteAccess 3 API calls 28348->28350 28349->28332 28351 13f7a8a79 28350->28351 28352 13f7a8ac8 28351->28352 28353 13f7a89d4 DloadProtectSection 3 API calls 28351->28353 28354 13f7a8800 DloadReleaseSectionWriteAccess 3 API calls 28352->28354 28353->28352 28354->28349 28356 13f7a881b 28355->28356 28357 13f7a876f 28355->28357 28356->28357 28358 13f7a8820 GetModuleHandleW 28356->28358 28357->28344 28362 13f7a89d4 28357->28362 28359 13f7a883a GetProcAddress 28358->28359 28360 13f7a8835 28358->28360 28359->28360 28361 13f7a884f GetProcAddress 28359->28361 28360->28357 28361->28360 28364 13f7a89f6 DloadProtectSection 28362->28364 28363 13f7a89fe 28363->28344 28364->28363 28365 13f7a8a36 VirtualProtect 28364->28365 28367 13f7a88a0 VirtualQuery GetSystemInfo 28364->28367 28365->28363 28367->28365 28368 13f7b5d35 28380 13f7b5a88 28368->28380 28385 13f7b72e0 47 API calls 3 library calls 28380->28385 28382 13f7b6ea0 BuildCatchObjectHelperInternal 47 API calls 28384 13f7b5ab1 28382->28384 28383 13f7b5a91 28383->28382 28385->28383 28386 13f7a818c 28387 13f7a809b 28386->28387 28388 13f7a8b00 14 API calls 28387->28388 28388->28387 28392 13f7a06f0 28393 13f7a0714 28392->28393 28394 13f7a06fd 28392->28394 28394->28393 28396 13f7a12f8 28394->28396 28397 13f7a1308 28396->28397 28398 13f7a1317 28396->28398 28397->28398 28400 13f7a0de0 28397->28400 28398->28393 28401 13f7a0f71 28400->28401 28402 13f7a0e17 28400->28402 28403 13f7a92f0 _log10_special 8 API calls 28401->28403 28405 13f7820b4 49 API calls 28402->28405 28404 13f7a0f7d 28403->28404 28404->28398 28406 13f7a0e34 28405->28406 28426 13f79cb40 28406->28426 28408 13f7a0e5d 28409 13f7a0eca 28408->28409 28450 13f7a11c0 49 API calls shared_ptr 28408->28450 28429 13f79c820 28409->28429 28411 13f7a0eb5 28413 13f7837f4 47 API calls 28411->28413 28415 13f7a0ec1 28413->28415 28417 13f782254 collate 47 API calls 28415->28417 28417->28409 28418 13f7a0eea 28419 13f7a0ef3 GlobalAlloc 28418->28419 28420 13f7a0f0e 28419->28420 28421 13f7a0f26 CreateStreamOnHGlobal 28420->28421 28422 13f7a0f3c 28421->28422 28423 13f7a0f4c 28421->28423 28439 13f7a0c7c 28422->28439 28425 13f782254 collate 47 API calls 28423->28425 28425->28401 28427 13f79cb62 shared_ptr 28426->28427 28428 13f79cb6d CompareStringW 28427->28428 28428->28408 28430 13f79c84a 28429->28430 28431 13f79c95f 28430->28431 28432 13f79cccc 49 API calls 28430->28432 28433 13f7a1494 28431->28433 28432->28430 28434 13f7a14a7 shared_ptr 28433->28434 28435 13f786d94 49 API calls 28434->28435 28436 13f7a14e4 shared_ptr 28435->28436 28438 13f7a14ff 28436->28438 28451 13f7a1604 49 API calls shared_ptr 28436->28451 28438->28418 28443 13f7a0cc6 28439->28443 28440 13f7a0db9 28441 13f7a92f0 _log10_special 8 API calls 28440->28441 28444 13f7a0dcd 28441->28444 28442 13f7a0d65 28452 13f7a0f94 50 API calls shared_ptr 28442->28452 28443->28440 28443->28442 28444->28423 28446 13f7a0d6e 28447 13f7a0d94 ShowWindow 28446->28447 28448 13f7a0db0 28447->28448 28449 13f782254 collate 47 API calls 28448->28449 28449->28440 28450->28411 28451->28438 28452->28446 28453 13f7ac670 28460 13f7af93c 28453->28460 28455 13f7ac67d 28461 13f7af944 28460->28461 28463 13f7af975 28461->28463 28464 13f7ac679 28461->28464 28474 13f7afc38 28461->28474 28479 13f7af984 DeleteCriticalSection 28463->28479 28464->28455 28466 13f7ac7dc 28464->28466 28490 13f7afb0c 28466->28490 28480 13f7af9bc 28474->28480 28477 13f7afc83 InitializeCriticalSectionAndSpinCount 28478 13f7afc78 28477->28478 28478->28461 28479->28464 28481 13f7afae3 28480->28481 28486 13f7afa00 __vcrt_FlsAlloc 28480->28486 28481->28477 28481->28478 28482 13f7afa2e LoadLibraryExW 28484 13f7afa4f GetLastError 28482->28484 28485 13f7afaa5 28482->28485 28483 13f7afac5 GetProcAddress 28483->28481 28488 13f7afad6 28483->28488 28484->28486 28485->28483 28487 13f7afabc FreeLibrary 28485->28487 28486->28481 28486->28482 28486->28483 28489 13f7afa71 LoadLibraryExW 28486->28489 28487->28483 28488->28481 28489->28485 28489->28486 28491 13f7af9bc __vcrt_FlsAlloc 5 API calls 28490->28491 28492 13f7afb31 TlsAlloc 28491->28492 28494 13f7a0150 IsWindow 28495 13f7a016e 28494->28495 28496 13f7a4930 28765 13f7828d8 28496->28765 28498 13f7a4975 28499 13f7a498c 28498->28499 28500 13f7a5434 28498->28500 28743 13f7a49a5 28498->28743 28503 13f7a499c 28499->28503 28504 13f7a4a3d 28499->28504 28499->28743 28966 13f7a2bcc 28500->28966 28507 13f7a49a0 28503->28507 28519 13f7a49fc 28503->28519 28509 13f7a4af3 28504->28509 28512 13f7a4a57 28504->28512 28505 13f7a92f0 _log10_special 8 API calls 28508 13f7a5923 28505->28508 28506 13f79788c 49 API calls 28510 13f7a5446 28506->28510 28516 13f7826bc shared_ptr 2 API calls 28507->28516 28507->28743 28776 13f7827fc GetDlgItem 28509->28776 28514 13f799f58 52 API calls 28510->28514 28513 13f79788c 49 API calls 28512->28513 28517 13f7a4a75 SetDlgItemTextW 28513->28517 28518 13f7a545c 28514->28518 28515 13f7a4b06 28523 13f7a4b16 ShowWindow 28515->28523 28521 13f7a49b6 28516->28521 28522 13f7a4a88 28517->28522 28984 13f7a1fec FindResourceW 28518->28984 28520 13f7a4a2d EndDialog 28519->28520 28519->28743 28520->28743 28524 13f79788c 49 API calls 28521->28524 28527 13f7a4aa2 GetMessageW 28522->28527 28522->28743 28536 13f7a4b23 28523->28536 28525 13f7a49c1 28524->28525 28769 13f7811c0 SHGetMalloc 28525->28769 28530 13f7a4ac0 IsDialogMessageW 28527->28530 28527->28743 28529 13f7a49d1 28537 13f782254 collate 47 API calls 28529->28537 28530->28522 28533 13f7a4ad5 TranslateMessage DispatchMessageW 28530->28533 28531 13f7a4bb5 EndDialog 28670 13f7a4bd9 28531->28670 28533->28522 28535 13f7a4bff GetDlgItem 28540 13f7a4c19 SendMessageW SendMessageW 28535->28540 28541 13f7a4c46 SetFocus 28535->28541 28536->28531 28536->28535 28737 13f7a4bf1 28536->28737 28537->28743 28540->28541 28542 13f7a4c82 28541->28542 28543 13f7a4c58 28541->28543 28547 13f78a120 49 API calls 28542->28547 28546 13f79788c 49 API calls 28543->28546 28544 13f7a54e7 SendDlgItemMessageW 28549 13f7a5533 28544->28549 28550 13f7a5524 SendMessageW 28544->28550 28545 13f7a5488 28557 13f7a549e DeleteObject 28545->28557 28552 13f7a4c62 28546->28552 28553 13f7a4c94 28547->28553 28548 13f7a52f7 28554 13f79788c 49 API calls 28548->28554 28555 13f7a553f SendDlgItemMessageW 28549->28555 28556 13f7a5557 GetDlgItem SendMessageW 28549->28556 28550->28549 28551 13f782254 collate 47 API calls 28551->28743 28558 13f7820b4 49 API calls 28552->28558 28788 13f7a2b24 28553->28788 28560 13f7a5308 SetDlgItemTextW 28554->28560 28555->28556 28561 13f7826bc shared_ptr 2 API calls 28556->28561 28562 13f7a1fec 12 API calls 28557->28562 28564 13f7a4c6f 28558->28564 28566 13f7a531b 28560->28566 28567 13f7a5589 28561->28567 28563 13f7a54b1 28562->28563 29061 13f7a1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28563->29061 28569 13f7a30d4 25 API calls 28564->28569 28565 13f7a4ca2 28576 13f79788c 49 API calls 28565->28576 28573 13f79788c 49 API calls 28566->28573 28570 13f794a5c 51 API calls 28567->28570 28572 13f7a4c7b 28569->28572 28574 13f7a5594 GetDlgItem 28570->28574 28571 13f7a54c0 29062 13f7a1c04 28571->29062 28579 13f782254 collate 47 API calls 28572->28579 28577 13f7a533b 28573->28577 28588 13f7a55b1 28574->28588 28580 13f7a4cbc 28576->28580 28581 13f7820b4 49 API calls 28577->28581 28585 13f7a4cf0 28579->28585 28582 13f799f58 52 API calls 28580->28582 28583 13f7a5348 28581->28583 28586 13f7a4ccc 28582->28586 28587 13f7a53b6 28583->28587 28597 13f79788c 49 API calls 28583->28597 28609 13f7a4d03 28585->28609 28815 13f7a7598 28585->28815 28800 13f7a30d4 28586->28800 28594 13f79788c 49 API calls 28587->28594 29005 13f7a19f0 GetClassNameW 28588->29005 28589 13f7a54db DeleteObject 28589->28544 28593 13f7a4d30 28828 13f7912c8 28593->28828 28595 13f7a53c0 28594->28595 28600 13f7820b4 49 API calls 28595->28600 28602 13f7a5361 28597->28602 28605 13f7a53d0 28600->28605 28606 13f7820b4 49 API calls 28602->28606 28616 13f7820b4 49 API calls 28605->28616 28611 13f7a5378 28606->28611 28607 13f7a4d44 GetLastError 28608 13f7a4d55 28607->28608 28838 13f794a40 28608->28838 28609->28593 29051 13f7915d4 28609->29051 28623 13f781294 49 API calls 28611->28623 28615 13f7a4d28 29054 13f7a2de8 12 API calls _log10_special 28615->29054 28622 13f7a53eb 28616->28622 28617 13f7a55db 28618 13f7a5611 28617->28618 28624 13f7a5abc 106 API calls 28617->28624 28628 13f79788c 49 API calls 28618->28628 28638 13f7a564d 28618->28638 28639 13f782254 collate 47 API calls 28622->28639 28627 13f7a539a 28623->28627 28624->28618 28631 13f782254 collate 47 API calls 28627->28631 28632 13f7a5624 SetDlgItemTextW 28628->28632 28640 13f7a53a8 28631->28640 28634 13f79788c 49 API calls 28632->28634 28641 13f7a563f SetDlgItemTextW 28634->28641 28646 13f7a5abc 106 API calls 28638->28646 28667 13f7a5761 28638->28667 28647 13f7a5416 28639->28647 28648 13f782254 collate 47 API calls 28640->28648 28641->28638 28643 13f7a5860 28651 13f7a5869 EnableWindow 28643->28651 28652 13f7a5874 28643->28652 28694 13f7a566b 28646->28694 28655 13f782254 collate 47 API calls 28647->28655 28648->28587 28651->28652 28658 13f7a589b 28652->28658 28662 13f7826d8 2 API calls 28652->28662 28659 13f7a5424 28655->28659 28663 13f7a58c8 28658->28663 28680 13f7a58c0 SendMessageW 28658->28680 28664 13f782254 collate 47 API calls 28659->28664 28668 13f7a588c 28662->28668 28671 13f7a58f0 28663->28671 28672 13f79788c 49 API calls 28663->28672 28664->28670 28667->28643 28676 13f7826bc shared_ptr 2 API calls 28667->28676 28677 13f7826d8 2 API calls 28668->28677 28669 13f7a56aa 28681 13f7a5753 28669->28681 28682 13f7a56b8 SetForegroundWindow 28669->28682 28670->28551 28673 13f782254 collate 47 API calls 28671->28673 28683 13f7a58e1 SetDlgItemTextW 28672->28683 28684 13f7a58fa 28673->28684 28741 13f7a5799 28676->28741 28677->28658 28680->28663 28695 13f7a5abc 106 API calls 28681->28695 28682->28681 28688 13f7a56cd 28682->28688 28683->28671 28689 13f782254 collate 47 API calls 28684->28689 28688->28681 28702 13f7a5abc 106 API calls 28688->28702 28689->28743 28694->28669 29030 13f7a07c4 ShowWindow 28694->29030 28695->28667 28699 13f7a5832 28713 13f7a07c4 62 API calls 28699->28713 28706 13f7a56e7 28702->28706 28706->28681 28720 13f7a56f7 DialogBoxParamW 28706->28720 28712 13f79788c 49 API calls 28712->28741 28716 13f7a5855 28713->28716 28718 13f782254 collate 47 API calls 28716->28718 28717 13f7820b4 49 API calls 28717->28741 28718->28643 28720->28681 28724 13f7a571f EndDialog 28720->28724 28728 13f782254 collate 47 API calls 28724->28728 28734 13f7a573d 28728->28734 28739 13f782254 collate 47 API calls 28734->28739 28736 13f781294 49 API calls 28736->28741 28737->28531 28737->28548 28739->28743 28741->28699 28741->28712 28741->28717 28741->28736 28744 13f782254 47 API calls collate 28741->28744 28743->28505 28744->28741 28766 13f7828e1 28765->28766 28768 13f7828f6 28765->28768 28766->28768 29067 13f796960 28766->29067 28768->28498 28770 13f7811f5 SHBrowseForFolderW 28769->28770 28772 13f781241 28769->28772 28771 13f781236 28770->28771 28770->28772 29118 13f7939b8 28771->29118 28774 13f7a92f0 _log10_special 8 API calls 28772->28774 28775 13f78126e 28774->28775 28775->28529 28777 13f782839 28776->28777 28778 13f782852 28776->28778 28779 13f7820b4 49 API calls 28777->28779 29125 13f782724 28778->29125 28781 13f78284a 28779->28781 28782 13f782254 collate 47 API calls 28781->28782 28784 13f782884 28781->28784 28782->28784 28783 13f782894 28786 13f7a92f0 _log10_special 8 API calls 28783->28786 28784->28783 28785 13f782254 collate 47 API calls 28784->28785 28785->28783 28787 13f7828a4 28786->28787 28787->28515 28792 13f7a2b49 28788->28792 28789 13f7a2bb6 28790 13f7a92f0 _log10_special 8 API calls 28789->28790 28791 13f7a2bc3 28790->28791 28791->28565 28792->28789 29138 13f78d1dc 49 API calls shared_ptr 28792->29138 28794 13f7a2b81 28795 13f7837f4 47 API calls 28794->28795 28796 13f7a2ba1 28795->28796 28797 13f782254 collate 47 API calls 28796->28797 28798 13f7a2bab 28797->28798 28799 13f782254 collate 47 API calls 28798->28799 28799->28789 29139 13f7a28e8 PeekMessageW 28800->29139 28803 13f7a316c SendMessageW SendMessageW 28806 13f7a31cd SendMessageW 28803->28806 28807 13f7a31b2 28803->28807 28804 13f7a3125 29144 13f7a0968 28804->29144 29147 13f78128c 28806->29147 28807->28806 28816 13f7a7691 28815->28816 28819 13f7a75c3 28815->28819 28817 13f7a92f0 _log10_special 8 API calls 28816->28817 28818 13f7a76a1 28817->28818 28818->28609 28819->28816 28820 13f7826bc shared_ptr 2 API calls 28819->28820 28821 13f7a75e1 28820->28821 29148 13f7a7524 28821->29148 28823 13f7a75f3 RegCreateKeyExW 28824 13f7a7687 28823->28824 28826 13f7a7638 28823->28826 28825 13f782254 collate 47 API calls 28824->28825 28825->28816 28827 13f7a765a RegSetValueExW RegCloseKey 28826->28827 28827->28824 28835 13f7912f6 28828->28835 28829 13f7a92f0 _log10_special 8 API calls 28830 13f7913c2 28829->28830 28830->28607 28830->28608 28831 13f7912fa 28831->28829 28832 13f791386 28832->28831 28833 13f7911b4 58 API calls 28832->28833 28833->28831 28834 13f789768 49 API calls 28834->28835 28835->28831 28835->28832 28835->28834 28837 13f782254 collate 47 API calls 28835->28837 29151 13f7911b4 28835->29151 28837->28835 29271 13f78128c 28838->29271 28967 13f7a1c74 4 API calls 28966->28967 28968 13f7a2bfb 28967->28968 28969 13f7a2cf3 28968->28969 28970 13f7a2c03 GetWindow 28968->28970 28971 13f7a92f0 _log10_special 8 API calls 28969->28971 28975 13f7a2c1e 28970->28975 28972 13f7a2d03 28971->28972 28972->28506 28973 13f7a2c2a GetClassNameW 30039 13f79cb10 CompareStringW 28973->30039 28975->28969 28975->28973 28976 13f7a2c53 GetWindowLongPtrW 28975->28976 28977 13f7a2cd2 GetWindow 28975->28977 28976->28977 28978 13f7a2c65 SendMessageW 28976->28978 28977->28969 28977->28975 28978->28977 28981 13f7a2c81 28978->28981 28980 13f7a1c04 4 API calls 28980->28981 28981->28980 30040 13f7a1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28981->30040 30041 13f7a1ce8 15 API calls 2 library calls 28981->30041 28983 13f7a2cb5 SendMessageW DeleteObject 28983->28977 28985 13f7a212a 28984->28985 28986 13f7a2017 SizeofResource 28984->28986 29000 13f7a1c74 28985->29000 28986->28985 28987 13f7a2031 LoadResource 28986->28987 28987->28985 28988 13f7a204a LockResource 28987->28988 28988->28985 28989 13f7a205f GlobalAlloc 28988->28989 28989->28985 28990 13f7a207e GlobalLock 28989->28990 28991 13f7a2090 memcpy_s 28990->28991 28992 13f7a2121 GlobalFree 28990->28992 28993 13f7a209e CreateStreamOnHGlobal 28991->28993 28992->28985 28994 13f7a2118 GlobalUnlock 28993->28994 28995 13f7a20b8 28993->28995 28994->28992 30042 13f7a276c 28995->30042 29001 13f7a1c04 4 API calls 29000->29001 29002 13f7a1c82 29001->29002 29003 13f7a1c91 29002->29003 30053 13f7a1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 29002->30053 29003->28544 29003->28545 29006 13f7a1a50 29005->29006 29007 13f7a1a23 29005->29007 29009 13f7a1a63 29006->29009 29010 13f7a1a55 SHAutoComplete 29006->29010 30054 13f79cb10 CompareStringW 29007->30054 29012 13f7a92f0 _log10_special 8 API calls 29009->29012 29010->29009 29011 13f7a1a34 29011->29006 29013 13f7a1a38 FindWindowExW 29011->29013 29014 13f7a1a73 29012->29014 29013->29006 29015 13f7a3dfc 29014->29015 29016 13f7a3e06 29015->29016 29017 13f782e64 94 API calls 29016->29017 29018 13f7a3e2c 29017->29018 30055 13f7832c0 29018->30055 29021 13f7a3e4f 29024 13f782bf0 142 API calls 29021->29024 29022 13f7a3e41 29023 13f783128 100 API calls 29022->29023 29027 13f7a3e4b 29023->29027 29025 13f7a3e60 29024->29025 29026 13f783128 100 API calls 29025->29026 29026->29027 29028 13f7a92f0 _log10_special 8 API calls 29027->29028 29029 13f7a3e7e 29028->29029 29029->28617 30063 13f7a0990 LoadCursorW RegisterClassExW 29030->30063 29032 13f7a080e __vcrt_freefls 29033 13f7a0821 29032->29033 30064 13f7b5788 47 API calls _invalid_parameter_noinfo_noreturn 29032->30064 29034 13f7a082d GetWindowRect GetParent MapWindowPoints 29033->29034 29036 13f7a086c DestroyWindow 29034->29036 29037 13f7a0872 GetParent CreateWindowExW 29034->29037 29036->29037 29038 13f7a08e0 29037->29038 29039 13f7a092d 29037->29039 29038->29039 29042 13f7a08e7 29038->29042 29040 13f7a094a 29039->29040 29041 13f7a0932 ShowWindow UpdateWindow 29039->29041 29043 13f7a92f0 _log10_special 8 API calls 29040->29043 29041->29040 29042->29040 29045 13f7a08fc 29042->29045 29044 13f7a095a 29043->29044 29044->28669 30065 13f7a0f94 50 API calls shared_ptr 29045->30065 29047 13f7a0906 ShowWindow 29048 13f7a0921 29047->29048 29049 13f782254 collate 47 API calls 29048->29049 29050 13f7a092b 29049->29050 29050->29040 29052 13f79160c 53 API calls 29051->29052 29053 13f7915dd 29052->29053 29053->28593 29053->28615 29054->28593 29061->28571 29063 13f7a1c1b 29062->29063 29064 13f7a1c16 29062->29064 29066 13f7a1ce8 15 API calls 2 library calls 29063->29066 30066 13f7a1bb4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 29064->30066 29066->28589 29091 13f791d38 29067->29091 29071 13f7969c0 29072 13f796a27 29071->29072 29075 13f796584 47 API calls 29071->29075 29081 13f796a09 SetDlgItemTextW 29071->29081 29096 13f796cd4 29072->29096 29075->29071 29076 13f796a9c GetWindowLongPtrW 29079 13f7ea268 29076->29079 29077 13f796b51 29109 13f7968d8 29077->29109 29082 13f796b3a GetWindowRect 29079->29082 29081->29071 29082->29077 29083 13f796b7e GetSystemMetrics GetWindow 29085 13f796ca9 29083->29085 29089 13f796ba9 29083->29089 29084 13f796b71 SetWindowTextW 29084->29083 29086 13f7a92f0 _log10_special 8 API calls 29085->29086 29087 13f796cb8 29086->29087 29087->28768 29088 13f796bc6 GetWindowRect 29088->29089 29089->29085 29089->29088 29090 13f796c88 GetWindow 29089->29090 29090->29085 29090->29089 29092 13f791ce0 50 API calls 29091->29092 29093 13f791d54 29092->29093 29094 13f79c520 WideCharToMultiByte 29093->29094 29095 13f79c562 29094->29095 29095->29071 29097 13f7968d8 51 API calls 29096->29097 29100 13f796d16 29097->29100 29098 13f7a92f0 _log10_special 8 API calls 29099 13f796a39 GetWindowRect GetClientRect 29098->29099 29099->29076 29099->29077 29101 13f7820b4 49 API calls 29100->29101 29108 13f796d7b 29100->29108 29102 13f796d40 29101->29102 29103 13f782254 collate 47 API calls 29102->29103 29104 13f796d57 29103->29104 29105 13f7820b4 49 API calls 29104->29105 29106 13f796d65 29105->29106 29107 13f782254 collate 47 API calls 29106->29107 29107->29108 29108->29098 29110 13f791d38 50 API calls 29109->29110 29111 13f796917 29110->29111 29112 13f79c520 WideCharToMultiByte 29111->29112 29113 13f79692f 29112->29113 29114 13f796584 47 API calls 29113->29114 29115 13f796944 29114->29115 29116 13f7a92f0 _log10_special 8 API calls 29115->29116 29117 13f796954 29116->29117 29117->29083 29117->29084 29119 13f781da4 shared_ptr 49 API calls 29118->29119 29120 13f7939d7 shared_ptr 29119->29120 29121 13f7939e2 SHGetPathFromIDListW 29120->29121 29122 13f7939fd shared_ptr 29121->29122 29123 13f78129c 49 API calls 29122->29123 29124 13f793a08 29123->29124 29124->28772 29126 13f7826bc shared_ptr 2 API calls 29125->29126 29127 13f782752 GetWindowTextLengthW 29126->29127 29128 13f781da4 shared_ptr 49 API calls 29127->29128 29129 13f78276c shared_ptr 29128->29129 29130 13f782784 GetWindowTextW 29129->29130 29131 13f78279a shared_ptr 29130->29131 29132 13f7820b4 49 API calls 29131->29132 29133 13f7827a5 29132->29133 29134 13f782254 collate 47 API calls 29133->29134 29135 13f7827bb 29134->29135 29136 13f7a92f0 _log10_special 8 API calls 29135->29136 29137 13f7827cb 29136->29137 29137->28781 29138->28794 29140 13f7a294c GetDlgItem 29139->29140 29141 13f7a2908 GetMessageW 29139->29141 29140->28803 29140->28804 29142 13f7a2927 IsDialogMessageW 29141->29142 29143 13f7a2936 TranslateMessage DispatchMessageW 29141->29143 29142->29140 29142->29143 29143->29140 29145 13f7a0989 ShowWindow SendMessageW SendMessageW 29144->29145 29146 13f7a097e DestroyWindow 29144->29146 29145->28803 29146->29145 29149 13f783be4 49 API calls 29148->29149 29150 13f7a7538 29149->29150 29150->28823 29153 13f7911e3 29151->29153 29152 13f79120a 29154 13f7915d4 53 API calls 29152->29154 29153->29152 29155 13f7911f7 CreateDirectoryW 29153->29155 29156 13f791218 29154->29156 29155->29152 29158 13f79125d 29155->29158 29157 13f791271 GetLastError 29156->29157 29160 13f7826bc shared_ptr 2 API calls 29156->29160 29159 13f79126d 29157->29159 29158->29159 29235 13f791694 29158->29235 29163 13f7a92f0 _log10_special 8 API calls 29159->29163 29162 13f791226 29160->29162 29172 13f794350 29162->29172 29165 13f791299 29163->29165 29165->28835 29167 13f79124f 29169 13f782254 collate 47 API calls 29167->29169 29168 13f791238 29171 13f791242 CreateDirectoryW 29168->29171 29170 13f791259 29169->29170 29170->29157 29170->29158 29171->29167 29173 13f794383 29172->29173 29174 13f794389 29173->29174 29175 13f7820b4 49 API calls 29173->29175 29177 13f7a92f0 _log10_special 8 API calls 29174->29177 29176 13f7943a0 29175->29176 29179 13f79448c 29176->29179 29180 13f7943b1 29176->29180 29178 13f791234 29177->29178 29178->29167 29178->29168 29181 13f7826bc shared_ptr 2 API calls 29179->29181 29183 13f7943c2 29180->29183 29197 13f7943e6 29180->29197 29182 13f794495 29181->29182 29184 13f794a5c 51 API calls 29182->29184 29250 13f794e30 49 API calls 29183->29250 29190 13f79449f 29184->29190 29186 13f7943d2 29189 13f7837f4 47 API calls 29186->29189 29187 13f794487 29191 13f782254 collate 47 API calls 29187->29191 29188 13f782254 collate 47 API calls 29188->29187 29227 13f7943dd 29189->29227 29193 13f79452c 29190->29193 29194 13f7944bd 29190->29194 29233 13f794522 29190->29233 29191->29174 29192 13f782254 collate 47 API calls 29192->29187 29263 13f794e30 49 API calls 29193->29263 29260 13f794ecc 49 API calls shared_ptr 29194->29260 29196 13f79453d 29199 13f7837f4 47 API calls 29196->29199 29197->29187 29200 13f789768 49 API calls 29197->29200 29202 13f794548 29199->29202 29203 13f794438 29200->29203 29201 13f7944d7 29261 13f7813dc 49 API calls shared_ptr 29201->29261 29205 13f782254 collate 47 API calls 29202->29205 29251 13f794dc8 29203->29251 29208 13f794551 29205->29208 29207 13f7944ea 29262 13f794e98 49 API calls shared_ptr 29207->29262 29264 13f7938b8 49 API calls 29208->29264 29213 13f7944fa 29215 13f7837f4 47 API calls 29213->29215 29214 13f79445f 29216 13f7837f4 47 API calls 29214->29216 29217 13f794505 29215->29217 29218 13f79446a 29216->29218 29219 13f782254 collate 47 API calls 29217->29219 29220 13f782254 collate 47 API calls 29218->29220 29223 13f79450e 29219->29223 29221 13f794473 29220->29221 29224 13f782254 collate 47 API calls 29221->29224 29222 13f789768 49 API calls 29225 13f79459a 29222->29225 29226 13f782254 collate 47 API calls 29223->29226 29224->29227 29228 13f781294 49 API calls 29225->29228 29229 13f794518 29226->29229 29227->29192 29231 13f7945a6 29228->29231 29232 13f782254 collate 47 API calls 29229->29232 29230 13f794559 29230->29222 29234 13f782254 collate 47 API calls 29231->29234 29232->29233 29233->29188 29234->29233 29270 13f78128c 29235->29270 29250->29186 29252 13f794ddc shared_ptr 29251->29252 29253 13f794e2a 29252->29253 29254 13f794dff 29252->29254 29269 13f781dc0 49 API calls std::_Xinvalid_argument 29253->29269 29265 13f78d510 29254->29265 29258 13f79444f 29259 13f78fac0 49 API calls 29258->29259 29259->29214 29260->29201 29261->29207 29262->29213 29263->29196 29264->29230 29266 13f78d538 shared_ptr 29265->29266 29267 13f78250c shared_ptr 2 API calls 29266->29267 29268 13f78d59a shared_ptr 29266->29268 29267->29268 29268->29258 30039->28975 30040->28981 30041->28983 30051 13f7a2634 GdipAlloc 30042->30051 30053->29003 30054->29011 30056 13f790774 94 API calls 30055->30056 30057 13f7832d5 30056->30057 30058 13f7832d9 30057->30058 30059 13f78336c 119 API calls 30057->30059 30058->29021 30058->29022 30060 13f7832e7 30059->30060 30060->30058 30062 13f7838bc 84 API calls _log10_special 30060->30062 30062->30058 30063->29032 30064->29034 30065->29047 30066->29063 30067 13f7a0190 GetClientRect CopyRect 30068 13f7a0239 30067->30068 30069 13f7a92f0 _log10_special 8 API calls 30068->30069 30070 13f7a0248 30069->30070 30071 13f787350 30074 13f787373 30071->30074 30073 13f7873f2 30075 13f781b5c 49 API calls 2 library calls 30074->30075 30075->30073 30079 13f7a3be4 30082 13f7998e8 30079->30082 30083 13f7998ed SendDlgItemMessageW 30082->30083 30084 13f7a8748 30086 13f7a869f 30084->30086 30085 13f7a8b00 14 API calls 30085->30086 30086->30084 30086->30085 30087 13f7a7f85 30088 13f7a7f91 30087->30088 30089 13f7a8b00 14 API calls 30088->30089 30090 13f7a7fd0 30089->30090 30090->30090
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Item$Message$SendText$DialogWindow$ErrorFileLast$DeleteLoadLongObjectStringView$CloseCommandCountCreateDispatchEnableExecuteFocusForegroundHandleLineMappingParamShellShowSleepTickTranslateUnmap
                              • String ID: -el -s2 "-d%s" "-sp%s"$1ERs$@$LICENSEDLG$STARTDLG$WinRAR$__tmp_rar_sfx_access_check_$d$p$runas$winrarsfxmappingfile.tmp
                              • API String ID: 1861407826-1862608659
                              • Opcode ID: bfefcb1adc0f4337bd9708062b20f0ae54d63f6e4ad3fb607d105c27b1d5a5d9
                              • Instruction ID: 29f1330b941f7dfb5aefeaf18743128d706e4bf891c9101213dbbd4b72cb0f85
                              • Opcode Fuzzy Hash: bfefcb1adc0f4337bd9708062b20f0ae54d63f6e4ad3fb607d105c27b1d5a5d9
                              • Instruction Fuzzy Hash: D2929132B0568092FE60EB61E8517EA7761BBD5780F81403DE94A47BE6DF29CB0BC741

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 564 13f7a41d0-13f7a428c call 13f79a548 call 13f794a5c call 13f7a2794 call 13f7826bc * 4 call 13f7abb80 call 13f7a461c call 13f7a419c GetCommandLineW 585 13f7a43ce-13f7a452b call 13f794964 call 13f7837f4 call 13f782254 call 13f78128c SetEnvironmentVariableW GetLocalTime call 13f791d38 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 13f795b14 call 13f7a071c * 2 DialogBoxParamW call 13f7a0794 * 2 564->585 586 13f7a4292-13f7a42ba call 13f7820b4 call 13f7a4730 call 13f782254 564->586 634 13f7a452d Sleep 585->634 635 13f7a4533-13f7a453a 585->635 600 13f7a42c0-13f7a42da OpenFileMappingW 586->600 601 13f7a43ad-13f7a43c9 call 13f7820b4 call 13f7a4688 call 13f782254 586->601 603 13f7a42e0-13f7a4303 MapViewOfFile 600->603 604 13f7a43a2-13f7a43ab CloseHandle 600->604 601->585 603->604 607 13f7a4309-13f7a4341 call 13f7817e4 UnmapViewOfFile MapViewOfFile 603->607 604->585 607->604 616 13f7a4343-13f7a439c call 13f7a4128 call 13f7a4688 call 13f798864 call 13f798770 call 13f7986bc UnmapViewOfFile 607->616 616->604 634->635 637 13f7a453c call 13f7a723c 635->637 638 13f7a4541-13f7a4564 call 13f79868c DeleteObject 635->638 637->638 643 13f7a456c-13f7a4573 call 13f78ffc4 638->643 644 13f7a4566 DeleteObject 638->644 647 13f7a458e-13f7a459f 643->647 648 13f7a4575-13f7a457b 643->648 644->643 650 13f7a45b3-13f7a45c1 call 13f78ffc4 647->650 651 13f7a45a1-13f7a45ad call 13f7a71d0 CloseHandle 647->651 648->647 649 13f7a457d-13f7a4589 call 13f78b9c0 648->649 649->647 657 13f7a45c3-13f7a45d0 650->657 658 13f7a45e6-13f7a45eb call 13f7a2804 650->658 651->650 659 13f7a45e0-13f7a45e2 657->659 660 13f7a45d2-13f7a45da 657->660 664 13f7a45f0-13f7a4619 call 13f7a92f0 658->664 659->658 663 13f7a45e4 659->663 660->658 662 13f7a45dc-13f7a45de 660->662 662->658 663->658
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File$EnvironmentHandleVariableView$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogGdiplusIconInitializeLineLoadLocalMallocMappingOpenParamSleepStartupTime
                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$1ERs$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                              • API String ID: 956318440-2037133340
                              • Opcode ID: a3721ac13b9f2c53508f2668e3fc4f6423e7929e4d77d1bc6e4f4f65e0df9eb2
                              • Instruction ID: 307dca8676642e3c79cff39f042bf4c298b5574a2ca69ad9a2beb184fef3ef74
                              • Opcode Fuzzy Hash: a3721ac13b9f2c53508f2668e3fc4f6423e7929e4d77d1bc6e4f4f65e0df9eb2
                              • Instruction Fuzzy Hash: 68C10632A10A4096FF50EF60E8567E973A1FB94744F81443EA94E46AE6EF39C74BC740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: .lnk$.tmp$1ERs$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$RarSFX$Software\Microsoft\Windows\CurrentVersion$lnk
                              • API String ID: 0-3451782
                              • Opcode ID: 98741a0b586446009d92956d10e054fefa308feace73c8e7b410cd9c5ad81809
                              • Instruction ID: 58ce1988d51e0a63397bdf5e72f597af39a67d9afafff06513c67103fb28f725
                              • Opcode Fuzzy Hash: 98741a0b586446009d92956d10e054fefa308feace73c8e7b410cd9c5ad81809
                              • Instruction Fuzzy Hash: 5BB20D72A1054095FF60EBA4DC923DD7761F791348F82513AEA0E976EAEE64CB4BC340

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide
                              • String ID: $%s:$1ERs$CAPTION
                              • API String ID: 644714697-2433757044
                              • Opcode ID: ee7c6a2717057d0bed3ba9a49207a42e0b11ab8094b40c8b8e3542f0488fcae4
                              • Instruction ID: 6b8e85f46b1570cc6f515920699a12f3f152c9e5d7248a9157cfc60d047adc64
                              • Opcode Fuzzy Hash: ee7c6a2717057d0bed3ba9a49207a42e0b11ab8094b40c8b8e3542f0488fcae4
                              • Instruction Fuzzy Hash: C891E872B246408BEB18CF39E84579A7761F7C5B84F409129EF4A57B98DE3DDA06CB00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1421 13f795b4c-13f795bac call 13f7a9f40 call 13f7826bc call 13f794af8 1428 13f795bae-13f795bcf call 13f794a08 call 13f7837f4 call 13f782254 1421->1428 1429 13f795bd1-13f795bdd call 13f783be4 1421->1429 1432 13f795be2-13f795c04 call 13f7904a0 call 13f790580 1428->1432 1429->1432 1442 13f795c0a-13f795c0f 1432->1442 1443 13f79616c-13f7961af call 13f790534 call 13f782254 call 13f7a92f0 1432->1443 1444 13f795c16-13f795c45 call 13f796e60 * 2 1442->1444 1455 13f795c47-13f795c9a call 13f796e54 call 13f781adc call 13f7b4bb0 call 13f796e54 call 13f781adc call 13f7b4bb0 1444->1455 1468 13f795c9d-13f795ca0 1455->1468 1469 13f795ca6-13f795cd2 call 13f790f00 call 13f790b30 1468->1469 1470 13f795dc7-13f795de9 call 13f790d80 call 13f7b5050 1468->1470 1480 13f795d95-13f795da6 call 13f790d80 1469->1480 1481 13f795cd8-13f795ce0 1469->1481 1470->1443 1479 13f795def-13f795e0c call 13f790b30 1470->1479 1491 13f795e0e-13f795e16 1479->1491 1492 13f795e18-13f795e2b call 13f7b5050 1479->1492 1490 13f795dab-13f795db5 1480->1490 1483 13f795d10-13f795d19 1481->1483 1484 13f795ce2-13f795cea 1481->1484 1488 13f795d4a-13f795d52 1483->1488 1489 13f795d1b-13f795d2a 1483->1489 1484->1483 1487 13f795cec-13f795d0a call 13f7b4fd0 1484->1487 1487->1483 1507 13f795d92 1487->1507 1497 13f795d82-13f795d88 1488->1497 1498 13f795d54-13f795d5c 1488->1498 1489->1488 1494 13f795d2c-13f795d32 1489->1494 1495 13f795dbe-13f795dc1 1490->1495 1496 13f795db7-13f795db9 1490->1496 1500 13f795e4f-13f795e91 call 13f799aa8 call 13f7b5050 1491->1500 1492->1443 1511 13f795e31-13f795e4c call 13f79c574 call 13f7b4b98 1492->1511 1494->1488 1503 13f795d34-13f795d48 call 13f7b4b6c 1494->1503 1495->1443 1495->1470 1496->1468 1497->1480 1499 13f795d8a 1497->1499 1498->1497 1504 13f795d5e-13f795d7c call 13f7b4fd0 1498->1504 1499->1481 1519 13f795ea0-13f795eb5 1500->1519 1520 13f795e93-13f795e9b call 13f7b4b98 1500->1520 1503->1488 1515 13f795d8f 1503->1515 1504->1443 1504->1497 1507->1480 1511->1500 1515->1507 1523 13f79608b-13f7960c5 call 13f7963bc call 13f7b4b98 * 2 call 13f796e08 1519->1523 1524 13f795ebb-13f795ec6 1519->1524 1520->1443 1573 13f796107-13f79616b call 13f781adc call 13f796e54 call 13f781adc call 13f7b4bb0 call 13f796e54 call 13f781adc call 13f7b4bb0 1523->1573 1574 13f7960c7-13f796105 call 13f796e60 * 2 call 13f796e08 1523->1574 1527 13f795ecc-13f795ed1 1524->1527 1528 13f7962d7-13f7962e1 1524->1528 1531 13f795ede-13f795ee3 1527->1531 1532 13f795ed3-13f795ed8 1527->1532 1528->1523 1530 13f7962e7-13f7962f1 1528->1530 1534 13f796360-13f79636a 1530->1534 1535 13f7962f3-13f7962f9 1530->1535 1536 13f795ee9-13f795f1b 1531->1536 1537 13f7961b5-13f7961c3 call 13f799a60 1531->1537 1532->1528 1532->1531 1543 13f79636c-13f79636f 1534->1543 1544 13f79638b-13f7963ad call 13f7963bc 1534->1544 1539 13f7962ff-13f79630b 1535->1539 1540 13f796082-13f796085 1535->1540 1542 13f795f20-13f795f44 call 13f7b0438 call 13f7b4b6c 1536->1542 1558 13f7961c9-13f7961f6 call 13f799acc call 13f79777c 1537->1558 1559 13f7962d2 1537->1559 1548 13f79634a-13f79634c 1539->1548 1549 13f79630d-13f796311 1539->1549 1540->1523 1540->1524 1578 13f795f5d-13f795f68 1542->1578 1579 13f795f46-13f795f54 1542->1579 1543->1544 1552 13f796371-13f796377 1543->1552 1568 13f7963b5-13f7963bb call 13f7a9564 1544->1568 1560 13f796351-13f79635b 1548->1560 1556 13f796313-13f796317 1549->1556 1557 13f796338-13f79633f 1549->1557 1552->1540 1553 13f79637d-13f796386 1552->1553 1553->1540 1563 13f796319-13f79631d 1556->1563 1564 13f796341-13f796348 1556->1564 1557->1560 1558->1559 1589 13f7961fc-13f79628c call 13f79c520 call 13f799aa8 call 13f799af8 call 13f799aa8 call 13f796e54 call 13f781adc call 13f7b5058 1558->1589 1559->1528 1560->1540 1569 13f79631f-13f796323 1563->1569 1570 13f796332 1563->1570 1564->1560 1569->1553 1576 13f796325-13f796330 1569->1576 1570->1557 1573->1443 1574->1573 1576->1560 1578->1542 1581 13f795f6a-13f795f7a 1578->1581 1579->1578 1580 13f795f56-13f795f59 1579->1580 1580->1578 1586 13f795f7c-13f795f8e call 13f799aa8 1581->1586 1587 13f795f9d 1581->1587 1597 13f795f93-13f795f98 1586->1597 1592 13f7961b0 1587->1592 1593 13f795fa3 1587->1593 1643 13f79628e-13f79629f 1589->1643 1644 13f7962a4-13f7962b4 1589->1644 1592->1537 1598 13f795fa9-13f795fb5 1593->1598 1597->1540 1603 13f795fbd-13f795fc0 1598->1603 1604 13f795fb7-13f795fbb 1598->1604 1603->1598 1604->1603 1608 13f795fc2-13f795fcb 1604->1608 1612 13f795fcd-13f795fd7 1608->1612 1613 13f795ff4-13f795ffe 1608->1613 1618 13f795fda-13f795fde 1612->1618 1613->1568 1615 13f796004-13f796029 call 13f79c520 1613->1615 1626 13f79602b-13f79604a call 13f7b4b34 1615->1626 1627 13f79604f-13f79607a call 13f7977f4 1615->1627 1618->1613 1622 13f795fe0-13f795ff2 1618->1622 1622->1613 1622->1618 1626->1597 1639 13f79607f 1627->1639 1639->1540 1643->1644 1645 13f7962b7-13f7962bc 1644->1645 1646 13f7962be-13f7962c7 1645->1646 1647 13f7962cd-13f7962d0 1645->1647 1646->1639 1646->1647 1647->1645
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__swprintf_l
                              • String ID: ,$$%s:$*messages***$*messages***$1ERs$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                              • API String ID: 3405735246-1486914383
                              • Opcode ID: a5017536ce3901cfda56e82df6f7f2d922a7d09d550f9b948db48fb69ee736d9
                              • Instruction ID: 14dd9d531520a3eee028c4769959fa82cd2dffe143ad71a61f94e66ea6b45306
                              • Opcode Fuzzy Hash: a5017536ce3901cfda56e82df6f7f2d922a7d09d550f9b948db48fb69ee736d9
                              • Instruction Fuzzy Hash: F3229132A11A5195EB20DF25D8947EE73A1F745788F80523EEA4E476EAEB35CB07C340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1691 13f7a1fec-13f7a2011 FindResourceW 1692 13f7a2131 1691->1692 1693 13f7a2017-13f7a202b SizeofResource 1691->1693 1694 13f7a2133-13f7a213a 1692->1694 1693->1692 1695 13f7a2031-13f7a2044 LoadResource 1693->1695 1695->1692 1696 13f7a204a-13f7a2059 LockResource 1695->1696 1696->1692 1697 13f7a205f-13f7a2078 GlobalAlloc 1696->1697 1698 13f7a212a-13f7a212f 1697->1698 1699 13f7a207e-13f7a208a GlobalLock 1697->1699 1698->1694 1700 13f7a2090-13f7a20b6 call 13f7ab4d0 CreateStreamOnHGlobal 1699->1700 1701 13f7a2121-13f7a2124 GlobalFree 1699->1701 1704 13f7a2118-13f7a211b GlobalUnlock 1700->1704 1705 13f7a20b8-13f7a20da call 13f7a276c 1700->1705 1701->1698 1704->1701 1705->1704 1709 13f7a20dc-13f7a20e6 call 13f7a25f4 1705->1709 1712 13f7a2104-13f7a210f 1709->1712 1713 13f7a20e8-13f7a20ff call 13f7a25b4 call 13f7a25c0 1709->1713 1712->1704 1713->1712
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                              • String ID: PNG
                              • API String ID: 3656887471-364855578
                              • Opcode ID: 6e6bf86b030be450644aadc403cb9e14e21563b103a4267463e7844ec5b29060
                              • Instruction ID: dc9be0b4a106fb7d00fde112d00943f5783895ea7173dcf8c3a7d909d3b3e34f
                              • Opcode Fuzzy Hash: 6e6bf86b030be450644aadc403cb9e14e21563b103a4267463e7844ec5b29060
                              • Instruction Fuzzy Hash: 46310631B05A0181FE599F96F8583E9B3A1AB88BD0F45403D9E0E877A5EE78C65AC300

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FileFind$ErrorFirstLast$Next
                              • String ID: 1ERs
                              • API String ID: 869497890-1577259171
                              • Opcode ID: be01675985a9e4af430eb1eacd21b50adc1fe5c5a8316179733ceb51338fdfde
                              • Instruction ID: 58951b63510c028e4d39925233c9ebbf459d07af70e5441cb9d5c36b7260dd03
                              • Opcode Fuzzy Hash: be01675985a9e4af430eb1eacd21b50adc1fe5c5a8316179733ceb51338fdfde
                              • Instruction Fuzzy Hash: 3C419032605A4496EE20DB25E5413EA73A1FB857B4F400339EBAD47BD5DF68C72AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateFromInstanceString
                              • String ID: 1ERs$Shell.Explorer
                              • API String ID: 432265043-327250298
                              • Opcode ID: 07fda1288cf3761b6bdaf391c7fd541c65212326588851c844ec710d49ff74c1
                              • Instruction ID: 7cc22b15e2646fe7ca3d2783d900d5d6c7f796acd0c0069c831f7d5970a8e59e
                              • Opcode Fuzzy Hash: 07fda1288cf3761b6bdaf391c7fd541c65212326588851c844ec710d49ff74c1
                              • Instruction Fuzzy Hash: 7731B536614E4982EF00CF6AE8907997370F788F99F55412ADA4E47774DF38C64ACB00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs$__tmp_reference_source_
                              • API String ID: 0-3521100098
                              • Opcode ID: bad5ab0c43429d5b91f80a964903c7c39e04616d7c69a0df644427c713c81732
                              • Instruction ID: eedecc8b54544da200f2f91a087373367a4a979c62d54388545e38c005fd124e
                              • Opcode Fuzzy Hash: bad5ab0c43429d5b91f80a964903c7c39e04616d7c69a0df644427c713c81732
                              • Instruction Fuzzy Hash: 5D92C172A146C095FA70DBA1E0527EE7FA1F791784F85003EDA8A43696DB6CCB47C702
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs$CMT
                              • API String ID: 0-2971618018
                              • Opcode ID: 801226655134016f4c2f1aff102fed7a53d997e639ea45294287d3acd7f803f1
                              • Instruction ID: 093b27b348ee880a038aa591191862444c6c0e0137d4154f48df521cb4d54a32
                              • Opcode Fuzzy Hash: 801226655134016f4c2f1aff102fed7a53d997e639ea45294287d3acd7f803f1
                              • Instruction Fuzzy Hash: CB42BE72B00690A6EB18DB64D5927EE7BA1F7517D8F80003EEA4A877A6DF74C617C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 59578552-0
                              • Opcode ID: baf030bf4a28e115bbc61a4e03e20e7e9b5047dc875e5aa845e42fd7a9cca394
                              • Instruction ID: bd1b844589a6b6b59d896f69249019897ef212e23d02f9ed5c69a73d02610788
                              • Opcode Fuzzy Hash: baf030bf4a28e115bbc61a4e03e20e7e9b5047dc875e5aa845e42fd7a9cca394
                              • Instruction Fuzzy Hash: 8FE01231E15119C7FD3C37A98C433EC34912B4A330F9002BDA325557D2CA2C0BA76752
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: be24b3948965e2bc9aa86c6c2c61302812faa6f3c6270ce6ce533432fe1c4b2b
                              • Instruction ID: 72b380df00efdce4a28f5e9f2b2918a9eca581cd7ec39a9e0980f2adcc37cde8
                              • Opcode Fuzzy Hash: be24b3948965e2bc9aa86c6c2c61302812faa6f3c6270ce6ce533432fe1c4b2b
                              • Instruction Fuzzy Hash: 02D1C072A042808AFB60DF29D5483DEBBA1F74878CF055139DB895BB86DB38D686C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 2989c6689f53d6059e17e005a401a26052607f97d951d1bdaca2b27c9e00b382
                              • Instruction ID: 08eb903f01ae3b9ebcee3c61091e1c48025000e88c59d63ed2bb09ed9235b64c
                              • Opcode Fuzzy Hash: 2989c6689f53d6059e17e005a401a26052607f97d951d1bdaca2b27c9e00b382
                              • Instruction Fuzzy Hash: 72F09033B10B9086E614CF43B980689B775F3A9FD0F19802AEF4917B69CF34C6528780

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 13f79a548-13f79a59e call 13f7a9f40 GetModuleHandleW 3 13f79a5a0-13f79a5b3 GetProcAddress 0->3 4 13f79a5e5-13f79a918 0->4 5 13f79a5c2-13f79a5d5 GetProcAddress 3->5 6 13f79a5b5 3->6 7 13f79a91e-13f79a92e call 13f7b56d0 4->7 8 13f79aa48-13f79aa66 call 13f794964 call 13f793400 4->8 5->4 9 13f79a5d7-13f79a5e2 5->9 6->5 7->8 16 13f79a934-13f79a975 call 13f794964 call 13f78128c CreateFileW 7->16 19 13f79aa6a-13f79aa74 call 13f792a74 8->19 9->4 25 13f79a97b-13f79a98e SetFilePointer 16->25 26 13f79aa35-13f79aa43 CloseHandle call 13f782254 16->26 27 13f79aaa9-13f79aad7 call 13f7820b4 call 13f7936b8 call 13f782254 call 13f79160c 19->27 28 13f79aa76-13f79aa81 call 13f79ad40 19->28 25->26 29 13f79a994-13f79a9b6 ReadFile 25->29 26->8 57 13f79aadc-13f79aadf 27->57 28->27 36 13f79aa83-13f79aaa7 CompareStringW 28->36 29->26 34 13f79a9b8-13f79a9c6 29->34 37 13f79a9cc-13f79a9f6 call 13f7820b4 call 13f7826bc 34->37 38 13f79ad37-13f79ad3f call 13f7a9564 34->38 36->27 40 13f79aae8-13f79aaf1 36->40 56 13f79aa0a-13f79aa1f call 13f799c24 37->56 40->19 47 13f79aaf7 40->47 50 13f79aafc-13f79aaff 47->50 51 13f79ab50-13f79ab53 50->51 52 13f79ab01-13f79ab04 50->52 58 13f79ab59-13f79ab6c call 13f793970 call 13f792a74 51->58 59 13f79acf4-13f79ad36 call 13f782254 * 2 call 13f7a92f0 51->59 55 13f79ab08-13f79ab3e call 13f7820b4 call 13f7936b8 call 13f782254 call 13f79160c 52->55 101 13f79ab4d 55->101 102 13f79ab40-13f79ab49 55->102 70 13f79aa21-13f79aa30 call 13f782254 * 2 56->70 71 13f79a9f8-13f79aa05 call 13f78128c call 13f79ad40 56->71 62 13f79aaf9 57->62 63 13f79aae1 57->63 81 13f79ac39-13f79ac82 call 13f799f58 AllocConsole 58->81 82 13f79ab72-13f79ac34 call 13f79ad40 * 2 call 13f79788c call 13f799f58 call 13f79788c call 13f7820b4 call 13f7a1fac call 13f782254 58->82 62->50 63->40 70->26 71->56 96 13f79ace1 81->96 97 13f79ac84-13f79acdb GetCurrentProcessId AttachConsole call 13f781ae4 call 13f78128c GetStdHandle WriteConsoleW Sleep FreeConsole 81->97 103 13f79ace6-13f79aced call 13f782254 ExitProcess 82->103 96->103 97->96 101->51 102->55 106 13f79ab4b 102->106 106->51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                              • String ID: 1ERs$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll$xlistpos
                              • API String ID: 1466332177-2631482306
                              • Opcode ID: 75c65fd87bb48fbb252f9060d9a8b0682445e0091f3e1e728915e8945996d23f
                              • Instruction ID: 6402cc6552329ee0d9cb6a943bcdf401fc69b94aa24210b2325c72fb73f2094f
                              • Opcode Fuzzy Hash: 75c65fd87bb48fbb252f9060d9a8b0682445e0091f3e1e728915e8945996d23f
                              • Instruction Fuzzy Hash: DC320832A11F8099EB219F64E8813DA73B4FB54354F50523ADA9D477A9EF38C79AC340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1368 13f7a8b00-13f7a8b89 call 13f7a8754 1371 13f7a8b8b-13f7a8baf call 13f7a8a64 RaiseException 1368->1371 1372 13f7a8bb4-13f7a8bd1 1368->1372 1378 13f7a8db8-13f7a8dd5 1371->1378 1374 13f7a8bd3-13f7a8be4 1372->1374 1375 13f7a8be6-13f7a8bea 1372->1375 1377 13f7a8bed-13f7a8bf9 1374->1377 1375->1377 1379 13f7a8bfb-13f7a8c0d 1377->1379 1380 13f7a8c1a-13f7a8c1d 1377->1380 1392 13f7a8d89-13f7a8d93 1379->1392 1393 13f7a8c13 1379->1393 1381 13f7a8c23-13f7a8c26 1380->1381 1382 13f7a8cc4-13f7a8ccb 1380->1382 1383 13f7a8c3d-13f7a8c52 LoadLibraryExA 1381->1383 1384 13f7a8c28-13f7a8c3b 1381->1384 1386 13f7a8cdf-13f7a8ce2 1382->1386 1387 13f7a8ccd-13f7a8cdc 1382->1387 1390 13f7a8ca9-13f7a8cb2 1383->1390 1391 13f7a8c54-13f7a8c67 GetLastError 1383->1391 1384->1383 1384->1390 1388 13f7a8ce8-13f7a8cec 1386->1388 1389 13f7a8d85 1386->1389 1387->1386 1396 13f7a8d1b-13f7a8d2e GetProcAddress 1388->1396 1397 13f7a8cee-13f7a8cf2 1388->1397 1389->1392 1402 13f7a8cbd 1390->1402 1403 13f7a8cb4-13f7a8cb7 FreeLibrary 1390->1403 1398 13f7a8c69-13f7a8c7c 1391->1398 1399 13f7a8c7e-13f7a8ca4 call 13f7a8a64 RaiseException 1391->1399 1400 13f7a8db0 call 13f7a8a64 1392->1400 1401 13f7a8d95-13f7a8da6 1392->1401 1393->1380 1396->1389 1407 13f7a8d30-13f7a8d43 GetLastError 1396->1407 1397->1396 1404 13f7a8cf4-13f7a8cff 1397->1404 1398->1390 1398->1399 1399->1378 1410 13f7a8db5 1400->1410 1401->1400 1402->1382 1403->1402 1404->1396 1408 13f7a8d01-13f7a8d08 1404->1408 1412 13f7a8d5a-13f7a8d81 call 13f7a8a64 RaiseException call 13f7a8754 1407->1412 1413 13f7a8d45-13f7a8d58 1407->1413 1408->1396 1414 13f7a8d0a-13f7a8d0f 1408->1414 1410->1378 1412->1389 1413->1389 1413->1412 1414->1396 1417 13f7a8d11-13f7a8d19 1414->1417 1417->1389 1417->1396
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                              • String ID: H
                              • API String ID: 3432403771-2852464175
                              • Opcode ID: 08df8d98a9dad4dac36af99e044c8b654dd9a4f13edfbee5db96de11301e47a4
                              • Instruction ID: e010a4097d40b050afdd7258c533bf1db9bc95c87af7881880a38ff060e1ae73
                              • Opcode Fuzzy Hash: 08df8d98a9dad4dac36af99e044c8b654dd9a4f13edfbee5db96de11301e47a4
                              • Instruction Fuzzy Hash: 20911836A11B508AFF54CFA5E9447D833B1FB18B98F0A453ADE1A17758EB38D64AC700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1648 13f7a07c4-13f7a0815 ShowWindow call 13f7a0990 1651 13f7a081c-13f7a081f 1648->1651 1652 13f7a0817 call 13f7b4b98 1648->1652 1654 13f7a0821-13f7a0823 1651->1654 1655 13f7a0825-13f7a0828 call 13f7b5788 1651->1655 1652->1651 1656 13f7a082d-13f7a086a GetWindowRect GetParent MapWindowPoints 1654->1656 1655->1656 1658 13f7a086c DestroyWindow 1656->1658 1659 13f7a0872-13f7a08de GetParent CreateWindowExW 1656->1659 1658->1659 1660 13f7a08e0-13f7a08e5 1659->1660 1661 13f7a092d-13f7a0930 1659->1661 1660->1661 1664 13f7a08e7-13f7a08ea 1660->1664 1662 13f7a094a-13f7a0967 call 13f7a92f0 1661->1662 1663 13f7a0932-13f7a0944 ShowWindow UpdateWindow 1661->1663 1663->1662 1664->1662 1666 13f7a08ec-13f7a08f1 1664->1666 1666->1662 1668 13f7a08f3-13f7a08fa 1666->1668 1668->1662 1669 13f7a08fc-13f7a092b call 13f7a0f94 ShowWindow call 13f7827dc call 13f782254 1668->1669 1669->1662
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Window$Show$Parent$ClassCreateCursorDestroyLoadPointsRectRegisterUpdate
                              • String ID: 1ERs$RarHtmlClassName
                              • API String ID: 2859687067-3327420863
                              • Opcode ID: 2ffb5877be5a80f2849e9111e7cffa3fc4bb933bc98fdb6052adf66a743cfd4b
                              • Instruction ID: 90066111d665e5c1b714f1fad55bb4acb837ba74afd3a2d4552e102ccd42912a
                              • Opcode Fuzzy Hash: 2ffb5877be5a80f2849e9111e7cffa3fc4bb933bc98fdb6052adf66a743cfd4b
                              • Instruction Fuzzy Hash: 0E419C72A04B408AFF14CF66E4587EA73A5F799B80F064539EE4A477A4CF39C64AC700

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Message$Send$Window$DestroyDialogDispatchItemPeekShowTranslate
                              • String ID: 1ERs
                              • API String ID: 1209198919-1577259171
                              • Opcode ID: fa27f97e81fdd9f153174fe77ab98be216ca896bdd964116c3b2ac2c746c8652
                              • Instruction ID: 7142601f0b0698a4deea78ab6d243e18df75217e8d5a470d6bcacb9be6b15a31
                              • Opcode Fuzzy Hash: fa27f97e81fdd9f153174fe77ab98be216ca896bdd964116c3b2ac2c746c8652
                              • Instruction Fuzzy Hash: 92416032B106508AF7108FA5E815BC93770E789B98F851239DD1A17BA9CE7EC64BC700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1717 13f7a6e54-13f7a6e96 call 13f78696c 1720 13f7a6e9c-13f7a6ea7 call 13f781ae4 1717->1720 1721 13f7a7177-13f7a719c call 13f782254 call 13f7a92f0 1717->1721 1720->1721 1727 13f7a6ead-13f7a6eea call 13f7abb80 call 13f782908 1720->1727 1733 13f7a6eec 1727->1733 1734 13f7a6eef-13f7a6f07 call 13f782908 call 13f781ae4 1727->1734 1733->1734 1739 13f7a6fa0 1734->1739 1740 13f7a6f0d 1734->1740 1742 13f7a6fa4-13f7a6fa7 1739->1742 1741 13f7a6f13-13f7a6f22 call 13f782908 1740->1741 1751 13f7a6f5e-13f7a6f71 call 13f782908 1741->1751 1752 13f7a6f24-13f7a6f35 call 13f781ae4 1741->1752 1743 13f7a6fa9-13f7a6fad 1742->1743 1744 13f7a6faf-13f7a6fb2 1742->1744 1743->1744 1746 13f7a6fcd-13f7a6fe0 call 13f793764 1743->1746 1744->1746 1747 13f7a6fb4-13f7a6fc2 call 13f78696c 1744->1747 1759 13f7a6fe2-13f7a7000 call 13f79cb10 1746->1759 1760 13f7a7005-13f7a7034 call 13f7820b4 call 13f7915d4 call 13f782254 call 13f7826bc 1746->1760 1747->1746 1757 13f7a6fc4-13f7a6fc9 call 13f78128c 1747->1757 1763 13f7a719d-13f7a71ac call 13f782908 1751->1763 1764 13f7a6f77-13f7a6f86 call 13f782908 1751->1764 1752->1751 1766 13f7a6f37-13f7a6f46 call 13f782908 1752->1766 1757->1746 1759->1760 1797 13f7a706a-13f7a7077 ShellExecuteExW 1760->1797 1798 13f7a7036-13f7a7065 call 13f7820b4 call 13f793f2c call 13f782254 call 13f78128c 1760->1798 1781 13f7a71ba-13f7a71c9 call 13f782908 1763->1781 1782 13f7a71ae-13f7a71b6 call 13f782908 1763->1782 1764->1763 1783 13f7a6f8c-13f7a6f9a call 13f781ae4 1764->1783 1778 13f7a6f52-13f7a6f5a call 13f782908 1766->1778 1779 13f7a6f48-13f7a6f4e 1766->1779 1778->1751 1779->1766 1784 13f7a6f50 1779->1784 1781->1742 1782->1781 1783->1739 1783->1741 1784->1751 1799 13f7a716d-13f7a7176 call 13f782254 1797->1799 1800 13f7a707d-13f7a7087 1797->1800 1798->1797 1799->1721 1802 13f7a7089-13f7a708c 1800->1802 1803 13f7a7097-13f7a709a 1800->1803 1802->1803 1806 13f7a708e-13f7a7095 1802->1806 1807 13f7a709c-13f7a70a7 call 13f7ea178 1803->1807 1808 13f7a70b6-13f7a70d5 call 13f7ea1a0 call 13f7a71d0 1803->1808 1806->1803 1811 13f7a7108-13f7a7115 CloseHandle 1806->1811 1807->1808 1823 13f7a70a9-13f7a70b4 ShowWindow 1807->1823 1808->1811 1832 13f7a70d7-13f7a70da 1808->1832 1815 13f7a712a-13f7a7131 1811->1815 1816 13f7a7117-13f7a7128 call 13f79cb10 1811->1816 1821 13f7a7133-13f7a7136 1815->1821 1822 13f7a7155-13f7a7157 1815->1822 1816->1815 1816->1822 1821->1822 1827 13f7a7138-13f7a714f 1821->1827 1822->1799 1828 13f7a7159-13f7a715c 1822->1828 1823->1808 1827->1822 1828->1799 1831 13f7a715e-13f7a716c ShowWindow 1828->1831 1831->1799 1832->1811 1834 13f7a70dc-13f7a70ec GetExitCodeProcess 1832->1834 1834->1811 1835 13f7a70ee-13f7a7101 1834->1835 1835->1811
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell
                              • String ID: .exe$.inf$1ERs$Install
                              • API String ID: 1828429325-732751198
                              • Opcode ID: 8aabcf0fc50635339d97af016f1aa9b5ab9c55a57160201a8aa8ec534bf5f264
                              • Instruction ID: 1f9e4c9cc08ec884832dcb9b0444c88f906f00fe8acd07dcec2c4d54641ae14d
                              • Opcode Fuzzy Hash: 8aabcf0fc50635339d97af016f1aa9b5ab9c55a57160201a8aa8ec534bf5f264
                              • Instruction Fuzzy Hash: 68A17B32F0460485FF51EBA1E9513EE3BB1AB95B84F414039ED4A577A6DA38CB4BC340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1836 13f7bb170-13f7bb1c2 1837 13f7bb2b3 1836->1837 1838 13f7bb1c8-13f7bb1cb 1836->1838 1841 13f7bb2b5-13f7bb2d1 1837->1841 1839 13f7bb1cd-13f7bb1d0 1838->1839 1840 13f7bb1d5-13f7bb1d8 1838->1840 1839->1841 1842 13f7bb1de-13f7bb1ed 1840->1842 1843 13f7bb298-13f7bb2ab 1840->1843 1844 13f7bb1ef-13f7bb1f2 1842->1844 1845 13f7bb1fd-13f7bb21c LoadLibraryExW 1842->1845 1843->1837 1846 13f7bb2f2-13f7bb301 GetProcAddress 1844->1846 1847 13f7bb1f8 1844->1847 1848 13f7bb2d2-13f7bb2e7 1845->1848 1849 13f7bb222-13f7bb22b GetLastError 1845->1849 1852 13f7bb303-13f7bb32a 1846->1852 1853 13f7bb291 1846->1853 1850 13f7bb284-13f7bb28b 1847->1850 1848->1846 1851 13f7bb2e9-13f7bb2ec FreeLibrary 1848->1851 1854 13f7bb22d-13f7bb244 call 13f7b4b6c 1849->1854 1855 13f7bb272-13f7bb27c 1849->1855 1850->1842 1850->1853 1851->1846 1852->1841 1853->1843 1854->1855 1858 13f7bb246-13f7bb25a call 13f7b4b6c 1854->1858 1855->1850 1858->1855 1861 13f7bb25c-13f7bb270 LoadLibraryExW 1858->1861 1861->1848 1861->1855
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AddressFreeLibraryProc
                              • String ID: 1ERs$api-ms-$ext-ms-
                              • API String ID: 3013587201-1896474530
                              • Opcode ID: 57a8b596a1503f26f6ff46af51ce6bc8fd40067f29b5d6761e983004135d4d5f
                              • Instruction ID: 08fa8e28185f1ec152acb694a22c5322219db940bc8cd09a9920f7feaa91f2fa
                              • Opcode Fuzzy Hash: 57a8b596a1503f26f6ff46af51ce6bc8fd40067f29b5d6761e983004135d4d5f
                              • Instruction Fuzzy Hash: 6141B632B11A1482FE15CB5AA8087DA3391B74ABE0F59453DDE1D87798DF38CA47C304

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Global$AllocCreateStream
                              • String ID: $1ERs$</html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                              • API String ID: 1039121705-3318514152
                              • Opcode ID: 125e7bda62205f68ffd57646446bb67724558c50e9972ca4f8095c52de3b50cb
                              • Instruction ID: 7e2f7f5264aa0e81260805ec2b26bdd8bcb38024800294f71c577dd15fe81575
                              • Opcode Fuzzy Hash: 125e7bda62205f68ffd57646446bb67724558c50e9972ca4f8095c52de3b50cb
                              • Instruction Fuzzy Hash: 51410B72B04A10A5FF10EFA5D8613ED7771AB54B88F85443AEE0D566AAEE24C60BC340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1912 13f790580-13f7905b3 1913 13f7905bf 1912->1913 1914 13f7905b5-13f7905b9 1912->1914 1916 13f7905c1-13f790647 call 13f78c18c call 13f78128c CreateFileW 1913->1916 1914->1913 1915 13f7905bb-13f7905bd 1914->1915 1915->1916 1921 13f7906cd-13f7906d1 1916->1921 1922 13f79064d-13f79066f GetLastError call 13f7826bc call 13f794350 1916->1922 1924 13f7906d7-13f7906db 1921->1924 1937 13f7906bb 1922->1937 1938 13f790671-13f7906b9 call 13f78128c CreateFileW GetLastError 1922->1938 1926 13f7906e9-13f7906ed 1924->1926 1927 13f7906dd-13f7906e0 1924->1927 1928 13f7906ef-13f7906f3 1926->1928 1929 13f790713-13f790727 1926->1929 1927->1926 1931 13f7906e2 1927->1931 1928->1929 1932 13f7906f5-13f79070d SetFileTime 1928->1932 1933 13f790729-13f790739 call 13f783be4 1929->1933 1934 13f79073d-13f790770 call 13f78c1c0 call 13f7a92f0 1929->1934 1931->1926 1932->1929 1933->1934 1942 13f7906c1-13f7906cb call 13f782254 1937->1942 1938->1942 1942->1924
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File$CreateErrorLast$Time
                              • String ID: 1ERs
                              • API String ID: 1999340476-1577259171
                              • Opcode ID: dcfe0a08d1e0b445740c6a5767d5a0c50ae79fd6602f16daa682fc2f45f2860c
                              • Instruction ID: 00d7b23c171827d060284c0aa3db8737d4319d841c465406389a19a411cb1ccd
                              • Opcode Fuzzy Hash: dcfe0a08d1e0b445740c6a5767d5a0c50ae79fd6602f16daa682fc2f45f2860c
                              • Instruction Fuzzy Hash: 47511172A1428046FB208F25E0553EA7AA0F3857B8F04033DDF6A57AE1CB3DC65ACB00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1988 13f7af9bc-13f7af9fa 1989 13f7afaeb 1988->1989 1990 13f7afa00-13f7afa03 1988->1990 1992 13f7afaed-13f7afb09 1989->1992 1991 13f7afa09 1990->1991 1990->1992 1993 13f7afa0c 1991->1993 1994 13f7afae3 1993->1994 1995 13f7afa12-13f7afa21 1993->1995 1994->1989 1996 13f7afa2e-13f7afa4d LoadLibraryExW 1995->1996 1997 13f7afa23-13f7afa26 1995->1997 2000 13f7afa4f-13f7afa58 GetLastError 1996->2000 2001 13f7afaa5-13f7afaba 1996->2001 1998 13f7afa2c 1997->1998 1999 13f7afac5-13f7afad4 GetProcAddress 1997->1999 2002 13f7afa99-13f7afaa0 1998->2002 1999->1994 2006 13f7afad6-13f7afae1 1999->2006 2003 13f7afa5a-13f7afa6f call 13f7b4b6c 2000->2003 2004 13f7afa87-13f7afa91 2000->2004 2001->1999 2005 13f7afabc-13f7afabf FreeLibrary 2001->2005 2002->1993 2003->2004 2009 13f7afa71-13f7afa85 LoadLibraryExW 2003->2009 2004->2002 2005->1999 2006->1992 2009->2001 2009->2004
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,000000013F7AFC6E,?,?,?,000000013F7AF960,?,?,00000001,000000013F7AC679), ref: 000000013F7AFA41
                              • GetLastError.KERNEL32(?,?,?,000000013F7AFC6E,?,?,?,000000013F7AF960,?,?,00000001,000000013F7AC679), ref: 000000013F7AFA4F
                              • LoadLibraryExW.KERNEL32(?,?,?,000000013F7AFC6E,?,?,?,000000013F7AF960,?,?,00000001,000000013F7AC679), ref: 000000013F7AFA79
                              • FreeLibrary.KERNEL32(?,?,?,000000013F7AFC6E,?,?,?,000000013F7AF960,?,?,00000001,000000013F7AC679), ref: 000000013F7AFABF
                              • GetProcAddress.KERNEL32(?,?,?,000000013F7AFC6E,?,?,?,000000013F7AF960,?,?,00000001,000000013F7AC679), ref: 000000013F7AFACB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: bae88bc27c21ad60c76f677b5c45fa165faed71e7c4ca7cdbe25b1edddfacdfe
                              • Instruction ID: 06619c42def0d860cf665375b86dc14f27a56baa896e3b2e008f0a056a939b8a
                              • Opcode Fuzzy Hash: bae88bc27c21ad60c76f677b5c45fa165faed71e7c4ca7cdbe25b1edddfacdfe
                              • Instruction Fuzzy Hash: 51319231B12B5095FE219F82A800BE673E4FB49BA5F5A463DDD194B394EF38C64B8300

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: 1ERs$Software\WinRAR SFX
                              • API String ID: 1818849710-2170826906
                              • Opcode ID: ab533b50932db9b46b0fcb2a6db69c68fa5b0be7dc7afc5157c19e885853c253
                              • Instruction ID: f126284c7f01e519b9128d4044c76a0ec3ed908a564dc230e922ff344bbd35d4
                              • Opcode Fuzzy Hash: ab533b50932db9b46b0fcb2a6db69c68fa5b0be7dc7afc5157c19e885853c253
                              • Instruction Fuzzy Hash: D0216232A14A4086FF50DB61F8557DA7760F794794F401139E98D42BE5DF6CC75ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                              • String ID: 1ERs$EDIT
                              • API String ID: 4243998846-627568177
                              • Opcode ID: a3730f09f30549a015c781de93191d6efbc31bd36ef359d9da3c26f4bf0f9089
                              • Instruction ID: 84ae34ca57b9f7040eb62f410c51cbb65a43d1bf054085e0b495c76cc760c33e
                              • Opcode Fuzzy Hash: a3730f09f30549a015c781de93191d6efbc31bd36ef359d9da3c26f4bf0f9089
                              • Instruction Fuzzy Hash: 8B014431B14B4181FE209B51F8657D673A0BB98780F45143A8D4D47794EE7CC34BCB10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Message$DialogDispatchPeekTranslate
                              • String ID:
                              • API String ID: 1266772231-0
                              • Opcode ID: 2d41d9326857e66844fb115c9f216b9fd577e98702e5580aa58207ff4f5c7ede
                              • Instruction ID: a98292e09aa54da6ecc6302242193be44f2f298f546f69b7925c2cc50481ca15
                              • Opcode Fuzzy Hash: 2d41d9326857e66844fb115c9f216b9fd577e98702e5580aa58207ff4f5c7ede
                              • Instruction Fuzzy Hash: 52F01236B3454183FB609F64F895B963361FBE4B09F815029A64A51954DF38C21ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FileWrite$Handle
                              • String ID: 1ERs
                              • API String ID: 4209713984-1577259171
                              • Opcode ID: 6c63c6d13426ae45ae70cfabcba1d893a44962a4fb46c0652e468ff880ee99ec
                              • Instruction ID: a17ed95879005fa29aed1a79f6baedc9ae3d8bdf659613e0d0fd10879ee699bd
                              • Opcode Fuzzy Hash: 6c63c6d13426ae45ae70cfabcba1d893a44962a4fb46c0652e468ff880ee99ec
                              • Instruction Fuzzy Hash: CF41E233B2594096FA60CB35E914BEB7370F744B94F415039EE4A87AA4DB38CA8BC740
                              APIs
                              • CreateDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000000,?,000000013F7913AC), ref: 000000013F7911FC
                              • CreateDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000000,?,000000013F7913AC), ref: 000000013F791247
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000,?,000000013F7913AC), ref: 000000013F791271
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID: 1ERs
                              • API String ID: 2485089472-1577259171
                              • Opcode ID: 913eede59ff50bad42cb935bf16b1ff0049bae282bbe7c49875a751f3b0a0ac1
                              • Instruction ID: 504baf4f339dde526e2f0a3090776e5d9d1fddb28ea657e030c583065020db5d
                              • Opcode Fuzzy Hash: 913eede59ff50bad42cb935bf16b1ff0049bae282bbe7c49875a751f3b0a0ac1
                              • Instruction Fuzzy Hash: E721B03AB0464042FB70EB61A5513EB73A1B785780F464139ED4AC3B96DFB8CA278200
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: BrowseFolderFromListMallocPath
                              • String ID: 1ERs$A
                              • API String ID: 2332185071-695673618
                              • Opcode ID: b00eb2558a74acd322b513043997ce8e923ceda0cdca6b51de8298474a559cb6
                              • Instruction ID: 6e3499f56f848174639d902ae3058ab9a29f17979052917f44960759e988cb16
                              • Opcode Fuzzy Hash: b00eb2558a74acd322b513043997ce8e923ceda0cdca6b51de8298474a559cb6
                              • Instruction Fuzzy Hash: BD115E76B14B8486FA508B11F4953EAB3B4F799BD4F404129EA8D87B98DF3CC55ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                              • String ID: riched20.dll
                              • API String ID: 3498096277-3360196438
                              • Opcode ID: e1ae680da6eeb6b091c96a84323e0508884e921eebe8047fde12cde52f90d683
                              • Instruction ID: aada90470cc386531610a38045b832772104fbaf02748fc8e2cad9d7a03335d5
                              • Opcode Fuzzy Hash: e1ae680da6eeb6b091c96a84323e0508884e921eebe8047fde12cde52f90d683
                              • Instruction Fuzzy Hash: 02F01772A14A4682FF009F60E8143D9B360FBA4714F80003AE98E466A4DF7CC74ECB10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: QueryValue$CloseOpen
                              • String ID:
                              • API String ID: 1586453840-0
                              • Opcode ID: 28a070677619c59ed845ba7aa30c74b9fadcb3fd9c6e5316b8293aa6b47e6f28
                              • Instruction ID: fb7c09e530072d31c6cb79c6be3354244697c0d509a8ee5c842649c40897d1a0
                              • Opcode Fuzzy Hash: 28a070677619c59ed845ba7aa30c74b9fadcb3fd9c6e5316b8293aa6b47e6f28
                              • Instruction Fuzzy Hash: AA415832B10A5089EB50DBA1D852BEE37A4F798B84F40803AEE4D97B59DE38C6568340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 1452418845-0
                              • Opcode ID: b1a589d711ce5c113e8e4a51647d4a5db0ae59c4c3c3c73f71d1b0031afe7af5
                              • Instruction ID: 72614195ac915889b6d2684bc54916a5f7fcc803afdf7a20f6b7fcaf87544b6a
                              • Opcode Fuzzy Hash: b1a589d711ce5c113e8e4a51647d4a5db0ae59c4c3c3c73f71d1b0031afe7af5
                              • Instruction Fuzzy Hash: 4531C432E0424081FF64BFA4E4513E933A1AB85784F86443CAA0A4B3E7DE29CB5FC751
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 0c321b472b1accf97c07723b29d3a00105f7604eb72aaf1162b066b3eb931f18
                              • Instruction ID: 118513beaca99d3f5dcb6c87495c97e7a9639870e74b7d85ef939bd3356308b4
                              • Opcode Fuzzy Hash: 0c321b472b1accf97c07723b29d3a00105f7604eb72aaf1162b066b3eb931f18
                              • Instruction Fuzzy Hash: 6121A231E24E40C5EA709F35B4003AB77A4F746BA4F14513DDA5A8B7E5CB38DA868741
                              APIs
                                • Part of subcall function 000000013F7BA42C: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013F7BA768), ref: 000000013F7BA456
                              • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,000000013F7BA899), ref: 000000013F7BAB49
                              • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,000000013F7BA899), ref: 000000013F7BAB8D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CodeInfoPageValid
                              • String ID: 1ERs
                              • API String ID: 546120528-1577259171
                              • Opcode ID: 5d6f11de72f5d3909ae7cdef260ed5fab4dc2d1caac9d7e27b3f9ee4a98ada73
                              • Instruction ID: cbf0da857fff40a89f79b79bcdc6b30cae48740486315d7a7bd35333d6ee204d
                              • Opcode Fuzzy Hash: 5d6f11de72f5d3909ae7cdef260ed5fab4dc2d1caac9d7e27b3f9ee4a98ada73
                              • Instruction Fuzzy Hash: 0981C1B2A0468886FB64AF29E0543E97FA2F356740F58403ECF9A47695DA39DF47C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Info
                              • String ID: $1ERs
                              • API String ID: 1807457897-4251509486
                              • Opcode ID: 789a4126fd2d51ccc01158b3c7840c3a71ce060e94776f7cb552cb3a58c115b4
                              • Instruction ID: 17495c56aae445841deb5eb4cfa0dac193f3a83fef08a1ca78b5cf56ee57889b
                              • Opcode Fuzzy Hash: 789a4126fd2d51ccc01158b3c7840c3a71ce060e94776f7cb552cb3a58c115b4
                              • Instruction Fuzzy Hash: A651A672A187C49BF7219F34E0843DE7BA1F34A748F944139DB8947A85CB78CA56CB40
                              APIs
                              • SetFilePointer.KERNEL32(?,00000000,?,?,?,000000013F790FB5,?,?,?,000000013F78E89F), ref: 000000013F790EDC
                              • GetLastError.KERNEL32(?,00000000,?,?,?,000000013F790FB5,?,?,?,000000013F78E89F), ref: 000000013F790EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID: 1ERs
                              • API String ID: 2976181284-1577259171
                              • Opcode ID: 30d69afa2f8fea5e1676c29147f384c57fe93985ddc0e2677324810948d62f4f
                              • Instruction ID: fa65d6c8cea8b7aad57dcd48ec3511942a73d6dd6e525c4b021e19306e04e8a1
                              • Opcode Fuzzy Hash: 30d69afa2f8fea5e1676c29147f384c57fe93985ddc0e2677324810948d62f4f
                              • Instruction Fuzzy Hash: 91317332B21A5482FE605F3AE541BDA7360AB44FD4F145239AE5D87BF4DB39CA839700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID: 1ERs
                              • API String ID: 823142352-1577259171
                              • Opcode ID: 7e97925d7c3582261a0924c79b53a7fcbe5925999bd5a73e6ec343f705ecc1ff
                              • Instruction ID: a3bf85a91d6186b3cf032e84045030e8c5f312832320f8ff314a2b90d4ef4050
                              • Opcode Fuzzy Hash: 7e97925d7c3582261a0924c79b53a7fcbe5925999bd5a73e6ec343f705ecc1ff
                              • Instruction Fuzzy Hash: B431C733A206808AFB609F20E4057DA7660F785778F544338DEA947AD6CB79C656C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystem
                              • String ID: 1ERs
                              • API String ID: 1175261203-1577259171
                              • Opcode ID: 3245ba2793be4fba06aa236f857d8204ba1a07326754a835ada1c1679b041746
                              • Instruction ID: f1a9ebd50d074902263765622a00c54c9ca3d888c814c1c9945e3f367a3388d2
                              • Opcode Fuzzy Hash: 3245ba2793be4fba06aa236f857d8204ba1a07326754a835ada1c1679b041746
                              • Instruction Fuzzy Hash: 89213632B01944AAEB10EFB1D4A67DD3770E794784F82543ADA0D9779ADE24C70AC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Rect$ClientCopy
                              • String ID: 1ERs
                              • API String ID: 1880273418-1577259171
                              • Opcode ID: 4c4c53f5941366ca05170129574d2302a37d8930208409adda015816e1e6f880
                              • Instruction ID: cf2ed5b29a840ac192e6b914da74ca3e9a9bbfd930a24da5a52db7ebae1a1a92
                              • Opcode Fuzzy Hash: 4c4c53f5941366ca05170129574d2302a37d8930208409adda015816e1e6f880
                              • Instruction Fuzzy Hash: 6D218C73610B848AEB10CF26E48479A73B0F348BA5F058125DF4D47751DB39C5A6CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: TextWindow$Length
                              • String ID: 1ERs
                              • API String ID: 1006428111-1577259171
                              • Opcode ID: 693238c59dfcd0af217fe7a8ec1b744b67b4b4df6e5d41ed855ced795a2116ac
                              • Instruction ID: 6e73a155849d062176c7d458fa05584675f0e51bd30deb4638f262283523b732
                              • Opcode Fuzzy Hash: 693238c59dfcd0af217fe7a8ec1b744b67b4b4df6e5d41ed855ced795a2116ac
                              • Instruction Fuzzy Hash: 0F11613260494051EA10EB51E9523EEBB70EBD9BC1F54003AEA4E86BBADE28C747C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: LoadString
                              • String ID: Extracting %s
                              • API String ID: 2948472770-2318847974
                              • Opcode ID: 4c99ee2f3136c9eaeab264dd604a1bd4734cbf8bd24d08ca86dfbbf99dc764f6
                              • Instruction ID: 5b4e6608e57aadc569abf59c10e27ecaa8508f13cf9cbf23d1bf7c1d9ccf8ee8
                              • Opcode Fuzzy Hash: 4c99ee2f3136c9eaeab264dd604a1bd4734cbf8bd24d08ca86dfbbf99dc764f6
                              • Instruction Fuzzy Hash: FC014CB1F0474086EB508F19E8857E677A2B7A8BC4F54843DDA0D97B69DE38C693C600
                              APIs
                              • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F79126D), ref: 000000013F7916BF
                              • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F79126D), ref: 000000013F7916F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID: 1ERs
                              • API String ID: 3188754299-1577259171
                              • Opcode ID: 08041598bbfc8ee7016aa0b0103d0fb04ae4b6732f55a4ada51b10bda0816287
                              • Instruction ID: a82c1aaa62f1651629a53bda6c81dcf7a909526b59729ceec6876f962bb2f275
                              • Opcode Fuzzy Hash: 08041598bbfc8ee7016aa0b0103d0fb04ae4b6732f55a4ada51b10bda0816287
                              • Instruction Fuzzy Hash: B1015232B0464182FA20DB61F8513DA73B0FB89B84F444139EA8D87BA6DF28C657CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID: 1ERs
                              • API String ID: 4033686569-1577259171
                              • Opcode ID: e8be1f6962a8664d0939ea7b10e775250d712eeabbcebd9d35a28616fbe80002
                              • Instruction ID: 2ee4e82f3de048965ebe25136645b441dd32288373469e8d44401eb325423c53
                              • Opcode Fuzzy Hash: e8be1f6962a8664d0939ea7b10e775250d712eeabbcebd9d35a28616fbe80002
                              • Instruction Fuzzy Hash: 03014432B4468142EE10DB61E4513EA7360FB85B84F45013DE99D87796DF28CA56C600
                              APIs
                              • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F7915DD,?,?,?,?,000000013F78BD80), ref: 000000013F791630
                              • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F7915DD,?,?,?,?,000000013F78BD80), ref: 000000013F791666
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID: 1ERs
                              • API String ID: 3188754299-1577259171
                              • Opcode ID: 0d029f1be65e0e5603c0bace5cacd859890830e7664a4b3eca3c0019234412f5
                              • Instruction ID: 26588796e67fbcee2ac33cbca623ba46af39819730a3488194459e5bd54cf36f
                              • Opcode Fuzzy Hash: 0d029f1be65e0e5603c0bace5cacd859890830e7664a4b3eca3c0019234412f5
                              • Instruction Fuzzy Hash: 21016232B0464042EE50EB60F5523EA73B1B789794F41023DEA9D877E6DF68CB56C740
                              APIs
                              • InitializeCriticalSectionEx.KERNEL32(?,?,00000003,000000013F7B8AB1), ref: 000000013F7BB435
                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00000003,000000013F7B8AB1), ref: 000000013F7BB442
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CriticalInitializeSection$CountSpin
                              • String ID: InitializeCriticalSectionEx
                              • API String ID: 4156364057-3084827643
                              • Opcode ID: 70ce026c1062cd7536bc8c4ef3018c1ae346da97b3efec155eeae0b50783c252
                              • Instruction ID: 44a5f6bd2040f1a7105eed9f23af05421eb0ae0d9509b40c6b1a9848a7d1888d
                              • Opcode Fuzzy Hash: 70ce026c1062cd7536bc8c4ef3018c1ae346da97b3efec155eeae0b50783c252
                              • Instruction Fuzzy Hash: ADF03A75B14B8482EA548B57B5447E973A1BB89BC0F985039EE1A17B58CE38CA4B8740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 0c078c363d29b9141b167f0092bd120b3e9dd2414ef442033e7c55832df72cdf
                              • Instruction ID: 7d12590455c288716fe5ac629cc7df044de0c6bb5a3d8e83f2944460b6b607c1
                              • Opcode Fuzzy Hash: 0c078c363d29b9141b167f0092bd120b3e9dd2414ef442033e7c55832df72cdf
                              • Instruction Fuzzy Hash: EDD09230F1170886EE582F706A957E832216B99B81F01143C89470A39BCF398E4B8200
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID: 1ERs
                              • API String ID: 1268545403-1577259171
                              • Opcode ID: 5134a0bba61ddd67747fce870432551b35958541116bffe9b840d32909437fba
                              • Instruction ID: 2b3f064643aefbb6fe23b103ab030f32879aac00e6e7ad1f9e071aa4670478d4
                              • Opcode Fuzzy Hash: 5134a0bba61ddd67747fce870432551b35958541116bffe9b840d32909437fba
                              • Instruction Fuzzy Hash: D441F636B10B548AFB108BA6E8907D83770F788B99F01452ADE0E47B65CF79D64AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: LoadString$ItemText
                              • String ID: 1ERs
                              • API String ID: 1059950464-1577259171
                              • Opcode ID: 8dfaf5107776f4bb91ff556e9ac6771125ec21fa947c0e43471bc33183724d37
                              • Instruction ID: 644271cce401a98c2380e84c6f669979fe59186c8348d71f3b5f81555ea88b6f
                              • Opcode Fuzzy Hash: 8dfaf5107776f4bb91ff556e9ac6771125ec21fa947c0e43471bc33183724d37
                              • Instruction Fuzzy Hash: EE213032A0468091FA60EB51E8523DBB761FBC4780F81413EAA9D477DBDE2CC71AC740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx
                              • API String ID: 2568140703-3893581201
                              • Opcode ID: 8edcd1dfeb4e11932c5bcda800dafe0a52aa29bfe321694e1dec0054d309228c
                              • Instruction ID: a5dbf7d3d50d1feb4f148f250c2481c4862c586f731abaa6ca671338ce57ec0e
                              • Opcode Fuzzy Hash: 8edcd1dfeb4e11932c5bcda800dafe0a52aa29bfe321694e1dec0054d309228c
                              • Instruction Fuzzy Hash: BE212C75608B8486DB60CF1AF8407DAB7A4F789BC0F54412AEE8D83B19DF38C9418B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Item
                              • String ID: 1ERs
                              • API String ID: 3207170592-1577259171
                              • Opcode ID: bbc828a22b587c18cfcee94c2407bc39963c56471405518dd50b8081fac055eb
                              • Instruction ID: 166d2e7f83afe21102416a22c04398fe9b4883ff5cfb47dd9478b25129a2298e
                              • Opcode Fuzzy Hash: bbc828a22b587c18cfcee94c2407bc39963c56471405518dd50b8081fac055eb
                              • Instruction Fuzzy Hash: 5C11A031A1568042FE549B10E9563EAB390FB88785F404139EA8D477EADF2CC606C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateThread
                              • String ID: CreateThread failed
                              • API String ID: 2422867632-3849766595
                              • Opcode ID: 076826c65c3817310e42f2594601f196a5e328c759c1d6d375bb12eb28e87a68
                              • Instruction ID: 9c7f24a9b9f235aa5652d023c3b75a38883ceb38b69cde27c12438906e7b80ca
                              • Opcode Fuzzy Hash: 076826c65c3817310e42f2594601f196a5e328c759c1d6d375bb12eb28e87a68
                              • Instruction Fuzzy Hash: 74F03471A10B4096EA01DB24E89A7DA7360E748784F84453EE988063A5EB3CC75BC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Xinvalid_argumentstd::_
                              • String ID: vector too long
                              • API String ID: 909987262-2873823879
                              • Opcode ID: e7f1a1db9dd46f36446f392bd04bf6f0da6fc0c7d75d490b6e2a964867ce68f1
                              • Instruction ID: 1ef458e79988c12d83174fbaf178c89513b5244c9c1858d364a9d7bdcdd8b960
                              • Opcode Fuzzy Hash: e7f1a1db9dd46f36446f392bd04bf6f0da6fc0c7d75d490b6e2a964867ce68f1
                              • Instruction Fuzzy Hash: 77E04F36A01F8592DA18AF91F6812887374F758780F648935D75807B65EF34D2B28700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File$BuffersFlushTime
                              • String ID:
                              • API String ID: 1392018926-0
                              • Opcode ID: 6a6bc897d1c5dff00b34c8d30a5e108cf18015d032f8426d0a3628d9fa8e4bb9
                              • Instruction ID: 10cb4dc09e7b1b51b4551d2bd8d5bec67d990f9080e515f244ff2fa4a52bd60d
                              • Opcode Fuzzy Hash: 6a6bc897d1c5dff00b34c8d30a5e108cf18015d032f8426d0a3628d9fa8e4bb9
                              • Instruction Fuzzy Hash: 7221F532F456C048FD559B6692143EFB3719B82BC4F080135DD490B7AADAA6CB6BC300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: ea7845a602860c14d0a46e4b99b46f81841b6815f05ce2a60d14a5b1042bce38
                              • Instruction ID: dd7e704f5b23629d6b3371970d3b0bfbb03cc4bc2099e7c95f93b7d73e71b0d1
                              • Opcode Fuzzy Hash: ea7845a602860c14d0a46e4b99b46f81841b6815f05ce2a60d14a5b1042bce38
                              • Instruction Fuzzy Hash: 09115E32A28B4082FB608B35A4453DE7761E745BB4F544329EA7A973E9CB39C783C340
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,?,?,000000013F79B08D,?,?,?,?,000000013F793392,?,?,?,000000013F79331D), ref: 000000013F79B03C
                              • GetProcessAffinityMask.KERNEL32 ref: 000000013F79B04F
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Process$AffinityCurrentMask
                              • String ID:
                              • API String ID: 1231390398-0
                              • Opcode ID: 365564994351043c0f6da4208c40dc7667041a7c1eea9d086d56b8e935f100ff
                              • Instruction ID: 558df31adf88835cc73bc047aa9292e046bdcf542d9be7bb6d55b981d4f52870
                              • Opcode Fuzzy Hash: 365564994351043c0f6da4208c40dc7667041a7c1eea9d086d56b8e935f100ff
                              • Instruction Fuzzy Hash: DFE09B71B2194586DF598F5DD854BDA73A1BBC8B40F848139D50783714DE29D7468700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: dbbab3fd95f54e33885a284bb2ed7428d76a937d639561f340475b5681ff7bf1
                              • Instruction ID: 3a74cb2c5c519750f6ddc097a79f4eb5396158d4da0237322298d6d061146bbb
                              • Opcode Fuzzy Hash: dbbab3fd95f54e33885a284bb2ed7428d76a937d639561f340475b5681ff7bf1
                              • Instruction Fuzzy Hash: F8E01230E1150946FD5932F355563F931740F5A7B1E1E1B3C9A3A153C2B924CB6B8120
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: da961a74296a8bf94e293d096c062b8a1162fd65afa57d4769f7f2f1c1c3535b
                              • Instruction ID: e93003c870ea57202a483aaa4dd5a55208a41931c5275035dd484b70a36927ca
                              • Opcode Fuzzy Hash: da961a74296a8bf94e293d096c062b8a1162fd65afa57d4769f7f2f1c1c3535b
                              • Instruction Fuzzy Hash: 4DE0E265E02B0A85EC1CB3A5C0973ED26A04B49731E900F38E63D06BE2EA289A53C250
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                              • String ID:
                              • API String ID: 3765095794-0
                              • Opcode ID: d597362c3116f6ab4b785273b15ee223b4072af199ab353e3b77f6cbd2219f8d
                              • Instruction ID: 315227b915288c0ed07eb41fffbe550580e66a294f3166a9c01825d81b68fa5e
                              • Opcode Fuzzy Hash: d597362c3116f6ab4b785273b15ee223b4072af199ab353e3b77f6cbd2219f8d
                              • Instruction Fuzzy Hash: DBE0B674E00600E5FE64ABB998953E432A07B45360F96677DE025863E2EB28C76F9720
                              APIs
                              • HeapFree.KERNEL32 ref: 000000013F7B774E
                              • GetLastError.KERNEL32(?,?,000000013F7B6677,000000013F7BC272,?,?,?,000000013F7BC2AF,?,?,00000000,000000013F7BC775,?,?,?,000000013F7BC6A7), ref: 000000013F7B7758
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 485612231-0
                              • Opcode ID: 270eea0ec511144396b5b6131a5847575a112457cd499bf419628d3236a835b4
                              • Instruction ID: e5071c7a06a2ce41a75dce2c6184be9e4b4df337b5d0f30af35897ebc29cef20
                              • Opcode Fuzzy Hash: 270eea0ec511144396b5b6131a5847575a112457cd499bf419628d3236a835b4
                              • Instruction Fuzzy Hash: 5AE0C271F0120443FF086FF2A8853E832A15B8D700F44403C8E0287391DE388F838310
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: HandleModule$AddressFreeLibraryProc
                              • String ID:
                              • API String ID: 3947729631-0
                              • Opcode ID: 1ac00a3ac0a97039873183d2416d4f645a5f18b594404755723b7314a3f65ff8
                              • Instruction ID: d9c477e945e4c7bde897f66883986c03b6219e3b90a69e270f7c40eb404776d8
                              • Opcode Fuzzy Hash: 1ac00a3ac0a97039873183d2416d4f645a5f18b594404755723b7314a3f65ff8
                              • Instruction Fuzzy Hash: 4E214832A10B088AFBA49F64D4883ED37B0E745758F54473AD76906BD9DB34CA86CB80
                              APIs
                                • Part of subcall function 000000013F7A8800: GetModuleHandleW.KERNEL32(?,?,?,000000013F7A876F,?,?,?,000000013F7A8B2A), ref: 000000013F7A8827
                              • DloadProtectSection.DELAYIMP ref: 000000013F7A87C5
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DloadHandleModuleProtectSection
                              • String ID:
                              • API String ID: 2883838935-0
                              • Opcode ID: c0018843b65cb32e0b337282390bd8317558431382415f05cfee804b8789bce6
                              • Instruction ID: d71a12600c9daaf756448231df50b8e8204e35d35f3b73cfe85ad45ede303925
                              • Opcode Fuzzy Hash: c0018843b65cb32e0b337282390bd8317558431382415f05cfee804b8789bce6
                              • Instruction Fuzzy Hash: FE119072E1060581FE51AFD5AE857E033A1A718759F85403DEA09473F1DB388B9BC615
                              APIs
                                • Part of subcall function 000000013F791F08: FindFirstFileW.KERNEL32 ref: 000000013F791F53
                                • Part of subcall function 000000013F791F08: FindFirstFileW.KERNEL32 ref: 000000013F791F94
                                • Part of subcall function 000000013F791F08: GetLastError.KERNEL32 ref: 000000013F791FAD
                              • FindClose.KERNEL32(?,?,?,000000013F78C08E), ref: 000000013F791ED9
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Find$FileFirst$CloseErrorLast
                              • String ID:
                              • API String ID: 1464966427-0
                              • Opcode ID: 34d6502389b4690eca8b4a11efe4042d55015a8a6d19fd2ec76808677c43b1a3
                              • Instruction ID: 23e5dfc664bfb8e3a8b878e611fc6daf0dc0649907a0fea14061999b0a03795f
                              • Opcode Fuzzy Hash: 34d6502389b4690eca8b4a11efe4042d55015a8a6d19fd2ec76808677c43b1a3
                              • Instruction Fuzzy Hash: BCF02472A0438081EF50AF79A1063DA37609706BB4F18437CDE3A0B7D7CA64C2A7C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FromListPath
                              • String ID:
                              • API String ID: 3839826586-0
                              • Opcode ID: 4ee4a53a9798eae0db382600d551ca3ae0aa6d7e4044a86bff0496983a3df156
                              • Instruction ID: 0185c7d57ac2ce5dc88e2b5de14a1eee26b4765d1f37dddbb0fce5675dd0739a
                              • Opcode Fuzzy Hash: 4ee4a53a9798eae0db382600d551ca3ae0aa6d7e4044a86bff0496983a3df156
                              • Instruction Fuzzy Hash: 40F0896270444052DA10AB12E8567EE7720F7D47C4F84403AE58D877AADD6CCA46C700
                              APIs
                              • RtlAllocateHeap.NTDLL(?,?,?,000000013F7B8FA1,?,?,00000000,000000013F7BB137,?,?,?,000000013F7B6677,?,?,?,000000013F7B656D), ref: 000000013F7B77B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 44d1fbd9aeaba12978170c91871863ab6d6e557c08f90b5073f45cb598671283
                              • Instruction ID: bc70db0031eeca7d940804785f3d75573643281ff5f1acf051cc3939863d1dbd
                              • Opcode Fuzzy Hash: 44d1fbd9aeaba12978170c91871863ab6d6e557c08f90b5073f45cb598671283
                              • Instruction Fuzzy Hash: 82F0A035F0120841FE646B7158117E532905B4EBB0F58073CAF27863C1DA2CCF434260
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Thread$CreatePriority
                              • String ID:
                              • API String ID: 2610526550-0
                              • Opcode ID: be7d468b03d03b89ae625b15826e974f6cb6fcd7b4f78dcfcb41af788ab5fe92
                              • Instruction ID: 6d2cf84b65778f245688c4e1ffee8a497acb7ba0dbc24931d3c229909aaebafa
                              • Opcode Fuzzy Hash: be7d468b03d03b89ae625b15826e974f6cb6fcd7b4f78dcfcb41af788ab5fe92
                              • Instruction Fuzzy Hash: 2DF05E32A15A80C2E740AF56F98439F7371F384F84F548139EA9606359CB34C6938710
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: GdiplusShutdown
                              • String ID:
                              • API String ID: 872607806-0
                              • Opcode ID: 7107821959c357d72a3bbd2138b0c6fef8d2e4744e4df414b84200909bcac28e
                              • Instruction ID: 7fbb622f2ae6cf9eb293bc8e16573c83b2291d088cee1c5a3cbe805ac8bb4fea
                              • Opcode Fuzzy Hash: 7107821959c357d72a3bbd2138b0c6fef8d2e4744e4df414b84200909bcac28e
                              • Instruction Fuzzy Hash: F4E01236A08BC4C2EB068F72E8543983B30E35AF54F5D406ACB5943362DA28855AC310
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: BitmapCreateFromGdipStream
                              • String ID:
                              • API String ID: 1918208029-0
                              • Opcode ID: 8755241a6e8fba26f7a3844923e965bd14633a0c29ae9e09f8c5e4ad22476a9d
                              • Instruction ID: e3cf12f168ee5a695a1f8c0280f621432b85b4a9856857426c2ef2aee87ac426
                              • Opcode Fuzzy Hash: 8755241a6e8fba26f7a3844923e965bd14633a0c29ae9e09f8c5e4ad22476a9d
                              • Instruction Fuzzy Hash: EDE04FB6A2074082EF04DFA2E4507D97320FB8DB80F441039AE5A47355DF3CC299C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Window
                              • String ID:
                              • API String ID: 2353593579-0
                              • Opcode ID: 2323ccc5e59be8ee0254885ef1c083fa11a3be6e46f9bc61acf87414425a04a4
                              • Instruction ID: aa6724aef5ebf6b3c2a317bb3327eba04650daf47351e96bde0958ad40d46cff
                              • Opcode Fuzzy Hash: 2323ccc5e59be8ee0254885ef1c083fa11a3be6e46f9bc61acf87414425a04a4
                              • Instruction Fuzzy Hash: F4E0EC72B14A4081EB608FAAF9847A973B4E75CBD4F1591359A4D87374DA34C9E68B00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: BitmapCreateFromGdip
                              • String ID:
                              • API String ID: 4184683939-0
                              • Opcode ID: 12bca694415d1f4a30f94878050f35f48547ab6f4853a6a98fe57919ee8146b3
                              • Instruction ID: 97fdf9a23cd25731f10eb1d06b369c5605051b5ed3aaae47a9f01d6e4c7c9a6f
                              • Opcode Fuzzy Hash: 12bca694415d1f4a30f94878050f35f48547ab6f4853a6a98fe57919ee8146b3
                              • Instruction Fuzzy Hash: 54D02220F1010084FF189BB3B895BB822E283EEFC4F285034CD0A8B304CC18C7838380
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ItemMessageSend
                              • String ID:
                              • API String ID: 3015471070-0
                              • Opcode ID: 5ef386b3ee7542144411525105acc9ef7d75829a786e0529e5d3ae37d7fd2362
                              • Instruction ID: 5bfd8c77fb1a9ca5f07f49dc96cd9eb86cc92a334470869301d45f14b84c59b3
                              • Opcode Fuzzy Hash: 5ef386b3ee7542144411525105acc9ef7d75829a786e0529e5d3ae37d7fd2362
                              • Instruction Fuzzy Hash: 90D0A770F0020082F710A741A8157ED3320A392B40F41023CD9092E7D5CE3DC3379740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: b379d1919eef6dcf220e50b388016eabcdfdb9be812353f068f69c0090a9467a
                              • Instruction ID: 63d62932fc1ac447500e069099fb1d70ff2972194777c22c57206ce6017efede
                              • Opcode Fuzzy Hash: b379d1919eef6dcf220e50b388016eabcdfdb9be812353f068f69c0090a9467a
                              • Instruction Fuzzy Hash: 10D01233D45440A2ED545775B8513AD3350AB42735FB50754D23B816E1C75986E79321
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DestroyWindow
                              • String ID:
                              • API String ID: 3375834691-0
                              • Opcode ID: 710c7b1c1bc91ce3b40f3e9955189a48e107171e98c207c05e24d5f66646d289
                              • Instruction ID: 76d2a669a86bbe1031fcc197f0f64f1926e48633fcdd1fb318fab17495289120
                              • Opcode Fuzzy Hash: 710c7b1c1bc91ce3b40f3e9955189a48e107171e98c207c05e24d5f66646d289
                              • Instruction Fuzzy Hash: 44D012B6E1194486FF158FA1E4853A47370EB6CB05F4D4419C9190D390CB24C5DAC750
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CurrentDirectory
                              • String ID:
                              • API String ID: 1611563598-0
                              • Opcode ID: a56fe56e028b5553d6bfa0a370792c557ad4760319b0add77b2bc37b80b940d4
                              • Instruction ID: e4860ee377546f9629c52377b1aaef6d734e9687b36004082461971d937742d7
                              • Opcode Fuzzy Hash: a56fe56e028b5553d6bfa0a370792c557ad4760319b0add77b2bc37b80b940d4
                              • Instruction Fuzzy Hash: 34B09224F0210182EA087BA2288B7C822542BA4B00F950028D406C2251DE1C82A61700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File
                              • String ID:
                              • API String ID: 749574446-0
                              • Opcode ID: 14c98af5e7350858a0d6e5058a5882b99b4c2eb4990546580bf634d78ef99be5
                              • Instruction ID: 8f9012cbf2e384ee53a90a33c5e8cdcbc55cff81e1614e018fd19eb3f9b725ab
                              • Opcode Fuzzy Hash: 14c98af5e7350858a0d6e5058a5882b99b4c2eb4990546580bf634d78ef99be5
                              • Instruction Fuzzy Hash: E3B09221B12440C2DA046B22DC827082324B794B01F9A4064850E91220CE18C9EB9700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 3b82a6023a20df79a4367766d46024c1a82b0f45e6a7cb7470ce24be78ea5211
                              • Instruction ID: 503afd0c039c2414aca29a6c0d3a2d6d36f8aff2e0f6fde0d28c09d684bbfeee
                              • Opcode Fuzzy Hash: 3b82a6023a20df79a4367766d46024c1a82b0f45e6a7cb7470ce24be78ea5211
                              • Instruction Fuzzy Hash: 8CF0B432A1068089FF348F35E1457AA3B61E305B78F59536CDB38851E9DB20CAD6C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$1ERs
                              • API String ID: 808467561-158295685
                              • Opcode ID: f2a266fa450776d83431f905e69ad70814a7d5f92595957338657dd028b3c8d2
                              • Instruction ID: cccd92bc023565026560a3b297f4e4e5a2d2a77f18b7a816ab9e53e9f80ae0e3
                              • Opcode Fuzzy Hash: f2a266fa450776d83431f905e69ad70814a7d5f92595957338657dd028b3c8d2
                              • Instruction Fuzzy Hash: ABB2BE72E142888BEB648F68D544BED77A1F356788F505139DB0AA7B88D738DF02CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File$CloseDirectoryHandleRemove$AttributesCreateErrorLast$ControlCurrentDeleteDeviceProcess
                              • String ID: 1ERs$SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                              • API String ID: 3322710514-697573642
                              • Opcode ID: 00bf185859861c6fa433c379406061ab1097067d98995703e2199257f9c40f31
                              • Instruction ID: b217e2889257c49138b1faed76cb7c41e8d793e313998421e7ee7b8ec0ec231c
                              • Opcode Fuzzy Hash: 00bf185859861c6fa433c379406061ab1097067d98995703e2199257f9c40f31
                              • Instruction Fuzzy Hash: E502B032B0454096FB10EB70D4567DE7BA0FB957A4F41423AEA5D876E6DE28CB4BC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DialogItemMessageSend
                              • String ID: %s %s$1ERs$REPLACEFILEDLG
                              • API String ID: 575162118-1688214261
                              • Opcode ID: d1c259cd9f0f8fc9098d6da4718300a2a854cb3ea85eb70d7794af816bcd3f45
                              • Instruction ID: caa4f41197486e14d8a7de2bd1be3f7e244e5dd5c6423d1e29f47d602807663b
                              • Opcode Fuzzy Hash: d1c259cd9f0f8fc9098d6da4718300a2a854cb3ea85eb70d7794af816bcd3f45
                              • Instruction Fuzzy Hash: 3CB12C32A01A8096FF64AF65D8953ED7761F785B84F41413ADA0D4BB9ADE29CB0BC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID: 1ERs
                              • API String ID: 1239891234-1577259171
                              • Opcode ID: 6dc7126bae958aafbb62ae645c9ce5dc0c359ef71b5fef61e852479692239a18
                              • Instruction ID: e13bcadfc05ab89997f99d33975bee0683679462fd976c784d1c5e62d296edeb
                              • Opcode Fuzzy Hash: 6dc7126bae958aafbb62ae645c9ce5dc0c359ef71b5fef61e852479692239a18
                              • Instruction Fuzzy Hash: 01317032614F8086EB60CF65E8407DE73B4F789794F55012AEA9D43B99DF38C65ACB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: eea4ae72b02310c68cbfcb40ebcbd3b76fa2b8c2e372b8786a5d16902a8ea07a
                              • Instruction ID: 0c6597c598f18917fc2f662c38d7c9352aaf0e985b4cedfa57e60b2db5b994ae
                              • Opcode Fuzzy Hash: eea4ae72b02310c68cbfcb40ebcbd3b76fa2b8c2e372b8786a5d16902a8ea07a
                              • Instruction Fuzzy Hash: BE313872605B808AFB609FA0E8507EE7374F784748F44442EDA4E57B98EF38C649C710
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Release$CapsDevice
                              • String ID: 1ERs
                              • API String ID: 4264324914-1577259171
                              • Opcode ID: a8f0bf8731cb7f5468add9e736cf6f914d64d33afddb42cda0f44b8301450785
                              • Instruction ID: 7f6914461cb81a48fef9ff2b40f5a3b09b90035e1f18ac2e3687d4aad3879fce
                              • Opcode Fuzzy Hash: a8f0bf8731cb7f5468add9e736cf6f914d64d33afddb42cda0f44b8301450785
                              • Instruction Fuzzy Hash: D4810A36B14A0486FB20CFAAE440B9D7771F788B99F41412ADE0E97B64DF78C64AC740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: memcpy_s
                              • String ID:
                              • API String ID: 1502251526-0
                              • Opcode ID: f4205ceffc3342b216eaddc1e284d1c32450f725fb56c2d98b4cfced0672fb09
                              • Instruction ID: 3f24fc0f00766cbb006232785aa0d8fa76c9d6ae2408e8c6face8b67ffe034a0
                              • Opcode Fuzzy Hash: f4205ceffc3342b216eaddc1e284d1c32450f725fb56c2d98b4cfced0672fb09
                              • Instruction Fuzzy Hash: E4C11772B146898BEB34CF19E0487AAB791F395B84F44D139DB4A47784D739EE02CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFormatFreeLastLocalMessage
                              • String ID:
                              • API String ID: 1365068426-0
                              • Opcode ID: 720e1d665af86155b6d52ddd483690ffce5b947b9306b03357ccbbb50c1fc7e4
                              • Instruction ID: 8b278acb9c1e20109db934172576cdc7129750e20787e70f5a048cb589a014c7
                              • Opcode Fuzzy Hash: 720e1d665af86155b6d52ddd483690ffce5b947b9306b03357ccbbb50c1fc7e4
                              • Instruction Fuzzy Hash: A6F06272A1464083FB108B52F449BAAB7A0F784791F045028DA8646A94DFBCC2568B51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: $ $1ERs
                              • API String ID: 0-3943490557
                              • Opcode ID: d9b61ac85c199ae343cad72166c8023041029ab95baf6ee6999918e89ee9266a
                              • Instruction ID: bb68e585f35a5977838902ce4391ceaa8dcc87895a46dc3f08807b4bfe200a58
                              • Opcode Fuzzy Hash: d9b61ac85c199ae343cad72166c8023041029ab95baf6ee6999918e89ee9266a
                              • Instruction Fuzzy Hash: CFE1A676A0064886EBA88F2985907AD33A1F74BB88F24523DDB46077D4DB76CED3C740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: 4da2d9596358c2733e3ade1a129fd8a46b445a55c1436d0a43b11196e90c78d1
                              • Instruction ID: f383e168163374191f0bf79ac004011b628a98bef10ba3dd0152d4809e47397a
                              • Opcode Fuzzy Hash: 4da2d9596358c2733e3ade1a129fd8a46b445a55c1436d0a43b11196e90c78d1
                              • Instruction Fuzzy Hash: 2751D432B0078485FB209B76A8447DE7BB5E746BD4F144129EF6867B99DA38CA02C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateInstanceVersion
                              • String ID: 1ERs
                              • API String ID: 1462612201-1577259171
                              • Opcode ID: ef4d7b2877b706d9039eb1f5b643314b8e5d64cb964088a55bb453073a6001ec
                              • Instruction ID: cc474a5ab66ad4c5a6361c4b56161bed9f26b713819176c61aff687ffa6c5027
                              • Opcode Fuzzy Hash: ef4d7b2877b706d9039eb1f5b643314b8e5d64cb964088a55bb453073a6001ec
                              • Instruction Fuzzy Hash: 2001A432D4968085FE71AB20B4263EA77A0A779305F44117DD5CC077AAD77C834BCB24
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID: 1ERs
                              • API String ID: 2299586839-1577259171
                              • Opcode ID: 2d32fba226446cf735b3efa7e389aea2716db7426c436d2914a0ba6405b8d279
                              • Instruction ID: 72fa1b6d0da1548f12334d1d4b0e93838f89665cfa64261a95d760345a249a14
                              • Opcode Fuzzy Hash: 2d32fba226446cf735b3efa7e389aea2716db7426c436d2914a0ba6405b8d279
                              • Instruction Fuzzy Hash: 44E04632A1468186FB709B00F412BE973A0F788B44FC00035AACD43B85EF3CC22ACA40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs$CMT
                              • API String ID: 0-2971618018
                              • Opcode ID: 2a55f9927a61f896333a20387cebc1786a396451154bb660c9bd129a31ab8d5d
                              • Instruction ID: 2af0cf7e9395bd0b940e8361a2d95e71251bcb8a7d5d6509ad4d34ea49172138
                              • Opcode Fuzzy Hash: 2a55f9927a61f896333a20387cebc1786a396451154bb660c9bd129a31ab8d5d
                              • Instruction Fuzzy Hash: D762ED72B0069096EB18DF25D456BED7FA5F791388F40402EEA4A877D2CBB8CA57C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ExceptionRaise_clrfp
                              • String ID:
                              • API String ID: 15204871-0
                              • Opcode ID: 9f2f120d3ecb95be0da68e540d64d61f85f31db099565da766693d65c9a44c61
                              • Instruction ID: 491cf0cecdb9e59b202b14cc6bd967234bb4eb3b1c19971d4b5e8259ad6f7f3b
                              • Opcode Fuzzy Hash: 9f2f120d3ecb95be0da68e540d64d61f85f31db099565da766693d65c9a44c61
                              • Instruction Fuzzy Hash: B9B14077600B888BEB15CF2AC84639C7BE1F344B58F198925DB9D877A5CB79C552C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: e+000$gfff
                              • API String ID: 0-3030954782
                              • Opcode ID: a16caab20146e5fad907b32f0584b0b2d47f79384eaef0e96097227fb797859a
                              • Instruction ID: 49d3806302d200994604456659c0a1fe8cc2b9a853d9f95ba4aed107d51f03a4
                              • Opcode Fuzzy Hash: a16caab20146e5fad907b32f0584b0b2d47f79384eaef0e96097227fb797859a
                              • Instruction Fuzzy Hash: D4514832B146C846E7658E39E8057D9BB91E346B94F488239CBA44BBD5CB3ECA47C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: 3ce01dcdfbdad5a378132bd8dff2501772a90bb84c1e186c249de49aa357e036
                              • Instruction ID: b59c4e2d6c824fa06d0e3dadf820f7035fe784da6cfd162effb701bc347e5c0b
                              • Opcode Fuzzy Hash: 3ce01dcdfbdad5a378132bd8dff2501772a90bb84c1e186c249de49aa357e036
                              • Instruction Fuzzy Hash: DDD1BE36A0464886EBA98F2985547EE37A0EB47B48F24423DCF0A476D5DBB5CEC7C740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: f11c3cfc7f864254b051c5df1df81e9b4045b7f6a323e9653ed5c3f6f5cf2c0b
                              • Instruction ID: 840c5766562d4ecd2f305129919755fccea15c8618a5a127bb31fa7fb49cfdbd
                              • Opcode Fuzzy Hash: f11c3cfc7f864254b051c5df1df81e9b4045b7f6a323e9653ed5c3f6f5cf2c0b
                              • Instruction Fuzzy Hash: 1FD178B7B242908FE360CFBAD400B9D3BB1F39878CB519125DE59A7B09D639D646CB40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: gfffffff
                              • API String ID: 0-1523873471
                              • Opcode ID: 94604325bb74c132b3677955763b418003b5be94bd3e1b621f9fe3a9a961bc1b
                              • Instruction ID: 55d0a3979a4a84111af55521e5c5d600ef613f73e75ffbf1f4c7ea7f1f64bd16
                              • Opcode Fuzzy Hash: 94604325bb74c132b3677955763b418003b5be94bd3e1b621f9fe3a9a961bc1b
                              • Instruction Fuzzy Hash: D5A13573A047C886EB21CF29A450BEA7BA5E752B84F05913ADF8947785DA3DCA07C701
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: b0f706961199820fe2e345934f27a80a7d546ce3fac6a5e6cdcb32fc393c353f
                              • Instruction ID: 7154413311e415b55ffc193059ff695e7ba4e52b1ee62e5cc9c012ee0baa3b23
                              • Opcode Fuzzy Hash: b0f706961199820fe2e345934f27a80a7d546ce3fac6a5e6cdcb32fc393c353f
                              • Instruction Fuzzy Hash: 8A91E262B14684A6FB11DF68D4923EE7B20FB55788F401129EF4A07B9AEB35C70BC300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: cffaa5060630d9a76fe80a654a48307057e2165b29533d0ec43de94ed3f83d25
                              • Instruction ID: 889caef3a4226464be5a24c910fd23dcf788d92483eed715378a68e40670f218
                              • Opcode Fuzzy Hash: cffaa5060630d9a76fe80a654a48307057e2165b29533d0ec43de94ed3f83d25
                              • Instruction Fuzzy Hash: FC713076F1828086FB209B68E581BEF7B90A311388F10013DCE8557AC7DB29C747CB51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: 08f87da3c21ac6c3b6ad54b5c00a067e824c395104bfcccc05a58fdc758abbda
                              • Instruction ID: 03044181cb3147ed3798b1a32f6bda2be92b3b4ffbf073c341d6d6c2a4853bef
                              • Opcode Fuzzy Hash: 08f87da3c21ac6c3b6ad54b5c00a067e824c395104bfcccc05a58fdc758abbda
                              • Instruction Fuzzy Hash: CB611333B101D059EB01CF759A107EE7FB1E35A784F86802ACF9A67646D639C607CB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: f9f3cd2992c65023a5ea7fc19f0cefddf71d6570bb4a6a01ba758df2379e2081
                              • Instruction ID: 62c4717cddb89695883581e401d6a5b3e7cd5fe040c14e52bd19a6c3332df5d4
                              • Opcode Fuzzy Hash: f9f3cd2992c65023a5ea7fc19f0cefddf71d6570bb4a6a01ba758df2379e2081
                              • Instruction Fuzzy Hash: BB51A137B286908BD764CF25E400B9E73A5F388798F445119EF4A93B49DB39DA46CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: 1ERs
                              • API String ID: 0-1577259171
                              • Opcode ID: ac3787fb25f440b6ddd73408786dce7f8a35c1cd44ab3c231a3be5c96b6a0843
                              • Instruction ID: ba2314133f8cfaf97c0e494efcf71eb28a5903e770541b2494290151b9126e4f
                              • Opcode Fuzzy Hash: ac3787fb25f440b6ddd73408786dce7f8a35c1cd44ab3c231a3be5c96b6a0843
                              • Instruction Fuzzy Hash: D3511473B241904BE728CF38E518BEE7762F384B58F594129DB4547B89DA39CA47CB00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast
                              • String ID: 1ERs
                              • API String ID: 485612231-1577259171
                              • Opcode ID: 321a00be8216ab1d5a6abf96824688860184d35458da0e7affeca5d9c463e6b8
                              • Instruction ID: 6f70928166ba0dd7b762df74ef2ac286b0c870392becfb03cfb84bc0c91e615f
                              • Opcode Fuzzy Hash: 321a00be8216ab1d5a6abf96824688860184d35458da0e7affeca5d9c463e6b8
                              • Instruction Fuzzy Hash: E641B072710A5882EF04CF6ADA647D973A1A348FD4F49903AEF0D87B98DA38C6478300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: f19df3457cabf08339b26dd724f0c9893481a6ac0a987c3003da21f85d52f0fa
                              • Instruction ID: 87d16edac67c2d1529ed13d23482f11ad27c90cb1d869011b86275b464e66dbc
                              • Opcode Fuzzy Hash: f19df3457cabf08339b26dd724f0c9893481a6ac0a987c3003da21f85d52f0fa
                              • Instruction Fuzzy Hash: EEB09231E03B00C6EA082B116D8278433A86B88B10F99002CC40D50320DA3C12E75700
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 99ac0fc35d8cf77e6e1bd8c6a8413b265182a4939a0404e7029cdd914341865a
                              • Instruction ID: b64294e5bf1d8fb0303d43b4e8b759d2db487e7e2487555da90efefd163183c9
                              • Opcode Fuzzy Hash: 99ac0fc35d8cf77e6e1bd8c6a8413b265182a4939a0404e7029cdd914341865a
                              • Instruction Fuzzy Hash: 5E627F9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2eb2ce0b07b00d60622ba1d133584415865426598a4840553b895c569aa2730a
                              • Instruction ID: 50d2e027d55e32997c4958ad1b959eb0e560bc07ce97cfccf6010b3932421e2c
                              • Opcode Fuzzy Hash: 2eb2ce0b07b00d60622ba1d133584415865426598a4840553b895c569aa2730a
                              • Instruction Fuzzy Hash: 4C22C2B3B206508BD728CF25D89AE5E3766F398744B4B9228DF06CB785DB39D605CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7d2150a2774044c36f79e81eacf1206554ea999062c49d9c81a4d9e38c8f448f
                              • Instruction ID: ebfd1141ddad0a9723216a3bc28f925ffc390a786612659a5dbbd948ba07d8cf
                              • Opcode Fuzzy Hash: 7d2150a2774044c36f79e81eacf1206554ea999062c49d9c81a4d9e38c8f448f
                              • Instruction Fuzzy Hash: 34B16072A16B8885E7668F39C0543AD3BA0F34AF48F28412DCF4A57395DB35CE42D785
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2fa021549f167e7e5cc87e9c9d49059b1c09a6111a41a30a90789b7ea67b7d5a
                              • Instruction ID: eb8784f4388b66f861150d700477e605dceb8d4e600b01c5a6326271550ad921
                              • Opcode Fuzzy Hash: 2fa021549f167e7e5cc87e9c9d49059b1c09a6111a41a30a90789b7ea67b7d5a
                              • Instruction Fuzzy Hash: FC81D572A0878886EB74CF19A5403DA7A91F7467D4F14423DDB9D47B99DB3DCA038B00
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                              • Instruction ID: fa039be8d57848366d06c57e0227fa79fda609714e8ad74bd268d1a178fd3a05
                              • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                              • Instruction Fuzzy Hash: 1451B436A1165886E7648F29D0443A833A0E74AF69F344139DF4A577E8C7B2DE53C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                              • Instruction ID: 77cf9f0de298969a42c466be007e21103d70c0e418a929e84fe1ea27df60e7f0
                              • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                              • Instruction Fuzzy Hash: 1F51C577A14A9886E7248F29C05479933A0E346F6CF24512ACF4A577E4D7B2DE53C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                              • Instruction ID: e6aafc98156632943afff5d616b6f1cee2bff798814df841810e9e355b0fa5ba
                              • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                              • Instruction Fuzzy Hash: 7851B576A14A5886E7248F29C0443A833A1F74AF6CF284129CF8B577E5CB76CE53C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                              • Instruction ID: f9583e87f54210bb96865099cba92c571542303c68ab099c779296702151e61d
                              • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                              • Instruction Fuzzy Hash: A651A136B10A5886E7258F29C0483AD37A1E78AF58F345139CF4A577A8D7B6DE43C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                              • Instruction ID: ccdb717c8521f830f06b63e259101ebe682989a4837ce3d62925372ccb1cc5c7
                              • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                              • Instruction Fuzzy Hash: 79517176B1069886E7248B29C0443A937A1E34AF68F354139CF4A577A9CB76DE53C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                              • Instruction ID: 9b2d10d48be0873763c0065f9813524cd2898dc74f1e31796208b10a85fda959
                              • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                              • Instruction Fuzzy Hash: E151C337B1465886E7248B29C0443AC37A1E74AF58F244139DF4A57BA8D7B6CE53C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cdc14705774243d19fb94633146f393bab702cd26d035aadc90ecda4019bf39
                              • Instruction ID: ce13f227c696adba32acd8810e50146be7bae61fc65428c47def31c9a4d15987
                              • Opcode Fuzzy Hash: 8cdc14705774243d19fb94633146f393bab702cd26d035aadc90ecda4019bf39
                              • Instruction Fuzzy Hash: 553128B2A146404BE748EA2AE9917EF7BD1F344784F14803DDF8287B42DA38C547C710
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5852029dbc0ce463896b4f8196b6243869ef963d9e7f9ccb60a74bfb739e6291
                              • Instruction ID: c85602b24b24537de4ac119f3aa1164e0d9ae2c34461d9f6bcdcf2365d2da63d
                              • Opcode Fuzzy Hash: 5852029dbc0ce463896b4f8196b6243869ef963d9e7f9ccb60a74bfb739e6291
                              • Instruction Fuzzy Hash: 93F0C9F5F2B00546FF68102D981DBBB32D7E365314F6489BEE417DA2C2E459CB935209
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b26cc2c670222ae876159ff5603c0af37539fb50017e4d91ac7b3a384edc0ce7
                              • Instruction ID: 08ad91b6a9114c602572644c9ad70f29b3649fc4c703b792f05c1c709c5c29fe
                              • Opcode Fuzzy Hash: b26cc2c670222ae876159ff5603c0af37539fb50017e4d91ac7b3a384edc0ce7
                              • Instruction Fuzzy Hash: 9EA00232944C40D8FE84CF90F8507E03330F392300F91003DF00A511A09B3C8607C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                              • String ID: <pi-ms-win-core-synch-l1-2-0.dll$SleepConditionVariableCS$WakeAllConditionVariable$kernel32.dll
                              • API String ID: 2565136772-369236946
                              • Opcode ID: e0361d743c454d09e960a600f16381c646ca90098b4fa54283586941770b61f3
                              • Instruction ID: 44f8f6b691104c63cff26f31c2b14b0c58ed23ad0f6f3865f489b016875955b7
                              • Opcode Fuzzy Hash: e0361d743c454d09e960a600f16381c646ca90098b4fa54283586941770b61f3
                              • Instruction Fuzzy Hash: F2213D31E12A0192FE559F61FD54BE433B1AB94B50F8A403E994F067A5EE38C76BC300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: LICENSEDLG
                              • API String ID: 0-2177901306
                              • Opcode ID: 0c808f6cd05cc0a747108c0f82ff5e28cc2279d91e0e18d1e2e229003918714d
                              • Instruction ID: 60912831a885cc95c0ff3f32e2a5cd38ce2e8bba06fb0b5b4d96fe1df98f370c
                              • Opcode Fuzzy Hash: 0c808f6cd05cc0a747108c0f82ff5e28cc2279d91e0e18d1e2e229003918714d
                              • Instruction Fuzzy Hash: FE316B31B0465082FE549BA2A850BE937A1AB99FD0F45403DAD4E0BBA5DF39CB4B8700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Window$MessageSend$ClassDeleteLongNameObject
                              • String ID: 1ERs$STATIC
                              • API String ID: 25648435-2122532312
                              • Opcode ID: 61700d33a8561694a78568dba75358c344a7c7a9c021a197164aa6a8e619da87
                              • Instruction ID: 4cf70e22cdfa1c3dcbff0765e22cac03796fdf4fa2ba35844145171624045760
                              • Opcode Fuzzy Hash: 61700d33a8561694a78568dba75358c344a7c7a9c021a197164aa6a8e619da87
                              • Instruction Fuzzy Hash: 7431BF32B05B8086FF64DB52A9547EA33A1B789BC0F450039DD4E07B95DE39CA5B8B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: f$f$p$p$f
                              • API String ID: 3215553584-1325933183
                              • Opcode ID: 3e37737b2b1630447d2a3105bac6e122366a1c5d0912d830ab69edb90e93f5d3
                              • Instruction ID: dde1ee77caef5e60e32d2344892d74c7463889321d27e5943923a44f17aeb375
                              • Opcode Fuzzy Hash: 3e37737b2b1630447d2a3105bac6e122366a1c5d0912d830ab69edb90e93f5d3
                              • Instruction Fuzzy Hash: 1012A772F0828A86FB649A14E0547EE77A1F382750FD8413DE79347AD4D7B8CE828B50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: 1ERs$csm$csm$csm
                              • API String ID: 849930591-3428941641
                              • Opcode ID: 60ccb990520f364bd5ff3320d79b5af825f669780890ab8edf7d24260d78d952
                              • Instruction ID: 915b63c284b02f9b95552341da7d5c1b99289ac8ea0352c0da5e7cac9bd383bb
                              • Opcode Fuzzy Hash: 60ccb990520f364bd5ff3320d79b5af825f669780890ab8edf7d24260d78d952
                              • Instruction Fuzzy Hash: ECE1A372E04B408AFF60DFA9D4843DD77A0F749798F110129EE8957B9ADB34D69AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: NamePath$FileLongMoveShort
                              • String ID: 1ERs$rtmp
                              • API String ID: 3741477874-2702954190
                              • Opcode ID: 079ba69fcc673c0077970e8d3d88ee44f4b9ea605e4e1b7a23ab3fccf93bec08
                              • Instruction ID: e6d13a0f1aa4f1a0dc342cb4156cd09e340d49e16c6fbf3cb01c3c76270b1108
                              • Opcode Fuzzy Hash: 079ba69fcc673c0077970e8d3d88ee44f4b9ea605e4e1b7a23ab3fccf93bec08
                              • Instruction Fuzzy Hash: C6A12F32B1154065FA50EB71D8523EE7B60ABD1784F81503AE94EC7AFAEE64CB4BC740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Time$System$File$Format$DateLocalSpecific
                              • String ID: 1ERs$2
                              • API String ID: 909090443-3766158228
                              • Opcode ID: 4b14c85589888b76fbd4abfff1d50f03c115230c74de0e2e2410d8fb73203b99
                              • Instruction ID: f4739d7e958ef89b11223dc30419ce3b929b1b0b82d979e8c0413b1b4c60025d
                              • Opcode Fuzzy Hash: 4b14c85589888b76fbd4abfff1d50f03c115230c74de0e2e2410d8fb73203b99
                              • Instruction Fuzzy Hash: AF315032604A8196EB10DF61F8517DA73B1F788788F81512AEA8D47B58DF38C60ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID: 1ERs
                              • API String ID: 2506987500-1577259171
                              • Opcode ID: 33f8256a778b83c36d7b81987b11f071b38dbe2f901bfaba2eaf53f1a568370b
                              • Instruction ID: c37a92eaca752d81356a4a48e18570ad59acc482ca0572c138937fa563a1bcd5
                              • Opcode Fuzzy Hash: 33f8256a778b83c36d7b81987b11f071b38dbe2f901bfaba2eaf53f1a568370b
                              • Instruction Fuzzy Hash: 9C21A231F0428846FA68677596463ED72929B4A7F0F54073DAF3687BC6DE28CE434300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocString
                              • String ID: 1ERs$SELECT * FROM Win32_OperatingSystem
                              • API String ID: 262959230-3080580435
                              • Opcode ID: 89c07923fc20cd276b35abe59e078f2180a7127b2a66092dd87468531a82c199
                              • Instruction ID: cff295f8c16549a7f06abdc18ad59a1220dde8e0637c53387b2bbf6970ef633f
                              • Opcode Fuzzy Hash: 89c07923fc20cd276b35abe59e078f2180a7127b2a66092dd87468531a82c199
                              • Instruction Fuzzy Hash: 8D41B232A0074589FF149FB5E9443E972A1E744BE4F15463CAA6E877D9DF38C6678300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion
                              • String ID: 1ERs
                              • API String ID: 2092733347-1577259171
                              • Opcode ID: 785aab82d1612a79ecf9afd1edb4d9ea8d5d9007b697cc82a07f5d23ef14f703
                              • Instruction ID: 64ebd7cb458d2e22e0be1e77f2a6d6f6f893a03c02b47cee9a69b0e62fc96555
                              • Opcode Fuzzy Hash: 785aab82d1612a79ecf9afd1edb4d9ea8d5d9007b697cc82a07f5d23ef14f703
                              • Instruction Fuzzy Hash: D7412972F106508AEB54CFB9D8457ED37B1F708B88F50402ADE1A57B58EB38CA56CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion
                              • String ID: 1ERs
                              • API String ID: 2092733347-1577259171
                              • Opcode ID: 956c3446ac1bfcf25464c98837fee348a5ffcf07c062ffee1da10e396255a6cd
                              • Instruction ID: 040f8fa1041d64e0a5ca135665219f743883f0cdc5f89b57b8b63a270d4d1dd3
                              • Opcode Fuzzy Hash: 956c3446ac1bfcf25464c98837fee348a5ffcf07c062ffee1da10e396255a6cd
                              • Instruction Fuzzy Hash: 71313B73F106508AFB14CFB5E8813ED3771FB08758F54502AEE1A97A58EA38CA96C350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                              • String ID: 1ERs$csm$csm$csm
                              • API String ID: 3523768491-3428941641
                              • Opcode ID: e98d9cd26de64f13b8959c209465968c05dba0e954234f4c35712d9457a1f7f8
                              • Instruction ID: e101659e8f3cd7bd087aecc71a471ea415a09598e6430eca9415fb6fe16d07e4
                              • Opcode Fuzzy Hash: e98d9cd26de64f13b8959c209465968c05dba0e954234f4c35712d9457a1f7f8
                              • Instruction Fuzzy Hash: ECE19E73A04B808AFB20DFA9D4843ED7BB1F745758F16412AEE8957796DB34C68AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: 1ERs$1ERs$1ERs$1ERs$1ERs
                              • API String ID: 3215553584-3967319807
                              • Opcode ID: 0c21b3e6a92f08f13745e3e526015717081f69c98e2bb41ab6e567fe70251a95
                              • Instruction ID: cdef48155ed1c2c2781c51eb0ee1046f5bf20b962f1c4f54345b29dee462244b
                              • Opcode Fuzzy Hash: 0c21b3e6a92f08f13745e3e526015717081f69c98e2bb41ab6e567fe70251a95
                              • Instruction Fuzzy Hash: E6619F32E0064882FA699B6D95883EE7AA0F787780F55453DDF4A177A4DA38CF53C780
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ClearCreateFreeInstanceStringVariant
                              • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL
                              • API String ID: 395591258-566834514
                              • Opcode ID: 36a982d5529d683292142ef0ef30e8f896cec8efdc1ecc99ac1944d8507f6ab1
                              • Instruction ID: eb11f1f4849d1fc08cf09adaecfc7963189ad2f23595e8b3a5f05411273a4bcd
                              • Opcode Fuzzy Hash: 36a982d5529d683292142ef0ef30e8f896cec8efdc1ecc99ac1944d8507f6ab1
                              • Instruction Fuzzy Hash: 74710836611B4496EB20EF65E8907DD73A4F788B98F41512AEE4E47BA8DF38C646C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 99401a05b28a9207d8dd0d05491b38b25e137ad6b948d1adcf7db3e2e0ec208d
                              • Instruction ID: 5dcab98fd61c49194692b3cebbd702dc564f185f02cc22ee0e81a87113626ccb
                              • Opcode Fuzzy Hash: 99401a05b28a9207d8dd0d05491b38b25e137ad6b948d1adcf7db3e2e0ec208d
                              • Instruction Fuzzy Hash: B4116D32B10B4086EB508B56F84479A76A0F798FE4F444238EA5E87BA4DF78CA468744
                              APIs
                              • GetModuleHandleW.KERNEL32(?,?,?,000000013F7A876F,?,?,?,000000013F7A8B2A), ref: 000000013F7A8827
                              • GetProcAddress.KERNEL32(?,?,?,000000013F7A876F,?,?,?,000000013F7A8B2A), ref: 000000013F7A8844
                              • GetProcAddress.KERNEL32(?,?,?,000000013F7A876F,?,?,?,000000013F7A8B2A), ref: 000000013F7A8860
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                              • API String ID: 667068680-1718035505
                              • Opcode ID: 7c169681784771b86197f8841d22ea9abd0677e23566ea11e573b1539fb58786
                              • Instruction ID: a4deb2c2acec510e080018a32f9e4c13d89e50d0e973f2117640e6296d40c146
                              • Opcode Fuzzy Hash: 7c169681784771b86197f8841d22ea9abd0677e23566ea11e573b1539fb58786
                              • Instruction Fuzzy Hash: C7115E31E26B0095FE658F91FB403E473A1AB08B80F4A547D994E073A4EE3CD7AB8300
                              APIs
                              • GetLastError.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B7467
                              • FlsSetValue.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B749D
                              • FlsSetValue.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B74CA
                              • FlsSetValue.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B74DB
                              • FlsSetValue.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B74EC
                              • SetLastError.KERNEL32(?,?,00003F0073524531,000000013F7B7721,?,?,?,?,000000013F7B8FBA,?,?,00000000,000000013F7BB137,?,?,?), ref: 000000013F7B7507
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: ba828b49eb28cf8f14636659f097d3729cc1d46c627f16ccd11c1666027e59fe
                              • Instruction ID: c4aa60c39f7a61e12b87d68175aa539a297d34311c05a959db0662e87e25f6a8
                              • Opcode Fuzzy Hash: ba828b49eb28cf8f14636659f097d3729cc1d46c627f16ccd11c1666027e59fe
                              • Instruction Fuzzy Hash: D2117C31A0424842FA54AB3596857ED32929B8A7B0F54073DEF36877C6EE28CE438300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID: 1ERs
                              • API String ID: 2718003287-1577259171
                              • Opcode ID: a8e3eefb6b4a7bb60a8dfef776a41c730d8024edca4d5e0d56e7037e71f64804
                              • Instruction ID: 18b4430fe72b599cadec59daade8a929512a60aaf263dc6b8917c94be1699704
                              • Opcode Fuzzy Hash: a8e3eefb6b4a7bb60a8dfef776a41c730d8024edca4d5e0d56e7037e71f64804
                              • Instruction Fuzzy Hash: 9AD1B032B14A8889E711CFE9D4403DC37B1F345B98F54822ADF5AABB99DA34CA57C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: 1ERs$MOC$RCC
                              • API String ID: 3544855599-2904164723
                              • Opcode ID: 47af0c85fdb25179673fa66b102b971ee9e42a9de974d5d47ddfa20c25a00b67
                              • Instruction ID: 970c062242f22b9485acd4e54e2f1a562bb9a91bb0aa818eee839f8074dfd2df
                              • Opcode Fuzzy Hash: 47af0c85fdb25179673fa66b102b971ee9e42a9de974d5d47ddfa20c25a00b67
                              • Instruction Fuzzy Hash: A3917E73A14B908AFB50DFA5D8843DD7BA0F344788F15412AEF8957B55DB38C2AACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm$f
                              • API String ID: 2395640692-629598281
                              • Opcode ID: a6761e8e7c818eeef342585bf932cfb9eaa669016519b3295bdcd8878ab48e67
                              • Instruction ID: 121597e3c9cd813a309c11fbb718696624338e1ebd38e817f8e22b9f7dc7bebf
                              • Opcode Fuzzy Hash: a6761e8e7c818eeef342585bf932cfb9eaa669016519b3295bdcd8878ab48e67
                              • Instruction Fuzzy Hash: 3051DE32B11600AAFF15CF5DE504B9937A6F384BC8F269138EE1647788EB34CA4AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: File$Create$CloseHandleTime
                              • String ID: 1ERs
                              • API String ID: 2287278272-1577259171
                              • Opcode ID: 84e8bc31e468431bf3ce36ec2598d1eaa81598ad8955d9683e74096c8d90d524
                              • Instruction ID: b16ba56597efd2383a2298e313dd94d3555842ba9e84ef08c21b1dd382d59560
                              • Opcode Fuzzy Hash: 84e8bc31e468431bf3ce36ec2598d1eaa81598ad8955d9683e74096c8d90d524
                              • Instruction Fuzzy Hash: CC51E632B4064045FE60DB21F5117EB77A0AB867E4F454239ED6A0B7EADE78C65BC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FullNamePath
                              • String ID: 1ERs
                              • API String ID: 608056474-1577259171
                              • Opcode ID: bc269fee4e50a1ee74e2711acd90c84bb1ed9af7c8df65560ead03289f62de64
                              • Instruction ID: 4396a549a7195f049a4f7705827e9a21f1ec5a442eef338abc149b29a0fc840b
                              • Opcode Fuzzy Hash: bc269fee4e50a1ee74e2711acd90c84bb1ed9af7c8df65560ead03289f62de64
                              • Instruction Fuzzy Hash: 5A414C31F1060094FB50EBB1D866BEE3BA1AB95784F54403EDD0E97A9AEE64CB07C301
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID:
                              • String ID: RENAMEDLG$REPLACEFILEDLG
                              • API String ID: 0-56093855
                              • Opcode ID: 7d2f55ecc67719a671fa2d38e6172bed85f8f4a9c20d5812f76a5836ffd50a38
                              • Instruction ID: 35d09adf08cb2f4cd2ddb27790817d9e7688ef115a4779d24607dc01154ee87e
                              • Opcode Fuzzy Hash: 7d2f55ecc67719a671fa2d38e6172bed85f8f4a9c20d5812f76a5836ffd50a38
                              • Instruction Fuzzy Hash: 2921D035A04B8591FE918FA5F8843E877A0B349B88F81443EE94D873A1DA3EC75B8300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: EnvironmentVariable
                              • String ID: 1ERs$sfxcmd$sfxpar
                              • API String ID: 1431749950-18409952
                              • Opcode ID: ff593fcf8732caf793ca9fa8692b2aaa7cde79f1b0adea124ae6a48ad6d30b5c
                              • Instruction ID: b6aacfd4d0310627323e8dff6b0db84d9d1badd490b96f2c81255b1b029d4d61
                              • Opcode Fuzzy Hash: ff593fcf8732caf793ca9fa8692b2aaa7cde79f1b0adea124ae6a48ad6d30b5c
                              • Instruction Fuzzy Hash: 63118072A0464481FE20AF10E8523EA77B0FB8A784F851139E98E473A6DE2DC35BC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 3a6960139d1195420c441f0a180e2eceb3f0f0355911d38fddc9faec6ff8e26f
                              • Instruction ID: 1b122fffd7975236643dba9294b25c16b3345f2586d5a79d790931e817577f7d
                              • Opcode Fuzzy Hash: 3a6960139d1195420c441f0a180e2eceb3f0f0355911d38fddc9faec6ff8e26f
                              • Instruction Fuzzy Hash: B9F01271A11B0482EE249F64F8847997370AB49BA2F54073DD66B4A2E8DF3CC646C700
                              APIs
                                • Part of subcall function 000000013F79AD40: GetSystemDirectoryW.KERNEL32 ref: 000000013F79AD8F
                                • Part of subcall function 000000013F79AD40: LoadLibraryW.KERNEL32 ref: 000000013F79ADF9
                              • GetProcAddress.KERNEL32(?,?,00000000,000000013F7988A4), ref: 000000013F798615
                              • GetProcAddress.KERNEL32(?,?,00000000,000000013F7988A4), ref: 000000013F798629
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                              • API String ID: 2141747552-1753850145
                              • Opcode ID: b2060872d589d48bc2ff78162bd05e3dbd29374624054cbd389be123312146de
                              • Instruction ID: d31dfd0d9c915f9b754209a415260dca48f25cf63c084e21021e1a9c5bad1d2e
                              • Opcode Fuzzy Hash: b2060872d589d48bc2ff78162bd05e3dbd29374624054cbd389be123312146de
                              • Instruction Fuzzy Hash: 6AF01575E02F8181EF05CF20F49439837E0A768B49F88403DC9590A399EF78C696C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AdjustPointer
                              • String ID:
                              • API String ID: 1740715915-0
                              • Opcode ID: 36d29e437cc54fc0d0163762a6bd59ee58dd3f3e7b9fd35c41fe11139d6dc90f
                              • Instruction ID: 02b492d0a3e51f12ed554db07accf8df5ec6cf3fa9c2d6cc34fa8930be79f6b6
                              • Opcode Fuzzy Hash: 36d29e437cc54fc0d0163762a6bd59ee58dd3f3e7b9fd35c41fe11139d6dc90f
                              • Instruction Fuzzy Hash: 4BB1DF32A06A94A1FE65DF9DE5807E97790EB44F84F0B843E9E5907B85DB34CA5BC300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
                              • Instruction ID: 525d64959c822f9dddf1b4764b131460502b0c9d5dfd1a3a71fc09d8375b641c
                              • Opcode Fuzzy Hash: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
                              • Instruction Fuzzy Hash: 7211A13AE54A8141FE645168E4663E93180AF5A374F0A473CAE76063DBCBF88BD39201
                              APIs
                              • FlsGetValue.KERNEL32(?,?,?,000000013F7AFE57,?,?,00000000,000000013F7B00F2,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B753F
                              • FlsSetValue.KERNEL32(?,?,?,000000013F7AFE57,?,?,00000000,000000013F7B00F2,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B755E
                              • FlsSetValue.KERNEL32(?,?,?,000000013F7AFE57,?,?,00000000,000000013F7B00F2,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B7586
                              • FlsSetValue.KERNEL32(?,?,?,000000013F7AFE57,?,?,00000000,000000013F7B00F2,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B7597
                              • FlsSetValue.KERNEL32(?,?,?,000000013F7AFE57,?,?,00000000,000000013F7B00F2,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B75A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: a18d1bb93033013d9260a128d3fe553969ba745fda5c1094212dda3b1d87667a
                              • Instruction ID: 9a2f24abd3768252a0b174343459c5f0b1f2dc6c18e569e3758d6e8356f739d7
                              • Opcode Fuzzy Hash: a18d1bb93033013d9260a128d3fe553969ba745fda5c1094212dda3b1d87667a
                              • Instruction Fuzzy Hash: 05116031F0820842FA58A73995863E971919F4A7F0F44473DBB3A877D6DE28DE438310
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 09154bd0359179f0e4309beb6de9114eca67b456f9a8fd9e2f5405ded58e9611
                              • Instruction ID: 67dc6e6514bb2224982deec1f896290da9910638d3c0257da1bc5138a34f4bf1
                              • Opcode Fuzzy Hash: 09154bd0359179f0e4309beb6de9114eca67b456f9a8fd9e2f5405ded58e9611
                              • Instruction Fuzzy Hash: 5411ED34E0120D46FA68777594563E935828B47374F98073DAF369B7D2EE289F434351
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Message$DispatchObjectPeekSingleTranslateWait
                              • String ID:
                              • API String ID: 3621893840-0
                              • Opcode ID: 15deec3054c28586e205459fe0189c4ed6066b119782c2c5fb0ff31e97a13644
                              • Instruction ID: f4417287b088f00fea1fcec16c1f5d9a277caffd9610205a7813537f09c8770c
                              • Opcode Fuzzy Hash: 15deec3054c28586e205459fe0189c4ed6066b119782c2c5fb0ff31e97a13644
                              • Instruction Fuzzy Hash: 6AF01D32B3454582FB609B60F895BEA3361FBF4B05F855035AA4B819949E38C24BCB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: DXGIDebug.dll
                              • API String ID: 3215553584-540382549
                              • Opcode ID: 26a2edb9a9702b89a9dfd7e93f4289afa163ffe19e6ccab0517458891712df38
                              • Instruction ID: a4d67e0f86ea2a928f314855730ee8b319e8bb09bd69af359225b02211c56c47
                              • Opcode Fuzzy Hash: 26a2edb9a9702b89a9dfd7e93f4289afa163ffe19e6ccab0517458891712df38
                              • Instruction Fuzzy Hash: 3191DF32A08B4C85F7618F28D4507ED37A2AB46B99F98413EDB5A473D9DB38CE478301
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 58744c8bb07ed3aa3e58da5834242c9036a61f7ed2d139103f42bb17746798fd
                              • Instruction ID: 02d0abf947483b85f01795608c5ae0b92c1f9d6be0b8746c420528136b091b14
                              • Opcode Fuzzy Hash: 58744c8bb07ed3aa3e58da5834242c9036a61f7ed2d139103f42bb17746798fd
                              • Instruction Fuzzy Hash: C0614F77A04B848AFB20CFA5D4403DD77A0F748B98F15422AEF5917B99CB78D69AC700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: dff33faf19fa612d00f694886be567677f5714d100c4dc190a560424eb284a65
                              • Instruction ID: f69805d5fcbb85978256c9e3686184937334865fd75d3b89f78c163c9e356224
                              • Opcode Fuzzy Hash: dff33faf19fa612d00f694886be567677f5714d100c4dc190a560424eb284a65
                              • Instruction Fuzzy Hash: 7B51BE32D20681C6FF748FA6944439D77A4F344B84F1A812DEA8947BD6CB3CD66ACB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: 1ERs$U
                              • API String ID: 442123175-1905082894
                              • Opcode ID: f32195ae518fd65f4f3b1012928870cbf467e7821a135e261eae2b4b3a68d128
                              • Instruction ID: f83903881c4ed45912ca7785f6f5f0eaa191c8cb4e116202b092da325ded09ce
                              • Opcode Fuzzy Hash: f32195ae518fd65f4f3b1012928870cbf467e7821a135e261eae2b4b3a68d128
                              • Instruction Fuzzy Hash: 1A41B032A14A4482EB209FA5E8443E977A5F799B84F914039EF4D87798EB38CA42C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DialogItemText
                              • String ID: 1ERs$GETPASSWORD1
                              • API String ID: 1552716189-1604629512
                              • Opcode ID: 831a5f717255c5b41f354c6f53a912cae90d49b23b5780198afb01ba168c080e
                              • Instruction ID: ab960a708e0114bb9d1bd69bdd259de824a23d5e27987910647f2d92dea1d918
                              • Opcode Fuzzy Hash: 831a5f717255c5b41f354c6f53a912cae90d49b23b5780198afb01ba168c080e
                              • Instruction Fuzzy Hash: 64218132B04A8082FE649F55E9903EA7362E785784F55403EDE8E477D6DE3ACA5B8304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CloseCurrentErrorHandleLastProcess
                              • String ID: 1ERs
                              • API String ID: 1009092642-1577259171
                              • Opcode ID: 3834570864cbc02c00b13b819ef016fef9bf52c25e73392543ff3d1090e28114
                              • Instruction ID: ac773b28180b0a874631e1f1eae0cdc65c338ca6dafc2e656ed3c8b52c6264e1
                              • Opcode Fuzzy Hash: 3834570864cbc02c00b13b819ef016fef9bf52c25e73392543ff3d1090e28114
                              • Instruction Fuzzy Hash: 4A116332A14B4186EB50CF61F4417DA77B0F788B90F45412AEA8E43668DF3CC24ACB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
                              • String ID: 1ERs
                              • API String ID: 838830666-1577259171
                              • Opcode ID: 9eea292e7115fef4e2324cf346b579c13e806438279dc46d54d958f88320f92a
                              • Instruction ID: 3936e3017f5a28a5c5c96e4c14bc5631c5956dbd3db088dadadc29b3e92cf63b
                              • Opcode Fuzzy Hash: 9eea292e7115fef4e2324cf346b579c13e806438279dc46d54d958f88320f92a
                              • Instruction Fuzzy Hash: 7321BA76A01B0081FA408B59F9813D576B4F784744F91413EEA8E863F1EB38C65AC300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ClassCursorLoadRegister
                              • String ID: P$RarHtmlClassName
                              • API String ID: 1693014935-552670043
                              • Opcode ID: 31acbb7b32b518cdaa092c4f1bb6aab95ae06e0d4904f27a47475fa26f19002a
                              • Instruction ID: fc42f9e41e088a487e42d69ae8b6029f45f9ed47d18f2b9ec7ea73cd7fa450eb
                              • Opcode Fuzzy Hash: 31acbb7b32b518cdaa092c4f1bb6aab95ae06e0d4904f27a47475fa26f19002a
                              • Instruction Fuzzy Hash: C2010532A10B51DAF7008FA0E84539D77B8F348758F244129DE982AA58DF78C256CB80
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CapsDeviceRelease
                              • String ID:
                              • API String ID: 127614599-3916222277
                              • Opcode ID: 3835359f8632c3883978aa59da59803a7ae97ae479bf7427c32fe4182829fb3b
                              • Instruction ID: b88f7b4164b32a63562bf72d33d17f91660f0187d722e11ea974a98777caeb76
                              • Opcode Fuzzy Hash: 3835359f8632c3883978aa59da59803a7ae97ae479bf7427c32fe4182829fb3b
                              • Instruction Fuzzy Hash: C4E0C230B0464082FB085BBAB58932A3371A74CBD0F16403EDA0F43784DE3DC4C64700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ConsoleErrorLastMode
                              • String ID:
                              • API String ID: 953036326-0
                              • Opcode ID: 8b870ef09745b19d1218f5e34d4e5080e6ee1a886a16630b901c020aa05fcdcf
                              • Instruction ID: cafab04dd3c28486f44195ae64258a192d508c7526d08db036330af2d0119190
                              • Opcode Fuzzy Hash: 8b870ef09745b19d1218f5e34d4e5080e6ee1a886a16630b901c020aa05fcdcf
                              • Instruction Fuzzy Hash: EA91A072F1065889FB649FE994907ED3BA0B746F88F54412DDF0A67A95DB34CA83C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 063c2fcded254c65569d10fc533311c424a852e6975ab1428a992d71ab73b3cc
                              • Instruction ID: 21ad8f19d7b9dad995a43c876bde6ae222423d633ac94155a0df4573224eccdf
                              • Opcode Fuzzy Hash: 063c2fcded254c65569d10fc533311c424a852e6975ab1428a992d71ab73b3cc
                              • Instruction Fuzzy Hash: CEE01A71E0160486FF18AF71A8193A53260AB58B42F44403E881E46390EE3D828A8710
                              APIs
                              • _invalid_parameter_noinfo.LIBCMT ref: 000000013F7B992C
                                • Part of subcall function 000000013F7B01E4: IsProcessorFeaturePresent.KERNEL32 ref: 000000013F7B01ED
                                • Part of subcall function 000000013F7B01E4: GetCurrentProcess.KERNEL32(?,?,?,?,000000013F7B0193,?,?,?,?,?,000000013F7B007E), ref: 000000013F7B0212
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                              • String ID: *?$1ERs
                              • API String ID: 4036615347-1217088175
                              • Opcode ID: bb6ce0669fb04d6978b6cf1d65966d024c9f78935a0b3e22165152f1d96c2013
                              • Instruction ID: 8aa133006ab136f649369b69dcd2f812a6868f47801afd706a99cc5f5fe39a23
                              • Opcode Fuzzy Hash: bb6ce0669fb04d6978b6cf1d65966d024c9f78935a0b3e22165152f1d96c2013
                              • Instruction Fuzzy Hash: B851CD72F0065842FF619B2699017ED77A1A74ABE4F14453ADF2917B89EA38CA43C350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: __except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 1467352782-3733052814
                              • Opcode ID: ee578b2482a540c51527f164a6e0fed1b565d6d81eec71688779eae399c326ed
                              • Instruction ID: 62c8876fbac1af23789b0a3fc40ad2160a94f7745d74cb28ca456867a432ec1e
                              • Opcode Fuzzy Hash: ee578b2482a540c51527f164a6e0fed1b565d6d81eec71688779eae399c326ed
                              • Instruction Fuzzy Hash: A471F472E1468086EF618FA6D4907ED7BA1F344F89F1A8129DE4847B85D73CC69AC740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateFrameInfo__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2558813199-1018135373
                              • Opcode ID: acc7dda5a5dd4faa8ec8e35b2fff25dbec73345646dd51e33ca1b596789e392c
                              • Instruction ID: 9c49644f5b91a6f14efa4d62c84ba50eb2a393c57b44c9255c6de81fe79c7af9
                              • Opcode Fuzzy Hash: acc7dda5a5dd4faa8ec8e35b2fff25dbec73345646dd51e33ca1b596789e392c
                              • Instruction Fuzzy Hash: 52516D37A2474096FA20EF6AE4403AE77B4F788BA0F150139EB9D07B55CB38C566CB00
                              APIs
                              • _invalid_parameter_noinfo.LIBCMT ref: 000000013F7B61A6
                                • Part of subcall function 000000013F7B7738: HeapFree.KERNEL32 ref: 000000013F7B774E
                                • Part of subcall function 000000013F7B7738: GetLastError.KERNEL32(?,?,000000013F7B6677,000000013F7BC272,?,?,?,000000013F7BC2AF,?,?,00000000,000000013F7BC775,?,?,?,000000013F7BC6A7), ref: 000000013F7B7758
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast_invalid_parameter_noinfo
                              • String ID: C:\Users\user\Desktop\winrar-x64-701(1).exe$`0:
                              • API String ID: 2724796048-146855414
                              • Opcode ID: f30dbfa62e90bb3a960141424ea03e54bc9d125c453d9718452a60bd55966967
                              • Instruction ID: 47c7866080b6f53d7237f6651a5611805e6ffdd9322c00346902be1e233eddfc
                              • Opcode Fuzzy Hash: f30dbfa62e90bb3a960141424ea03e54bc9d125c453d9718452a60bd55966967
                              • Instruction Fuzzy Hash: D7415E36A00B5886FB24DF25A8413EC77A4E746794F95407DFF0A57B96DE38CA838300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Time$System$CurrentFileProcess
                              • String ID: .rartemp$1ERs
                              • API String ID: 1145848222-1920620648
                              • Opcode ID: 7d1f8f55dec5d5e6598c4753bbd8b80c4d61319c847012b0debec83761cead58
                              • Instruction ID: a9b966b76c35920b7d40148a006f642714d7663e6e61c5b2bd1392eeee08080a
                              • Opcode Fuzzy Hash: 7d1f8f55dec5d5e6598c4753bbd8b80c4d61319c847012b0debec83761cead58
                              • Instruction Fuzzy Hash: BB418032B01940A6EB54EB61D8923DD7761F7C8794F82513AEA0E977A6DE34CB1BC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Release
                              • String ID:
                              • API String ID: 1375353473-3916222277
                              • Opcode ID: 63c5ebe95d055cc5ab24ee0dc664498dd510615dc332dc8ef352fedcd7013a9f
                              • Instruction ID: b26ca1622340b6c542cdb5eafcb6a2811c0a3f2ccff0b769080a7eade402e213
                              • Opcode Fuzzy Hash: 63c5ebe95d055cc5ab24ee0dc664498dd510615dc332dc8ef352fedcd7013a9f
                              • Instruction Fuzzy Hash: 3831473660474286EB18DF12B81875AB7A1F799FD1F41403AEE4A43B58DE3CC64ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: 1ERs
                              • API String ID: 442123175-1577259171
                              • Opcode ID: 407f2926c8676f2302bafd9526a4335fc05db1dbfaef102cb7fa37c50fde64c5
                              • Instruction ID: 3bcd0e5e2cf7c38db5bd6055aef24feae37f72b5a784a5ef9d4649d72299f77a
                              • Opcode Fuzzy Hash: 407f2926c8676f2302bafd9526a4335fc05db1dbfaef102cb7fa37c50fde64c5
                              • Instruction Fuzzy Hash: 1731E672B15B4486EB109F69E8847C973B4FB49B80F554039EB4E87B54EB38CA63C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: 1ERs
                              • API String ID: 442123175-1577259171
                              • Opcode ID: 93ad03125a6552e2040d13b03488c7f9570f164afaf568a430d276798623ef8d
                              • Instruction ID: 14bb85ecbafe0ba49a59e389befcef4c9ca67e35820e1beb0de12ce7afe8cff0
                              • Opcode Fuzzy Hash: 93ad03125a6552e2040d13b03488c7f9570f164afaf568a430d276798623ef8d
                              • Instruction Fuzzy Hash: 7F31B472A15B848AEB109FA5E5847C977A0F359B80F55403AEB4E83755DB38CA57CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorFileLastModuleName
                              • String ID: 1ERs
                              • API String ID: 2776309574-1577259171
                              • Opcode ID: fac9f4fcde07ac9675be29e08b37c124507428438db66964a21da66529be29b5
                              • Instruction ID: 57d425f4364492dc4db6e35b52aeea12c1b77a218f66f6a4ebefc84b61304d2c
                              • Opcode Fuzzy Hash: fac9f4fcde07ac9675be29e08b37c124507428438db66964a21da66529be29b5
                              • Instruction Fuzzy Hash: DA317432A14B848AF7709B25E8447DE7BA4F386794F540129DBCC47B99DB38CA42CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Dialog
                              • String ID: 1ERs$RENAMEDLG
                              • API String ID: 1120787796-2488343091
                              • Opcode ID: af2bb5dfbc5e5501e7134edf2da09324063c46f3e98d560e4b232417743cb511
                              • Instruction ID: e1fbab2248dac70b38ba753def8701f710684d3e51e4d4e4017ba47cef7cf773
                              • Opcode Fuzzy Hash: af2bb5dfbc5e5501e7134edf2da09324063c46f3e98d560e4b232417743cb511
                              • Instruction Fuzzy Hash: C121D231E0874082FE909F52E5923F97291A795BC5F50413EED4D47BD6CE2ACA5BC300
                              APIs
                                • Part of subcall function 000000013F7985E8: GetProcAddress.KERNEL32(?,?,00000000,000000013F7988A4), ref: 000000013F798615
                                • Part of subcall function 000000013F7985E8: GetProcAddress.KERNEL32(?,?,00000000,000000013F7988A4), ref: 000000013F798629
                              • GetCurrentProcessId.KERNEL32 ref: 000000013F798919
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: AddressProc$CurrentProcess
                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                              • API String ID: 2190909847-396321323
                              • Opcode ID: 6d8220386a921977bc83dee32e9001b82bf0fdd35c8ad8174e51ed78770c5b4e
                              • Instruction ID: 2cb0d2d8515079e9468b93094c1e884c968a66b540f0fb8f1cfa748d5da01a10
                              • Opcode Fuzzy Hash: 6d8220386a921977bc83dee32e9001b82bf0fdd35c8ad8174e51ed78770c5b4e
                              • Instruction Fuzzy Hash: 34217F31A01A4080FE50CB16EA807EA77A0EB54BE5FC9023ED969477E5EB38C747C301
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                              • String ID: 1ERs
                              • API String ID: 1077098981-1577259171
                              • Opcode ID: 57e1a0af07258c8e1817781cf8ba4f0f067f30504d2ef8d4c883f0680f61e284
                              • Instruction ID: 9861736d2011580e4891687b699c0bc393d9ad125e9fb349c13458bf103786c9
                              • Opcode Fuzzy Hash: 57e1a0af07258c8e1817781cf8ba4f0f067f30504d2ef8d4c883f0680f61e284
                              • Instruction Fuzzy Hash: 8E312A32B04B408AFB20DFB0E4447ED33B5F788748F45412A9A4D5AA99EF78C25EC780
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FileMove
                              • String ID: 1ERs
                              • API String ID: 3562171763-1577259171
                              • Opcode ID: 1d17a2744ff37d8c884db1ea1d391afbeeede24ae573b948bd24093b200d9236
                              • Instruction ID: 5587143e52e23e6b6a71695f744ebbce0645f2d7dcee11e5f381f51f5748411a
                              • Opcode Fuzzy Hash: 1d17a2744ff37d8c884db1ea1d391afbeeede24ae573b948bd24093b200d9236
                              • Instruction Fuzzy Hash: C4212E32B1464052EA50EB61E4523EA7761FB85BC4F854139EE8D97B96EF28CB17C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Create$EventSemaphore
                              • String ID: Thread pool initialization failed.
                              • API String ID: 3431467744-2182114853
                              • Opcode ID: cf7e847ec42c39c98afed13f61a8aa811440edc33cdc0335b4f5739e4f6cac58
                              • Instruction ID: 7c9659e3b085b6030e8a116fa7f8effe2500477cd1995cca4fc2a3ad58bbfdf8
                              • Opcode Fuzzy Hash: cf7e847ec42c39c98afed13f61a8aa811440edc33cdc0335b4f5739e4f6cac58
                              • Instruction Fuzzy Hash: D021CF32B11B4486FB588F29E1983DA77A2F794748F54803CDB5907382DF7A926AC744
                              APIs
                              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F7824E7), ref: 000000013F7AC41C
                              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000013F7824E7), ref: 000000013F7AC462
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: c03d251433d90376995db402b47a83d553daa412ff273ed7f441ff3744a3506c
                              • Instruction ID: 558892ae49978c996c2c1a4d557e409b0af019d1b91d1324334f69ea7a4772a5
                              • Opcode Fuzzy Hash: c03d251433d90376995db402b47a83d553daa412ff273ed7f441ff3744a3506c
                              • Instruction Fuzzy Hash: 89111C32614B8082EF258F19F4403A97BA5F788B98F594229DE8D07769DF38C656CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: DirectoryRemove
                              • String ID: 1ERs
                              • API String ID: 597925465-1577259171
                              • Opcode ID: b997491ad4a48a3c594dd1061f4be5941c8119e626fde767970277d33b1e43f2
                              • Instruction ID: 46d593724ad81a91fd8139b37184184ceafc7135602767319337f9dfbe0f87a0
                              • Opcode Fuzzy Hash: b997491ad4a48a3c594dd1061f4be5941c8119e626fde767970277d33b1e43f2
                              • Instruction Fuzzy Hash: 1D014F32B04A4142EE50EB61F4523EA7370FB85B84F844139EA9D87696EF28CA56C600
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FormatInfoLocaleNumber
                              • String ID: 1ERs$2
                              • API String ID: 2169056816-3766158228
                              • Opcode ID: d7107cfca5a4afd32597e90ecfc509413890bc962788bf640ddc7de3c99321a0
                              • Instruction ID: 1049b324675199a16a72bbe5e07bbfc25c1cee85f10db57842d3f5cc30a71e94
                              • Opcode Fuzzy Hash: d7107cfca5a4afd32597e90ecfc509413890bc962788bf640ddc7de3c99321a0
                              • Instruction Fuzzy Hash: 74111832624B8481EA24CF51E4517CA73B5F788B84F81512AAA8D43B68DF38C257CB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ByteInfoLead
                              • String ID: 1ERs
                              • API String ID: 1254592819-1577259171
                              • Opcode ID: 9fe63a404204bb27164569fb0c7e8cbaedcee2e8eeccea48f9d39e8525d7c6f2
                              • Instruction ID: 93f4848eb47955544712f168c862a87fcc3369b828138df451f0850032240ad7
                              • Opcode Fuzzy Hash: 9fe63a404204bb27164569fb0c7e8cbaedcee2e8eeccea48f9d39e8525d7c6f2
                              • Instruction Fuzzy Hash: B2F09A32A0868086FB008B25F59538A77B0FB487C4F85513DE68B466A5DE2CC2AACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: Time$System$File
                              • String ID: 1ERs
                              • API String ID: 2838179519-1577259171
                              • Opcode ID: 30d39a170172742c9d1ce6ad9a523efe7992a70e7fba1bfdebc0fe7ccbc83a63
                              • Instruction ID: 5146e66ed02b46e077e3c165ba64976d260b1f68f8a8702e17544a7c0d7e8306
                              • Opcode Fuzzy Hash: 30d39a170172742c9d1ce6ad9a523efe7992a70e7fba1bfdebc0fe7ccbc83a63
                              • Instruction Fuzzy Hash: A1E0E572614A4581EE109F11F8513DA7370F79C7D5F841526A58F46765DE2CC75BCB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID: 1ERs$@
                              • API String ID: 1890195054-1584403332
                              • Opcode ID: feebbebb49dabba520efc801d04c4b00f1359dce04e423c62eea3d0669102393
                              • Instruction ID: e98cf31a1e539328f10aa90e30d2467a5449c6ce2ca599c8ac33b21e8d9b6826
                              • Opcode Fuzzy Hash: feebbebb49dabba520efc801d04c4b00f1359dce04e423c62eea3d0669102393
                              • Instruction Fuzzy Hash: 39E0ED76A2464482EF20DB55E45238A7361F798B88FD50119E68D03799DF3CD21ACF00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: ErrorLastObjectSingleWait
                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                              • API String ID: 1211598281-2248577382
                              • Opcode ID: 9928445313413648c54120f2c83774c4f876eb100ab0f055dbd8e3c4ab5f68aa
                              • Instruction ID: f76e30cef80ad081e8f71c2f8e2fc62bc8282a3862ce77df333bce3bb0880fb0
                              • Opcode Fuzzy Hash: 9928445313413648c54120f2c83774c4f876eb100ab0f055dbd8e3c4ab5f68aa
                              • Instruction Fuzzy Hash: 45E0EC76E1080082FA00AB39FCDA7D53661A7657B0FD0433DE43A826F29B68874BC701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.387611521.000000013F781000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F780000, based on PE: true
                              • Associated: 00000000.00000002.387608333.000000013F780000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387619715.000000013F7C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387634001.000000013F7DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387652828.000000013F7E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387662132.000000013F7EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.387667763.000000013F7EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13f780000_winrar-x64-701(1).jbxd
                              Similarity
                              • API ID: FindHandleModuleResource
                              • String ID: RTL
                              • API String ID: 3537982541-834975271
                              • Opcode ID: 3fe9193610b2b954ca747a9453040e17f244332993db366b631c7d02911bbf0e
                              • Instruction ID: f8551e873741bbb9d60495a5ef19dde04bb57c6f0ff9aeebf18558874e419ae8
                              • Opcode Fuzzy Hash: 3fe9193610b2b954ca747a9453040e17f244332993db366b631c7d02911bbf0e
                              • Instruction Fuzzy Hash: D4E01234F01B4083EE08A71178653D436B05759B81F98443CC847423A0D96C87468700

                              Execution Graph

                              Execution Coverage:14.7%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1814
                              Total number of Limit Nodes:12
                              execution_graph 20448 13fa522d0 20523 13fa41150 20448->20523 20451 13fa52336 20456 13fa52467 20451->20456 20457 13fa5234d 20451->20457 20511 13fa5233a 20451->20511 20452 13fa524de 20726 13fa41b9c 20452->20726 20455 13fa524ee 20472 13fa41b9c 49 API calls 20455->20472 20501 13fa52552 20455->20501 20730 13fa4db8c 20455->20730 20737 13fa46c18 20455->20737 20740 13fa46a1c 20455->20740 20538 13fa424dc 25 API calls 20456->20538 20459 13fa52355 20457->20459 20460 13fa52451 20457->20460 20463 13fa52361 20459->20463 20464 13fa52434 20459->20464 20465 13fa52459 EndDialog 20460->20465 20468 13fa52365 20463->20468 20469 13fa523a0 20463->20469 20758 13fa424dc 25 API calls 20464->20758 20465->20511 20466 13fa52473 20539 13fa42e10 20466->20539 20474 13fa52393 20468->20474 20475 13fa5236a 20468->20475 20469->20511 20749 13fa49fd8 20469->20749 20472->20455 20473 13fa52440 20759 13fa42720 25 API calls 20473->20759 20748 13fa43544 IsDlgButtonChecked GetDlgItem CheckDlgButton 20474->20748 20479 13fa52373 IsDlgButtonChecked 20475->20479 20475->20511 20747 13fa46480 DialogBoxParamW 20479->20747 20486 13fa523ba IsDlgButtonChecked 20488 13fa523d0 20486->20488 20486->20511 20487 13fa52493 20490 13fa524a1 20487->20490 20770 13fa529c8 84 API calls BuildCatchObjectHelperInternal 20487->20770 20491 13fa4db8c 49 API calls 20488->20491 20493 13fa41b9c 49 API calls 20490->20493 20494 13fa523da 20491->20494 20495 13fa524b1 20493->20495 20496 13fa41b9c 49 API calls 20494->20496 20771 13fa44fc4 20495->20771 20498 13fa523e6 20496->20498 20499 13fa4db8c 49 API calls 20498->20499 20500 13fa523f1 20499->20500 20502 13fa41b9c 49 API calls 20500->20502 20503 13fa4db8c 49 API calls 20501->20503 20505 13fa523fd 20502->20505 20504 13fa5255c 20503->20504 20506 13fa41b9c 49 API calls 20504->20506 20757 13fa51cc4 MessageBoxW 20505->20757 20508 13fa5256f 20506->20508 20509 13fa46c18 49 API calls 20508->20509 20510 13fa5257f 20509->20510 20512 13fa46a1c 49 API calls 20510->20512 20915 13fa543d0 20511->20915 20513 13fa5258c 20512->20513 20744 13fa41130 20513->20744 20524 13fa411e6 20523->20524 20525 13fa41161 20523->20525 20927 13fa4cccc GetWindowLongW SetWindowLongW 20524->20927 20526 13fa411e2 20525->20526 20528 13fa4116f 20525->20528 20529 13fa411bb 20525->20529 20526->20451 20526->20452 20526->20511 20530 13fa411ac 20528->20530 20534 13fa41177 20528->20534 20529->20526 20533 13fa411c5 20529->20533 20925 13fa4c7e0 69 API calls BuildCatchObjectHelperInternal 20530->20925 20532 13fa411aa 20532->20526 20926 13fa51568 80 API calls BuildCatchObjectHelperInternal 20533->20926 20534->20526 20536 13fa4118d 20534->20536 20924 13fa51568 80 API calls BuildCatchObjectHelperInternal 20536->20924 20538->20466 20540 13fa41b9c 49 API calls 20539->20540 20541 13fa42e4e 20540->20541 20542 13fa41b9c 49 API calls 20541->20542 20543 13fa42e5f 20542->20543 20928 13fa50440 20543->20928 20545 13fa42e70 20546 13fa41b9c 49 API calls 20545->20546 20547 13fa42e94 20546->20547 20548 13fa41b9c 49 API calls 20547->20548 20549 13fa42ea5 20548->20549 20550 13fa50440 75 API calls 20549->20550 20551 13fa42eb6 20550->20551 20552 13fa41b9c 49 API calls 20551->20552 20553 13fa42eda 20552->20553 20554 13fa41b9c 49 API calls 20553->20554 20555 13fa42eeb 20554->20555 20556 13fa50440 75 API calls 20555->20556 20557 13fa42efc 20556->20557 20558 13fa41b9c 49 API calls 20557->20558 20559 13fa42f20 20558->20559 20560 13fa41b9c 49 API calls 20559->20560 20561 13fa42f31 20560->20561 20562 13fa50440 75 API calls 20561->20562 20563 13fa42f42 20562->20563 20564 13fa41b9c 49 API calls 20563->20564 20565 13fa42f66 20564->20565 20566 13fa41b9c 49 API calls 20565->20566 20567 13fa42f77 20566->20567 20568 13fa50440 75 API calls 20567->20568 20569 13fa42f88 20568->20569 20570 13fa41b9c 49 API calls 20569->20570 20571 13fa42fac 20570->20571 20572 13fa41b9c 49 API calls 20571->20572 20573 13fa42fbd 20572->20573 20574 13fa50440 75 API calls 20573->20574 20575 13fa42fce 20574->20575 20576 13fa41b9c 49 API calls 20575->20576 20577 13fa42ff2 20576->20577 20578 13fa41b9c 49 API calls 20577->20578 20579 13fa43003 20578->20579 20580 13fa50440 75 API calls 20579->20580 20581 13fa43014 20580->20581 20582 13fa41b9c 49 API calls 20581->20582 20583 13fa43038 20582->20583 20584 13fa41b9c 49 API calls 20583->20584 20585 13fa43049 20584->20585 20586 13fa50440 75 API calls 20585->20586 20587 13fa4305a 20586->20587 20588 13fa41b9c 49 API calls 20587->20588 20589 13fa4307e 20588->20589 20590 13fa41b9c 49 API calls 20589->20590 20591 13fa4308f 20590->20591 20592 13fa50440 75 API calls 20591->20592 20593 13fa430a0 20592->20593 20594 13fa41b9c 49 API calls 20593->20594 20595 13fa430c4 20594->20595 20596 13fa41b9c 49 API calls 20595->20596 20597 13fa430d5 20596->20597 20598 13fa50440 75 API calls 20597->20598 20599 13fa430e6 20598->20599 20600 13fa41b9c 49 API calls 20599->20600 20601 13fa4310a 20600->20601 20602 13fa41b9c 49 API calls 20601->20602 20603 13fa4311b 20602->20603 20604 13fa50440 75 API calls 20603->20604 20605 13fa4312c 20604->20605 20606 13fa41b9c 49 API calls 20605->20606 20607 13fa43150 20606->20607 20608 13fa41b9c 49 API calls 20607->20608 20609 13fa43161 20608->20609 20610 13fa50440 75 API calls 20609->20610 20611 13fa43172 20610->20611 20612 13fa41b9c 49 API calls 20611->20612 20613 13fa43196 20612->20613 20614 13fa41b9c 49 API calls 20613->20614 20615 13fa431a7 20614->20615 20616 13fa50440 75 API calls 20615->20616 20617 13fa431b8 20616->20617 20618 13fa41b9c 49 API calls 20617->20618 20619 13fa431dc 20618->20619 20620 13fa41b9c 49 API calls 20619->20620 20621 13fa431ed 20620->20621 20622 13fa50440 75 API calls 20621->20622 20623 13fa431fe 20622->20623 20624 13fa41b9c 49 API calls 20623->20624 20625 13fa43222 20624->20625 20626 13fa41b9c 49 API calls 20625->20626 20627 13fa43233 20626->20627 20628 13fa50440 75 API calls 20627->20628 20629 13fa43244 20628->20629 20630 13fa41b9c 49 API calls 20629->20630 20631 13fa43268 20630->20631 20632 13fa41b9c 49 API calls 20631->20632 20633 13fa43279 20632->20633 20634 13fa50440 75 API calls 20633->20634 20635 13fa4328a 20634->20635 20636 13fa41b9c 49 API calls 20635->20636 20637 13fa432ae 20636->20637 20638 13fa41b9c 49 API calls 20637->20638 20639 13fa432bf 20638->20639 20640 13fa50440 75 API calls 20639->20640 20641 13fa432d0 20640->20641 20642 13fa41b9c 49 API calls 20641->20642 20643 13fa432f4 20642->20643 20644 13fa41b9c 49 API calls 20643->20644 20645 13fa43305 20644->20645 20646 13fa50440 75 API calls 20645->20646 20647 13fa43316 20646->20647 20648 13fa41b9c 49 API calls 20647->20648 20649 13fa4333e 20648->20649 20650 13fa41b9c 49 API calls 20649->20650 20651 13fa43352 20650->20651 20652 13fa50440 75 API calls 20651->20652 20653 13fa43363 20652->20653 20654 13fa41b9c 49 API calls 20653->20654 20655 13fa4338b 20654->20655 20656 13fa41b9c 49 API calls 20655->20656 20657 13fa43398 20656->20657 20658 13fa50440 75 API calls 20657->20658 20659 13fa433a9 20658->20659 20660 13fa41b9c 49 API calls 20659->20660 20661 13fa433d1 20660->20661 20662 13fa41b9c 49 API calls 20661->20662 20663 13fa433de 20662->20663 20664 13fa50440 75 API calls 20663->20664 20665 13fa433ef 20664->20665 20666 13fa41b9c 49 API calls 20665->20666 20667 13fa43417 20666->20667 20668 13fa41b9c 49 API calls 20667->20668 20669 13fa4342b 20668->20669 20670 13fa50440 75 API calls 20669->20670 20671 13fa4343c 20670->20671 20672 13fa41b9c 49 API calls 20671->20672 20673 13fa43464 20672->20673 20674 13fa41b9c 49 API calls 20673->20674 20675 13fa43471 20674->20675 20676 13fa50440 75 API calls 20675->20676 20677 13fa43482 20676->20677 20678 13fa41b9c 49 API calls 20677->20678 20679 13fa434aa 20678->20679 20680 13fa41b9c 49 API calls 20679->20680 20681 13fa434b7 20680->20681 20682 13fa50440 75 API calls 20681->20682 20683 13fa434c8 20682->20683 20684 13fa41b9c 49 API calls 20683->20684 20685 13fa434f0 20684->20685 20686 13fa41b9c 49 API calls 20685->20686 20687 13fa434fd 20686->20687 20688 13fa50440 75 API calls 20687->20688 20689 13fa4350e 20688->20689 20690 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20689->20690 20691 13fa4352e 20690->20691 20692 13fa462f8 20691->20692 20693 13fa46326 20692->20693 20694 13fa46339 20692->20694 20695 13fa49fd8 20 API calls 20693->20695 21259 13fa435d0 20694->21259 20698 13fa4632b 20695->20698 20698->20694 21229 13fa43b00 20698->21229 20702 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20703 13fa46469 20702->20703 20769 13fa52e94 49 API calls BuildCatchObjectHelperInternal 20703->20769 20706 13fa41b9c 49 API calls 20707 13fa46368 20706->20707 20708 13fa41b9c 49 API calls 20707->20708 20709 13fa46379 20708->20709 21344 13fa459f0 20709->21344 20711 13fa46387 20712 13fa424c0 2 API calls 20711->20712 20725 13fa4644d 20711->20725 20713 13fa463ad 20712->20713 20714 13fa41b9c 49 API calls 20713->20714 20715 13fa463be 20714->20715 20716 13fa41b9c 49 API calls 20715->20716 20717 13fa463cf 20716->20717 20718 13fa41b9c 49 API calls 20717->20718 20719 13fa463e0 20718->20719 21471 13fa50650 20719->21471 20721 13fa4642a 21474 13fa44660 20721->21474 20722 13fa463f6 20722->20721 20723 13fa485e0 53 API calls 20722->20723 20723->20721 20725->20702 20727 13fa41baa 20726->20727 22092 13fa41a74 20727->22092 20729 13fa41bc5 20729->20455 20731 13fa4db1c 20730->20731 22102 13fa4c498 20731->22102 20734 13fa4db77 20734->20455 20735 13fa4db43 LoadStringW 20735->20734 20736 13fa4db5f LoadStringW 20735->20736 20736->20734 22117 13fa46a64 20737->22117 20739 13fa46c38 20739->20455 20741 13fa46a8c 20740->20741 20743 13fa46ad5 20741->20743 22122 13fa46dd8 49 API calls 20741->22122 20743->20455 20745 13fa418c0 20744->20745 20746 13fa4113f SetDlgItemTextW 20745->20746 20747->20511 20748->20511 20750 13fa49ffd GetVersionExW 20749->20750 20751 13fa4a03d 20749->20751 20752 13fa4a028 20750->20752 20753 13fa4a017 20750->20753 20754 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20751->20754 20752->20751 20753->20752 22123 13fa49d7c 19 API calls 20753->22123 20755 13fa4a055 20754->20755 20755->20486 20755->20511 20758->20473 20760 13fa42911 20759->20760 22124 13fa410f0 GetDlgItem EnableWindow 20760->22124 20769->20487 20770->20490 20772 13fa46b9c 49 API calls 20771->20772 20773 13fa45036 20772->20773 20774 13fa46c60 49 API calls 20773->20774 20775 13fa4504a 20774->20775 20776 13fa41b9c 49 API calls 20775->20776 20777 13fa4505b 20776->20777 20778 13fa41b9c 49 API calls 20777->20778 20779 13fa45075 20778->20779 22125 13fa50758 20779->22125 20781 13fa4508d 20782 13fa41b9c 49 API calls 20781->20782 20783 13fa450dc 20782->20783 20784 13fa41b9c 49 API calls 20783->20784 20785 13fa450f4 20784->20785 20786 13fa50758 75 API calls 20785->20786 20787 13fa4510c 20786->20787 20881 13fa45516 20787->20881 22134 13fa460f8 20787->22134 20788 13fa460f8 76 API calls 20790 13fa4553d 20788->20790 20795 13fa41b9c 49 API calls 20790->20795 20797 13fa45881 20790->20797 20792 13fa41b9c 49 API calls 20794 13fa453d8 20792->20794 20793 13fa424c0 2 API calls 20796 13fa45186 20793->20796 20798 13fa41b9c 49 API calls 20794->20798 20799 13fa45566 20795->20799 20800 13fa424c0 2 API calls 20796->20800 20805 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20797->20805 20802 13fa453ea 20798->20802 20803 13fa50758 75 API calls 20799->20803 20801 13fa45190 20800->20801 20804 13fa41b9c 49 API calls 20801->20804 20806 13fa50388 75 API calls 20802->20806 20810 13fa45578 20803->20810 20807 13fa451a2 20804->20807 20808 13fa458a4 20805->20808 20819 13fa45400 20806->20819 20809 13fa41b9c 49 API calls 20807->20809 20808->20460 20811 13fa451b3 20809->20811 20812 13fa424c0 2 API calls 20810->20812 20890 13fa456b0 20810->20890 20813 13fa50674 76 API calls 20811->20813 20814 13fa4559b 20812->20814 20825 13fa451d1 20813->20825 20815 13fa41b9c 49 API calls 20814->20815 20820 13fa455b0 20815->20820 20816 13fa45871 20821 13fa50830 74 API calls 20816->20821 20817 13fa4573c 20818 13fa424c0 2 API calls 20817->20818 20822 13fa45745 20818->20822 20823 13fa50830 74 API calls 20819->20823 20819->20881 20824 13fa41b9c 49 API calls 20820->20824 20821->20797 20826 13fa41b9c 49 API calls 20822->20826 20827 13fa45439 20823->20827 20828 13fa455c2 20824->20828 20832 13fa41b9c 49 API calls 20825->20832 20829 13fa45753 20826->20829 20830 13fa41b9c 49 API calls 20827->20830 20831 13fa50650 76 API calls 20828->20831 20833 13fa41b9c 49 API calls 20829->20833 20834 13fa45458 20830->20834 20842 13fa455da 20831->20842 20835 13fa451f6 20832->20835 20836 13fa45765 20833->20836 20837 13fa4ab00 50 API calls 20834->20837 20838 13fa41b9c 49 API calls 20835->20838 20839 13fa50650 76 API calls 20836->20839 20840 13fa45467 20837->20840 20841 13fa45208 20838->20841 20847 13fa4577d 20839->20847 20844 13fa44f78 2 API calls 20840->20844 20843 13fa50674 76 API calls 20841->20843 20845 13fa41b9c 49 API calls 20842->20845 20849 13fa45227 20843->20849 20846 13fa4547b 20844->20846 20852 13fa45601 20845->20852 22159 13fa49aac 20846->22159 20851 13fa41b9c 49 API calls 20847->20851 20853 13fa424c0 2 API calls 20849->20853 20850 13fa45489 20855 13fa454e6 20850->20855 22166 13fa48840 20850->22166 20854 13fa457a4 20851->20854 20856 13fa41b9c 49 API calls 20852->20856 20865 13fa4562c 20852->20865 20858 13fa45246 20853->20858 22201 13fa50910 75 API calls BuildCatchObjectHelperInternal 20854->22201 20862 13fa41b9c 49 API calls 20855->20862 20856->20865 20861 13fa41b9c 49 API calls 20858->20861 20863 13fa45257 20861->20863 20864 13fa454fc 20862->20864 20869 13fa41b9c 49 API calls 20863->20869 20870 13fa50388 75 API calls 20864->20870 20866 13fa456bd 20865->20866 20867 13fa4568d 20865->20867 20874 13fa41b9c 49 API calls 20866->20874 20871 13fa41b9c 49 API calls 20867->20871 20873 13fa45269 20869->20873 20870->20881 20875 13fa45697 20871->20875 20877 13fa50674 76 API calls 20873->20877 20878 13fa456c7 20874->20878 20879 13fa50388 75 API calls 20875->20879 20887 13fa45289 20877->20887 20880 13fa41b9c 49 API calls 20878->20880 20879->20890 20883 13fa456d5 20880->20883 20881->20788 20882 13fa457bd 20885 13fa45833 20882->20885 20886 13fa457ea 20882->20886 20904 13fa45820 20882->20904 20884 13fa50388 75 API calls 20883->20884 20896 13fa456f2 20884->20896 20888 13fa41b9c 49 API calls 20885->20888 20889 13fa41b9c 49 API calls 20886->20889 22145 13fa50cc8 20887->22145 20892 13fa45844 20888->20892 20893 13fa457f7 20889->20893 20890->20797 20890->20816 20890->20817 20895 13fa50388 75 API calls 20892->20895 20897 13fa41b9c 49 API calls 20893->20897 20895->20904 20901 13fa50830 74 API calls 20896->20901 20899 13fa45809 20897->20899 20898 13fa41b9c 49 API calls 20900 13fa452bd 20898->20900 20902 13fa50388 75 API calls 20899->20902 20903 13fa50440 75 API calls 20900->20903 20901->20890 20902->20904 20905 13fa452cf 20903->20905 20904->20797 20906 13fa41b9c 49 API calls 20905->20906 20907 13fa452eb 20906->20907 20908 13fa45364 20907->20908 20909 13fa4531d 20907->20909 20910 13fa41b9c 49 API calls 20908->20910 20911 13fa41b9c 49 API calls 20909->20911 20914 13fa4533f 20910->20914 20912 13fa4532d 20911->20912 20913 13fa41b9c 49 API calls 20912->20913 20913->20914 20914->20792 20916 13fa543d9 20915->20916 20917 13fa5264d 20916->20917 20918 13fa54830 IsProcessorFeaturePresent 20916->20918 20919 13fa54848 20918->20919 22437 13fa54a24 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 20919->22437 20921 13fa5485b 22438 13fa547f8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20921->22438 20924->20532 20925->20532 20926->20526 20927->20526 20929 13fa50458 20928->20929 20937 13fa4fa54 20929->20937 20932 13fa50495 20932->20545 20934 13fa504a9 20934->20932 20935 13fa504b9 RegSetValueExW 20934->20935 20959 13fa50f30 20935->20959 20962 13fa424c0 20937->20962 20943 13fa4fac2 20944 13fa41b9c 49 API calls 20943->20944 20946 13fa4fad1 20944->20946 20945 13fa4faa8 20947 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20945->20947 20976 13fa4f8b8 49 API calls 20946->20976 20949 13fa4fb10 20947->20949 20949->20932 20950 13fa50dc4 20949->20950 20951 13fa424c0 2 API calls 20950->20951 20952 13fa50df4 20951->20952 21197 13fa50fb8 20952->21197 20954 13fa50e05 20955 13fa50e29 RegCreateKeyExW 20954->20955 20956 13fa50e0b 20954->20956 20955->20956 20957 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20956->20957 20958 13fa50e84 20957->20958 20958->20934 20960 13fa50f3d RegCloseKey 20959->20960 20961 13fa50f47 20959->20961 20960->20961 20961->20932 20963 13fa424ce 20962->20963 20977 13fa42454 20963->20977 20965 13fa424d3 20966 13fa4f9d4 20965->20966 20983 13fa4f974 20966->20983 20968 13fa4f9f1 20974 13fa4fa42 20968->20974 20986 13fa411f8 20968->20986 20974->20945 20975 13fa4e040 8 API calls BuildCatchObjectHelperInternal 20974->20975 20975->20943 20976->20945 20978 13fa42468 20977->20978 20979 13fa42499 20978->20979 20982 13fa4233c RtlPcToFileHeader RaiseException 20978->20982 20979->20965 20989 13fa4f350 20983->20989 20985 13fa4f991 20985->20968 20987 13fa41220 20986->20987 21196 13fa41288 49 API calls 20987->21196 20992 13fa4f39a 20989->20992 21010 13fa4f47a 20989->21010 20990 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 20991 13fa4f5d6 20990->20991 20991->20985 20993 13fa41b9c 49 API calls 20992->20993 20992->21010 20994 13fa4f3be 20993->20994 21017 13fa4ab00 20994->21017 20998 13fa4f3dd 21026 13fa485e0 20998->21026 21003 13fa4f430 21005 13fa485e0 53 API calls 21003->21005 21003->21010 21004 13fa41b9c 49 API calls 21006 13fa4f41f 21004->21006 21008 13fa4f450 21005->21008 21039 13fa4a3d4 21006->21039 21008->21010 21050 13fa48f98 66 API calls BuildCatchObjectHelperInternal 21008->21050 21010->20990 21011 13fa4f59f 21053 13fa50114 72 API calls BuildCatchObjectHelperInternal 21011->21053 21015 13fa411f8 49 API calls 21016 13fa4f476 __vcrt_FlsAlloc 21015->21016 21016->21010 21016->21011 21016->21015 21051 13fa5441c 4 API calls 2 library calls 21016->21051 21052 13fa4f5f4 RtlPcToFileHeader RaiseException 21016->21052 21054 13fa4aa48 21017->21054 21019 13fa4ab1f 21063 13fa4a2e8 21019->21063 21022 13fa46a24 21023 13fa46a3c 21022->21023 21024 13fa46a49 21023->21024 21089 13fa41fd4 47 API calls 21023->21089 21024->20998 21090 13fa48610 21026->21090 21029 13fa4a4f4 SHGetMalloc 21166 13fa47048 21029->21166 21031 13fa4a514 SHGetSpecialFolderLocation 21032 13fa4a52a 21031->21032 21038 13fa4a563 21031->21038 21168 13fa4a58c 21032->21168 21034 13fa4a537 21035 13fa4a3a8 49 API calls 21034->21035 21034->21038 21036 13fa4a54c 21035->21036 21037 13fa485e0 53 API calls 21036->21037 21037->21038 21038->21003 21038->21004 21175 13fa471c0 21039->21175 21041 13fa4a401 21042 13fa4a3a8 49 API calls 21041->21042 21043 13fa4a426 21041->21043 21042->21043 21044 13fa46a1c 49 API calls 21043->21044 21045 13fa4a433 21044->21045 21179 13fa47078 21045->21179 21047 13fa4a440 21048 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21047->21048 21049 13fa4a458 21048->21049 21049->21003 21050->21016 21051->21016 21052->21016 21053->21010 21067 13fa41ebc 21054->21067 21056 13fa4aa6f 21057 13fa4aacc 21056->21057 21061 13fa4aa72 21056->21061 21058 13fa41b9c 49 API calls 21057->21058 21059 13fa4aae0 21058->21059 21059->21019 21060 13fa4aa87 GetModuleFileNameW 21060->21061 21061->21057 21061->21060 21071 13fa41600 49 API calls 21061->21071 21064 13fa4a2f7 21063->21064 21078 13fa4acc4 21064->21078 21066 13fa4ab32 21066->21022 21068 13fa41eca 21067->21068 21072 13fa41e5c 21068->21072 21071->21056 21073 13fa41e76 21072->21073 21074 13fa41eaa 21073->21074 21075 13fa41ca8 49 API calls 21073->21075 21074->21056 21076 13fa41e83 21075->21076 21077 13fa41d10 47 API calls 21076->21077 21077->21074 21083 13fa4891c 21078->21083 21080 13fa4acf2 21082 13fa4ad11 21080->21082 21088 13fa4b1f8 49 API calls 21080->21088 21082->21066 21084 13fa48926 21083->21084 21085 13fa4892b 21083->21085 21084->21080 21086 13fa48960 49 API calls 21085->21086 21087 13fa48930 21086->21087 21088->21082 21089->21024 21091 13fa418c0 21090->21091 21092 13fa48631 GetFileAttributesW 21091->21092 21093 13fa48641 21092->21093 21100 13fa48672 21092->21100 21095 13fa424c0 2 API calls 21093->21095 21094 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21096 13fa485e9 21094->21096 21097 13fa4864b 21095->21097 21096->21003 21096->21029 21102 13fa4a7ac 21097->21102 21099 13fa48659 21099->21100 21101 13fa48667 GetFileAttributesW 21099->21101 21100->21094 21101->21100 21103 13fa4a7df 21102->21103 21104 13fa41b9c 49 API calls 21103->21104 21141 13fa4a7e5 21103->21141 21105 13fa4a7fc 21104->21105 21108 13fa4a8e8 21105->21108 21109 13fa4a80d 21105->21109 21106 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21107 13fa4aa2d 21106->21107 21107->21099 21110 13fa424c0 2 API calls 21108->21110 21112 13fa4a81e 21109->21112 21122 13fa4a844 21109->21122 21111 13fa4a8f1 21110->21111 21156 13fa4ab60 51 API calls 21111->21156 21145 13fa4aed8 49 API calls 21112->21145 21115 13fa4a82e 21116 13fa46a24 47 API calls 21115->21116 21116->21141 21117 13fa4a8fb 21118 13fa4a984 21117->21118 21119 13fa4a919 21117->21119 21117->21141 21160 13fa4aed8 49 API calls 21118->21160 21157 13fa4af9c 49 API calls 21119->21157 21121 13fa4a995 21124 13fa46a24 47 API calls 21121->21124 21122->21141 21146 13fa48858 49 API calls 21122->21146 21127 13fa4a9a1 21124->21127 21126 13fa4a933 21158 13fa4b014 49 API calls 21126->21158 21161 13fa4a3a8 21127->21161 21128 13fa4a892 21147 13fa46b9c 21128->21147 21131 13fa4a940 21159 13fa4af54 49 API calls 21131->21159 21136 13fa4a950 21138 13fa46a24 47 API calls 21136->21138 21137 13fa4a8b9 21139 13fa46a24 47 API calls 21137->21139 21138->21141 21139->21141 21141->21106 21142 13fa4a9f0 21143 13fa46a1c 49 API calls 21142->21143 21143->21141 21144 13fa4a9b3 21165 13fa48858 49 API calls 21144->21165 21145->21115 21146->21128 21148 13fa46bb9 21147->21148 21149 13fa46c10 21148->21149 21150 13fa46bdc 21148->21150 21151 13fa418c8 49 API calls 21149->21151 21153 13fa46ef0 RtlPcToFileHeader RaiseException 21150->21153 21152 13fa46c15 21151->21152 21154 13fa46bfe 21153->21154 21155 13fa48974 49 API calls 21154->21155 21155->21137 21156->21117 21157->21126 21158->21131 21159->21136 21160->21121 21162 13fa4a3b4 21161->21162 21163 13fa4a3cf 21162->21163 21164 13fa4acac 49 API calls 21162->21164 21163->21144 21164->21163 21165->21142 21167 13fa4701c 21166->21167 21167->21031 21169 13fa41ebc 49 API calls 21168->21169 21170 13fa4a5ab 21169->21170 21171 13fa4a5b6 SHGetPathFromIDListW 21170->21171 21172 13fa4a5d1 21171->21172 21173 13fa411f8 49 API calls 21172->21173 21174 13fa4a5dc 21173->21174 21174->21034 21176 13fa471ce 21175->21176 21183 13fa470d0 21176->21183 21178 13fa471e5 21178->21041 21181 13fa47089 21179->21181 21180 13fa470a2 21180->21047 21181->21180 21195 13fa41360 49 API calls 21181->21195 21184 13fa470f4 21183->21184 21185 13fa471ba 21184->21185 21188 13fa470fd 21184->21188 21194 13fa418c8 49 API calls std::_Xinvalid_argument 21185->21194 21192 13fa47120 21188->21192 21193 13fa4233c RtlPcToFileHeader RaiseException 21188->21193 21192->21178 21198 13fa50fe4 21197->21198 21200 13fa50fee 21197->21200 21199 13fa47078 49 API calls 21198->21199 21209 13fa50fec 21199->21209 21201 13fa50ffe 21200->21201 21202 13fa5103c 21200->21202 21205 13fa411f8 49 API calls 21201->21205 21222 13fa48858 49 API calls 21202->21222 21203 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21206 13fa51075 21203->21206 21210 13fa5100d 21205->21210 21206->20954 21207 13fa5104f 21208 13fa46a24 47 API calls 21207->21208 21208->21209 21209->21203 21210->21209 21214 13fa46c60 21210->21214 21213 13fa46a1c 49 API calls 21213->21209 21215 13fa46c7d 21214->21215 21216 13fa46cd1 21215->21216 21217 13fa46ca0 21215->21217 21227 13fa418c8 49 API calls std::_Xinvalid_argument 21216->21227 21223 13fa46ef0 21217->21223 21221 13fa46cbf 21221->21213 21222->21207 21224 13fa46f18 21223->21224 21226 13fa46f7a 21224->21226 21228 13fa4233c RtlPcToFileHeader RaiseException 21224->21228 21226->21221 21230 13fa43b30 21229->21230 21231 13fa43c8f 21230->21231 21233 13fa41b9c 49 API calls 21230->21233 21232 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21231->21232 21234 13fa43ca4 21232->21234 21235 13fa43b48 21233->21235 21234->20694 21236 13fa4ab00 50 API calls 21235->21236 21237 13fa43b56 21236->21237 21238 13fa485e0 53 API calls 21237->21238 21239 13fa43b69 21238->21239 21239->21231 21240 13fa41b9c 49 API calls 21239->21240 21241 13fa43b81 21240->21241 21242 13fa4ab00 50 API calls 21241->21242 21243 13fa43b8f 21242->21243 21244 13fa46a24 47 API calls 21243->21244 21245 13fa43b9c 21244->21245 21246 13fa485e0 53 API calls 21245->21246 21247 13fa43bb9 memcpy_s 21246->21247 21247->21231 21248 13fa43bdd 21247->21248 21249 13fa43beb ShellExecuteExW 21248->21249 21250 13fa43c48 21249->21250 21251 13fa43c2b 21249->21251 21253 13fa41b9c 49 API calls 21250->21253 21251->21250 21252 13fa43c2f WaitForSingleObject CloseHandle 21251->21252 21252->21250 21254 13fa43c58 21253->21254 21255 13fa41b9c 49 API calls 21254->21255 21256 13fa43c69 21255->21256 21257 13fa50440 75 API calls 21256->21257 21258 13fa43c7a 21257->21258 21258->21231 21260 13fa41b9c 49 API calls 21259->21260 21261 13fa43605 21260->21261 21262 13fa4ab00 50 API calls 21261->21262 21263 13fa43613 21262->21263 21264 13fa41b9c 49 API calls 21263->21264 21265 13fa4362d 21264->21265 21266 13fa41b9c 49 API calls 21265->21266 21267 13fa4363e 21266->21267 21640 13fa50388 21267->21640 21269 13fa4365a 21270 13fa41b9c 49 API calls 21269->21270 21297 13fa43674 21269->21297 21271 13fa4368b 21270->21271 21272 13fa41b9c 49 API calls 21271->21272 21273 13fa4369c 21272->21273 21275 13fa50388 75 API calls 21273->21275 21274 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21276 13fa437ec 21274->21276 21277 13fa436b1 21275->21277 21276->20725 21298 13fa43804 21276->21298 21278 13fa471c0 49 API calls 21277->21278 21279 13fa436d2 21278->21279 21280 13fa41b9c 49 API calls 21279->21280 21281 13fa436ec 21280->21281 21282 13fa41b9c 49 API calls 21281->21282 21283 13fa436fd 21282->21283 21284 13fa50388 75 API calls 21283->21284 21285 13fa43712 21284->21285 21286 13fa41b9c 49 API calls 21285->21286 21287 13fa4373f 21286->21287 21288 13fa41b9c 49 API calls 21287->21288 21289 13fa43750 21288->21289 21290 13fa50388 75 API calls 21289->21290 21291 13fa43765 21290->21291 21292 13fa41b9c 49 API calls 21291->21292 21293 13fa43789 21292->21293 21294 13fa41b9c 49 API calls 21293->21294 21295 13fa4379a 21294->21295 21296 13fa50388 75 API calls 21295->21296 21296->21297 21297->21274 21658 13fa43cbc 21298->21658 21301 13fa43cbc 98 API calls 21302 13fa43885 21301->21302 21871 13fa49cf0 21302->21871 21305 13fa43aab 21306 13fa43abf SHChangeNotify 21305->21306 21877 13fa50a94 81 API calls BuildCatchObjectHelperInternal 21305->21877 21310 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21306->21310 21307 13fa438a1 21312 13fa41b9c 49 API calls 21307->21312 21308 13fa438ee 21311 13fa41b9c 49 API calls 21308->21311 21313 13fa43ade 21310->21313 21314 13fa438ff 21311->21314 21315 13fa438ae 21312->21315 21337 13fa458c0 21313->21337 21317 13fa41b9c 49 API calls 21314->21317 21316 13fa41b9c 49 API calls 21315->21316 21318 13fa438c0 21316->21318 21319 13fa4390d 21317->21319 21876 13fa50910 75 API calls BuildCatchObjectHelperInternal 21318->21876 21321 13fa41b9c 49 API calls 21319->21321 21322 13fa4391f 21321->21322 21323 13fa50388 75 API calls 21322->21323 21325 13fa4393e 21323->21325 21324 13fa438d3 21324->21305 21326 13fa41b9c 49 API calls 21325->21326 21327 13fa4396c 21326->21327 21328 13fa41b9c 49 API calls 21327->21328 21329 13fa4397e 21328->21329 21330 13fa41b9c 49 API calls 21329->21330 21331 13fa43990 21330->21331 21332 13fa50388 75 API calls 21331->21332 21336 13fa439a8 21332->21336 21333 13fa43aa9 21333->21306 21334 13fa41b9c 49 API calls 21334->21336 21335 13fa50388 75 API calls 21335->21336 21336->21333 21336->21334 21336->21335 21342 13fa45907 21337->21342 21338 13fa459be 21339 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21338->21339 21340 13fa459ce 21339->21340 21340->20706 21341 13fa41b9c 49 API calls 21341->21342 21342->21338 21342->21341 21343 13fa44fc4 155 API calls 21342->21343 21343->21342 21345 13fa4db8c 49 API calls 21344->21345 21346 13fa45a2b 21345->21346 21347 13fa41b9c 49 API calls 21346->21347 21348 13fa45a38 21347->21348 21349 13fa41b9c 49 API calls 21348->21349 21350 13fa45a4d 21349->21350 21351 13fa41b9c 49 API calls 21350->21351 21352 13fa45a5f 21351->21352 21353 13fa50388 75 API calls 21352->21353 21354 13fa45a7e 21353->21354 21355 13fa41b9c 49 API calls 21354->21355 21470 13fa45aa5 21354->21470 21357 13fa45abd 21355->21357 21356 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21358 13fa460de 21356->21358 21359 13fa4ab00 50 API calls 21357->21359 21358->20711 21360 13fa45acc 21359->21360 21361 13fa46c60 49 API calls 21360->21361 21362 13fa45aec 21361->21362 21363 13fa46c18 49 API calls 21362->21363 21364 13fa45b00 21363->21364 21365 13fa41b9c 49 API calls 21364->21365 21366 13fa45b18 21365->21366 21367 13fa41b9c 49 API calls 21366->21367 21368 13fa45b2a 21367->21368 21369 13fa50388 75 API calls 21368->21369 21370 13fa45b41 21369->21370 21371 13fa45b63 21370->21371 21372 13fa45b80 21370->21372 21373 13fa46b9c 49 API calls 21371->21373 21374 13fa471c0 49 API calls 21372->21374 21375 13fa45b78 21373->21375 21374->21375 21376 13fa471c0 49 API calls 21375->21376 21377 13fa45ba3 21376->21377 21378 13fa45bf8 21377->21378 21379 13fa45bdd 21377->21379 21381 13fa471c0 49 API calls 21378->21381 21380 13fa46b9c 49 API calls 21379->21380 21382 13fa45bf2 21380->21382 21381->21382 21383 13fa471c0 49 API calls 21382->21383 21385 13fa45c19 21383->21385 21384 13fa424c0 2 API calls 21386 13fa45c50 21384->21386 21385->21384 21387 13fa41b9c 49 API calls 21386->21387 21388 13fa45c5e 21387->21388 21389 13fa41b9c 49 API calls 21388->21389 21390 13fa45c6c 21389->21390 21391 13fa41b9c 49 API calls 21390->21391 21392 13fa45c7e 21391->21392 21978 13fa50674 21392->21978 21394 13fa45c9f 21395 13fa41b9c 49 API calls 21394->21395 21406 13fa45d03 21394->21406 21397 13fa45cda 21395->21397 21396 13fa4db8c 49 API calls 21398 13fa45d23 21396->21398 21400 13fa41b9c 49 API calls 21397->21400 21399 13fa41b9c 49 API calls 21398->21399 21401 13fa45d30 21399->21401 21402 13fa45cec 21400->21402 21403 13fa41b9c 49 API calls 21401->21403 21404 13fa50388 75 API calls 21402->21404 21405 13fa45d3e 21403->21405 21404->21406 21407 13fa41b9c 49 API calls 21405->21407 21406->21396 21408 13fa45d50 21407->21408 21409 13fa50388 75 API calls 21408->21409 21410 13fa45d68 21409->21410 21411 13fa41b9c 49 API calls 21410->21411 21412 13fa45d96 21411->21412 21413 13fa41b9c 49 API calls 21412->21413 21414 13fa45da8 21413->21414 21415 13fa50388 75 API calls 21414->21415 21416 13fa45dbf 21415->21416 21417 13fa41b9c 49 API calls 21416->21417 21418 13fa45de2 21417->21418 21419 13fa41b9c 49 API calls 21418->21419 21420 13fa45df0 21419->21420 21421 13fa41b9c 49 API calls 21420->21421 21422 13fa45e02 21421->21422 21423 13fa50674 76 API calls 21422->21423 21424 13fa45e23 21423->21424 21426 13fa41b9c 49 API calls 21424->21426 21436 13fa45e87 21424->21436 21425 13fa41b9c 49 API calls 21427 13fa45eae 21425->21427 21428 13fa45e5e 21426->21428 21429 13fa41b9c 49 API calls 21427->21429 21430 13fa41b9c 49 API calls 21428->21430 21431 13fa45ebc 21429->21431 21432 13fa45e70 21430->21432 21433 13fa41b9c 49 API calls 21431->21433 21434 13fa50388 75 API calls 21432->21434 21435 13fa45ece 21433->21435 21434->21436 21437 13fa50388 75 API calls 21435->21437 21436->21425 21438 13fa45ee6 21437->21438 21439 13fa4db8c 49 API calls 21438->21439 21440 13fa45f11 21439->21440 21441 13fa41b9c 49 API calls 21440->21441 21442 13fa45f1e 21441->21442 21443 13fa41b9c 49 API calls 21442->21443 21444 13fa45f2c 21443->21444 21445 13fa41b9c 49 API calls 21444->21445 21446 13fa45f3e 21445->21446 21447 13fa50388 75 API calls 21446->21447 21448 13fa45f56 21447->21448 21449 13fa41b9c 49 API calls 21448->21449 21450 13fa45f84 21449->21450 21451 13fa41b9c 49 API calls 21450->21451 21452 13fa45f96 21451->21452 21453 13fa50388 75 API calls 21452->21453 21454 13fa45fad 21453->21454 21455 13fa41b9c 49 API calls 21454->21455 21456 13fa45fd0 21455->21456 21457 13fa41b9c 49 API calls 21456->21457 21458 13fa45fde 21457->21458 21459 13fa41b9c 49 API calls 21458->21459 21460 13fa45ff0 21459->21460 21461 13fa50674 76 API calls 21460->21461 21462 13fa46011 21461->21462 21463 13fa4608b SHChangeNotify 21462->21463 21464 13fa41b9c 49 API calls 21462->21464 21463->21470 21465 13fa4604c 21464->21465 21466 13fa41b9c 49 API calls 21465->21466 21467 13fa4605e 21466->21467 21468 13fa50388 75 API calls 21467->21468 21469 13fa46075 21468->21469 21469->21463 21470->21356 21472 13fa50674 76 API calls 21471->21472 21473 13fa5066e 21472->21473 21473->20722 21475 13fa446a6 21474->21475 21477 13fa41b9c 49 API calls 21475->21477 21495 13fa44eda 21475->21495 21476 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21479 13fa44f5c 21476->21479 21478 13fa446bf 21477->21478 21480 13fa4ab00 50 API calls 21478->21480 21479->20725 21481 13fa446ce 21480->21481 21482 13fa49cf0 9 API calls 21481->21482 21483 13fa446de 21482->21483 21484 13fa424c0 2 API calls 21483->21484 21485 13fa446f0 21484->21485 21486 13fa424c0 2 API calls 21485->21486 21487 13fa446fa 21486->21487 22034 13fa46230 21487->22034 21490 13fa41b9c 49 API calls 21492 13fa44719 21490->21492 21493 13fa4a3d4 49 API calls 21492->21493 21496 13fa4472c 21493->21496 21495->21476 21496->21495 22040 13fa461b4 SHGetFolderPathW 21496->22040 21497 13fa41b9c 49 API calls 21498 13fa44761 21497->21498 21499 13fa4a3d4 49 API calls 21498->21499 21500 13fa44774 21499->21500 21501 13fa44795 21500->21501 21502 13fa485e0 53 API calls 21500->21502 21503 13fa447b8 21501->21503 21504 13fa44869 21501->21504 21502->21501 21505 13fa41b9c 49 API calls 21503->21505 22045 13fa48728 21504->22045 21507 13fa447c8 21505->21507 21508 13fa4db8c 49 API calls 21507->21508 21510 13fa447db 21508->21510 21509 13fa424c0 2 API calls 21511 13fa4487a 21509->21511 21512 13fa41b9c 49 API calls 21510->21512 21513 13fa46230 50 API calls 21511->21513 21514 13fa447e7 21512->21514 21515 13fa44884 21513->21515 21516 13fa41b9c 49 API calls 21514->21516 21517 13fa424c0 2 API calls 21515->21517 21518 13fa44801 21516->21518 21519 13fa4488e 21517->21519 21521 13fa51a5c CoCreateInstance 21518->21521 21520 13fa461b4 50 API calls 21519->21520 21522 13fa448a4 21520->21522 21525 13fa44833 21521->21525 21523 13fa4a3a8 49 API calls 21522->21523 21524 13fa448ae 21523->21524 21526 13fa448c6 21524->21526 21527 13fa4492d 21524->21527 21525->21509 21529 13fa41b9c 49 API calls 21526->21529 21528 13fa48728 53 API calls 21527->21528 21538 13fa44917 21528->21538 21530 13fa448d6 21529->21530 21531 13fa4db8c 49 API calls 21530->21531 21532 13fa448e1 21531->21532 21533 13fa41b9c 49 API calls 21532->21533 21534 13fa448ed 21533->21534 21536 13fa51a5c CoCreateInstance 21534->21536 21535 13fa411f8 49 API calls 21537 13fa4499c 21535->21537 21536->21538 21539 13fa411f8 49 API calls 21537->21539 21538->21535 21540 13fa449af 21539->21540 21541 13fa411f8 49 API calls 21540->21541 21542 13fa449c2 21541->21542 21543 13fa4db8c 49 API calls 21542->21543 21544 13fa449cc 21543->21544 21545 13fa411f8 49 API calls 21544->21545 21546 13fa449db 21545->21546 21547 13fa411f8 49 API calls 21546->21547 21548 13fa449ee 21547->21548 21549 13fa4db8c 49 API calls 21548->21549 21550 13fa449f8 21549->21550 21551 13fa411f8 49 API calls 21550->21551 21552 13fa44a07 21551->21552 21553 13fa4db8c 49 API calls 21552->21553 21554 13fa44a11 21553->21554 21555 13fa411f8 49 API calls 21554->21555 21556 13fa44a20 21555->21556 21557 13fa4db8c 49 API calls 21556->21557 21558 13fa44a2a 21557->21558 21559 13fa411f8 49 API calls 21558->21559 21560 13fa44a39 21559->21560 21561 13fa461b4 50 API calls 21560->21561 21562 13fa44a46 21561->21562 21563 13fa4a3a8 49 API calls 21562->21563 21564 13fa44a50 21563->21564 21565 13fa44c79 21564->21565 21566 13fa44a6c 21564->21566 22069 13fa4623c 54 API calls BuildCatchObjectHelperInternal 21565->22069 21568 13fa44a7e 21566->21568 21569 13fa47078 49 API calls 21566->21569 21570 13fa485e0 53 API calls 21568->21570 21569->21568 21572 13fa44a88 21570->21572 21571 13fa461b4 50 API calls 21573 13fa44c92 21571->21573 21575 13fa424c0 2 API calls 21572->21575 21627 13fa44b26 21572->21627 21573->21495 21578 13fa4a3a8 49 API calls 21573->21578 21576 13fa44a9a 21575->21576 21579 13fa41b9c 49 API calls 21576->21579 21577 13fa44b3b 21582 13fa424c0 2 API calls 21577->21582 21587 13fa4a3d4 49 API calls 21577->21587 21593 13fa4a2e8 49 API calls 21577->21593 21600 13fa485e0 53 API calls 21577->21600 21614 13fa44c77 21577->21614 21616 13fa471c0 49 API calls 21577->21616 21618 13fa41b9c 49 API calls 21577->21618 21623 13fa4db8c 49 API calls 21577->21623 22060 13fa51a5c CoCreateInstance 21577->22060 21580 13fa44ca4 21578->21580 21581 13fa44aab 21579->21581 21584 13fa44cc5 21580->21584 21585 13fa44edc 21580->21585 21583 13fa4a3d4 49 API calls 21581->21583 21582->21577 21586 13fa44abf 21583->21586 21588 13fa485e0 53 API calls 21584->21588 22074 13fa4623c 54 API calls BuildCatchObjectHelperInternal 21585->22074 22062 13fa49958 RtlPcToFileHeader RaiseException 21586->22062 21587->21577 21590 13fa44cca 21588->21590 21591 13fa44d68 21590->21591 21594 13fa424c0 2 API calls 21590->21594 21596 13fa48528 56 API calls 21591->21596 21593->21577 21597 13fa44cdc 21594->21597 21595 13fa44ad2 22063 13fa499ac 49 API calls 21595->22063 21599 13fa44d7d 21596->21599 21601 13fa41b9c 49 API calls 21597->21601 21603 13fa485e0 53 API calls 21599->21603 21639 13fa44d9d 21599->21639 21600->21577 21604 13fa44ced 21601->21604 21602 13fa44ae1 22064 13fa44f78 21602->22064 21606 13fa44d8c 21603->21606 21608 13fa4a3d4 49 API calls 21604->21608 21611 13fa47078 49 API calls 21606->21611 21606->21639 21607 13fa424c0 2 API calls 21607->21639 21609 13fa44d01 21608->21609 22070 13fa49958 RtlPcToFileHeader RaiseException 21609->22070 21611->21639 21612 13fa4a3d4 49 API calls 21612->21639 21613 13fa44aed 21615 13fa44b10 21613->21615 21620 13fa48728 53 API calls 21613->21620 22067 13fa499c4 56 API calls BuildCatchObjectHelperInternal 21613->22067 21614->21571 22068 13fa49980 FindClose 21615->22068 21616->21577 21618->21577 21619 13fa44d14 22071 13fa499ac 49 API calls 21619->22071 21620->21613 21621 13fa4a2e8 49 API calls 21621->21639 21623->21577 21625 13fa44d23 21626 13fa44f78 2 API calls 21625->21626 21631 13fa44d2f 21626->21631 22057 13fa48528 21627->22057 21628 13fa485e0 53 API calls 21628->21639 21632 13fa44d52 21631->21632 21633 13fa48728 53 API calls 21631->21633 22072 13fa499c4 56 API calls BuildCatchObjectHelperInternal 21631->22072 22073 13fa49980 FindClose 21632->22073 21633->21631 21634 13fa471c0 49 API calls 21634->21639 21636 13fa4db8c 49 API calls 21636->21639 21637 13fa41b9c 49 API calls 21637->21639 21638 13fa51a5c CoCreateInstance 21638->21639 21639->21495 21639->21607 21639->21612 21639->21621 21639->21628 21639->21634 21639->21636 21639->21637 21639->21638 21648 13fa4fb1c 21640->21648 21643 13fa50dc4 50 API calls 21645 13fa503d2 21643->21645 21644 13fa503be 21644->21269 21645->21644 21646 13fa503fa RegSetValueExW 21645->21646 21647 13fa50f30 RegCloseKey 21646->21647 21647->21644 21649 13fa424c0 2 API calls 21648->21649 21650 13fa4fb52 21649->21650 21651 13fa4f9d4 72 API calls 21650->21651 21652 13fa4fb72 21651->21652 21654 13fa4fb76 21652->21654 21657 13fa4f8b8 49 API calls 21652->21657 21655 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21654->21655 21656 13fa4fbb7 21655->21656 21656->21643 21656->21644 21657->21654 21659 13fa44346 21658->21659 21660 13fa43cf2 21658->21660 21661 13fa4e30c 52 API calls 21659->21661 21662 13fa41b9c 49 API calls 21660->21662 21663 13fa44356 21661->21663 21664 13fa43cfb 21662->21664 21881 13fa50830 21663->21881 21666 13fa4ab00 50 API calls 21664->21666 21668 13fa43d09 21666->21668 21667 13fa44369 21670 13fa4e30c 52 API calls 21667->21670 21669 13fa485e0 53 API calls 21668->21669 21674 13fa43d1c 21669->21674 21671 13fa44386 21670->21671 21672 13fa50830 74 API calls 21671->21672 21679 13fa44392 21672->21679 21673 13fa41b9c 49 API calls 21675 13fa43e5f 21673->21675 21676 13fa41b9c 49 API calls 21674->21676 21739 13fa43e2e 21674->21739 21677 13fa41b9c 49 API calls 21675->21677 21680 13fa43d4a 21676->21680 21678 13fa43e6c 21677->21678 21681 13fa4e30c 52 API calls 21678->21681 21684 13fa4e30c 52 API calls 21679->21684 21682 13fa41b9c 49 API calls 21680->21682 21683 13fa43e80 21681->21683 21685 13fa43d57 21682->21685 21686 13fa50388 75 API calls 21683->21686 21687 13fa443b9 21684->21687 21878 13fa4e30c 21685->21878 21695 13fa43e94 21686->21695 21689 13fa50830 74 API calls 21687->21689 21691 13fa443c5 21689->21691 21693 13fa4e30c 52 API calls 21691->21693 21694 13fa443e2 21693->21694 21696 13fa50830 74 API calls 21694->21696 21697 13fa41b9c 49 API calls 21695->21697 21702 13fa443ee 21696->21702 21699 13fa43ebe 21697->21699 21701 13fa41b9c 49 API calls 21699->21701 21704 13fa43ecb 21701->21704 21708 13fa4e30c 52 API calls 21702->21708 21706 13fa4e30c 52 API calls 21704->21706 21707 13fa43edf 21706->21707 21710 13fa50388 75 API calls 21707->21710 21711 13fa44412 21708->21711 21719 13fa43ef3 21710->21719 21713 13fa50830 74 API calls 21711->21713 21714 13fa4441e 21713->21714 21716 13fa4e30c 52 API calls 21714->21716 21717 13fa4443b 21716->21717 21720 13fa50830 74 API calls 21717->21720 21722 13fa41b9c 49 API calls 21719->21722 21723 13fa44447 21720->21723 21726 13fa43f1d 21722->21726 21729 13fa4e30c 52 API calls 21723->21729 21728 13fa41b9c 49 API calls 21726->21728 21731 13fa43f2a 21728->21731 21732 13fa44464 21729->21732 21734 13fa4e30c 52 API calls 21731->21734 21735 13fa50830 74 API calls 21732->21735 21736 13fa43f3e 21734->21736 21737 13fa44470 21735->21737 21738 13fa50388 75 API calls 21736->21738 21740 13fa41b9c 49 API calls 21737->21740 21744 13fa43f52 21738->21744 21739->21673 21741 13fa4448a 21740->21741 21742 13fa50830 74 API calls 21741->21742 21743 13fa44497 21742->21743 21747 13fa41b9c 49 API calls 21743->21747 21745 13fa41b9c 49 API calls 21744->21745 21746 13fa43f7c 21745->21746 21748 13fa41b9c 49 API calls 21746->21748 21749 13fa444b1 21747->21749 21750 13fa43f89 21748->21750 21751 13fa50830 74 API calls 21749->21751 21752 13fa41b9c 49 API calls 21750->21752 21753 13fa444be 21751->21753 21754 13fa43f9a 21752->21754 21756 13fa4e30c 52 API calls 21753->21756 21755 13fa50388 75 API calls 21754->21755 21760 13fa43faf 21755->21760 21757 13fa444db 21756->21757 21758 13fa50830 74 API calls 21757->21758 21759 13fa444e7 21758->21759 21761 13fa4e30c 52 API calls 21759->21761 21762 13fa41b9c 49 API calls 21760->21762 21763 13fa44504 21761->21763 21764 13fa43fd9 21762->21764 21765 13fa50830 74 API calls 21763->21765 21766 13fa41b9c 49 API calls 21764->21766 21767 13fa44510 21765->21767 21768 13fa43fe6 21766->21768 21771 13fa41b9c 49 API calls 21767->21771 21769 13fa41b9c 49 API calls 21768->21769 21770 13fa43ff7 21769->21770 21772 13fa50388 75 API calls 21770->21772 21773 13fa44526 21771->21773 21777 13fa4400c 21772->21777 21774 13fa41b9c 49 API calls 21773->21774 21775 13fa44537 21774->21775 21895 13fa50910 75 API calls BuildCatchObjectHelperInternal 21775->21895 21779 13fa41b9c 49 API calls 21777->21779 21778 13fa44549 21781 13fa44575 21778->21781 21783 13fa49fd8 20 API calls 21778->21783 21780 13fa44036 21779->21780 21782 13fa41b9c 49 API calls 21780->21782 21784 13fa4e30c 52 API calls 21781->21784 21785 13fa44043 21782->21785 21786 13fa44566 21783->21786 21787 13fa44588 21784->21787 21789 13fa4e30c 52 API calls 21785->21789 21786->21781 21792 13fa43b00 78 API calls 21786->21792 21788 13fa50830 74 API calls 21787->21788 21790 13fa44594 21788->21790 21791 13fa44057 21789->21791 21794 13fa4e30c 52 API calls 21790->21794 21793 13fa50388 75 API calls 21791->21793 21792->21781 21798 13fa4406b 21793->21798 21795 13fa445b1 21794->21795 21796 13fa50830 74 API calls 21795->21796 21797 13fa445bd 21796->21797 21800 13fa4e30c 52 API calls 21797->21800 21799 13fa41b9c 49 API calls 21798->21799 21801 13fa44095 21799->21801 21802 13fa445da 21800->21802 21803 13fa41b9c 49 API calls 21801->21803 21804 13fa50830 74 API calls 21802->21804 21805 13fa440a2 21803->21805 21806 13fa445e6 21804->21806 21807 13fa4e30c 52 API calls 21805->21807 21809 13fa4e30c 52 API calls 21806->21809 21808 13fa440b6 21807->21808 21810 13fa50388 75 API calls 21808->21810 21811 13fa44603 21809->21811 21816 13fa440ca 21810->21816 21812 13fa50830 74 API calls 21811->21812 21813 13fa4460f 21812->21813 21814 13fa4e30c 52 API calls 21813->21814 21815 13fa4462c 21814->21815 21817 13fa50830 74 API calls 21815->21817 21818 13fa41b9c 49 API calls 21816->21818 21823 13fa44328 21817->21823 21819 13fa440f8 21818->21819 21820 13fa41b9c 49 API calls 21819->21820 21821 13fa44105 21820->21821 21822 13fa41b9c 49 API calls 21821->21822 21824 13fa44116 21822->21824 21825 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21823->21825 21826 13fa50388 75 API calls 21824->21826 21827 13fa4385d 21825->21827 21828 13fa4412f 21826->21828 21827->21301 21829 13fa49fd8 20 API calls 21828->21829 21830 13fa4415c 21829->21830 21830->21781 21831 13fa4416b 21830->21831 21832 13fa41b9c 49 API calls 21831->21832 21833 13fa44177 21832->21833 21834 13fa41b9c 49 API calls 21833->21834 21835 13fa44184 21834->21835 21836 13fa4e30c 52 API calls 21835->21836 21837 13fa44198 21836->21837 21838 13fa50388 75 API calls 21837->21838 21839 13fa441ac 21838->21839 21840 13fa41b9c 49 API calls 21839->21840 21841 13fa441d6 21840->21841 21842 13fa41b9c 49 API calls 21841->21842 21843 13fa441e3 21842->21843 21844 13fa4e30c 52 API calls 21843->21844 21845 13fa441f7 21844->21845 21846 13fa50388 75 API calls 21845->21846 21847 13fa4420b 21846->21847 21848 13fa41b9c 49 API calls 21847->21848 21849 13fa44235 21848->21849 21850 13fa41b9c 49 API calls 21849->21850 21851 13fa44242 21850->21851 21852 13fa4e30c 52 API calls 21851->21852 21853 13fa44256 21852->21853 21854 13fa50388 75 API calls 21853->21854 21855 13fa4426a 21854->21855 21856 13fa41b9c 49 API calls 21855->21856 21857 13fa44294 21856->21857 21858 13fa41b9c 49 API calls 21857->21858 21859 13fa442a1 21858->21859 21860 13fa4e30c 52 API calls 21859->21860 21861 13fa442b5 21860->21861 21862 13fa50388 75 API calls 21861->21862 21863 13fa442c9 21862->21863 21864 13fa41b9c 49 API calls 21863->21864 21865 13fa442f3 21864->21865 21866 13fa41b9c 49 API calls 21865->21866 21867 13fa44300 21866->21867 21868 13fa4e30c 52 API calls 21867->21868 21869 13fa44314 21868->21869 21870 13fa50388 75 API calls 21869->21870 21870->21823 21872 13fa49d14 GetVersionExW 21871->21872 21873 13fa49d47 21871->21873 21872->21873 21874 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21873->21874 21875 13fa4388a 21874->21875 21875->21305 21875->21307 21875->21308 21876->21324 21877->21306 21896 13fa4e34c 21878->21896 21882 13fa41b9c 49 API calls 21881->21882 21883 13fa50865 21882->21883 21968 13fa4fe34 21883->21968 21885 13fa50876 21886 13fa508d3 21885->21886 21888 13fa424c0 2 API calls 21885->21888 21887 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21886->21887 21889 13fa508ea 21887->21889 21890 13fa50890 21888->21890 21889->21667 21891 13fa50fb8 49 API calls 21890->21891 21892 13fa508a1 21891->21892 21892->21886 21893 13fa508c1 RegDeleteKeyW 21892->21893 21894 13fa508c9 RegDeleteKeyExW 21892->21894 21893->21886 21894->21886 21895->21778 21897 13fa424c0 2 API calls 21896->21897 21898 13fa4e380 21897->21898 21910 13fa4e234 21898->21910 21911 13fa4e2f3 21910->21911 21913 13fa4e262 21910->21913 21914 13fa4e794 21911->21914 21912 13fa46958 49 API calls 21912->21913 21913->21911 21913->21912 21915 13fa4e7a2 21914->21915 21923 13fa4e6a0 21915->21923 21924 13fa4e6c3 21923->21924 21925 13fa4e78b 21924->21925 21927 13fa4e6d2 21924->21927 21934 13fa418c8 49 API calls std::_Xinvalid_argument 21925->21934 21933 13fa4233c RtlPcToFileHeader RaiseException 21927->21933 21969 13fa424c0 2 API calls 21968->21969 21970 13fa4fe61 21969->21970 21971 13fa4f9d4 72 API calls 21970->21971 21976 13fa4fe81 21971->21976 21972 13fa4fe85 21973 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 21972->21973 21974 13fa4ff35 21973->21974 21974->21885 21976->21972 21977 13fa510cc 49 API calls 21976->21977 21977->21976 21987 13fa50a38 21978->21987 21980 13fa5069e 21981 13fa41ebc 49 API calls 21980->21981 21982 13fa506d8 21981->21982 21992 13fa50534 21982->21992 21984 13fa50716 21985 13fa411f8 49 API calls 21984->21985 21986 13fa5072d 21985->21986 21986->21394 22000 13fa4ff40 21987->22000 21990 13fa50a6b 21990->21980 22022 13fa4fc20 21992->22022 21995 13fa50e90 50 API calls 21996 13fa5059c 21995->21996 21997 13fa505ba RegQueryValueExW 21996->21997 21999 13fa5058a 21996->21999 21998 13fa50f30 RegCloseKey 21997->21998 21998->21999 21999->21984 22001 13fa424c0 2 API calls 22000->22001 22002 13fa4ff77 22001->22002 22003 13fa4f9d4 72 API calls 22002->22003 22004 13fa4ff97 22003->22004 22005 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22004->22005 22006 13fa4fffd 22005->22006 22006->21990 22007 13fa509d0 22006->22007 22013 13fa50e90 22007->22013 22009 13fa509e2 22010 13fa50a1e 22009->22010 22011 13fa509f2 RegQueryValueExW 22009->22011 22010->21990 22012 13fa50f30 RegCloseKey 22011->22012 22012->22010 22014 13fa424c0 2 API calls 22013->22014 22015 13fa50eb9 22014->22015 22016 13fa50fb8 49 API calls 22015->22016 22017 13fa50eca 22016->22017 22018 13fa50ee5 RegOpenKeyExW 22017->22018 22019 13fa50f02 22017->22019 22018->22019 22020 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22019->22020 22021 13fa50f21 22020->22021 22021->22009 22023 13fa424c0 2 API calls 22022->22023 22024 13fa4fc59 22023->22024 22025 13fa4f9d4 72 API calls 22024->22025 22026 13fa4fc79 22025->22026 22027 13fa424c0 2 API calls 22026->22027 22032 13fa4fc7d 22026->22032 22028 13fa4fcab 22027->22028 22033 13fa4fbc8 49 API calls 22028->22033 22030 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22031 13fa4fd13 22030->22031 22031->21995 22031->21999 22032->22030 22033->22032 22035 13fa461b4 SHGetFolderPathW 22034->22035 22036 13fa411f8 49 API calls 22035->22036 22037 13fa4620a 22036->22037 22038 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22037->22038 22039 13fa44704 22038->22039 22039->21490 22039->21496 22041 13fa411f8 49 API calls 22040->22041 22042 13fa4620a 22041->22042 22043 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22042->22043 22044 13fa44750 22043->22044 22044->21497 22046 13fa418c0 22045->22046 22047 13fa48749 DeleteFileW 22046->22047 22048 13fa4875b 22047->22048 22055 13fa4878f 22047->22055 22050 13fa424c0 2 API calls 22048->22050 22049 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22051 13fa487a8 22049->22051 22052 13fa48765 22050->22052 22051->21525 22053 13fa4a7ac 51 API calls 22052->22053 22054 13fa48773 22053->22054 22054->22055 22056 13fa48781 DeleteFileW 22054->22056 22055->22049 22056->22055 22075 13fa4844c 22057->22075 22061 13fa51aaf 22060->22061 22061->21577 22062->21595 22063->21602 22065 13fa424c0 2 API calls 22064->22065 22066 13fa44f8a 22065->22066 22066->21613 22067->21613 22069->21614 22070->21619 22071->21625 22072->21631 22074->21495 22077 13fa48472 22075->22077 22076 13fa48499 22078 13fa485e0 53 API calls 22076->22078 22077->22076 22079 13fa48486 CreateDirectoryW 22077->22079 22080 13fa484a7 22078->22080 22079->22076 22081 13fa484ec 22079->22081 22082 13fa484f0 GetLastError 22080->22082 22083 13fa424c0 2 API calls 22080->22083 22085 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22081->22085 22082->22081 22084 13fa484b5 22083->22084 22086 13fa4a7ac 51 API calls 22084->22086 22087 13fa48518 22085->22087 22088 13fa484c3 22086->22088 22087->21577 22089 13fa484c7 22088->22089 22090 13fa484de 22088->22090 22091 13fa484d1 CreateDirectoryW 22089->22091 22090->22081 22090->22082 22091->22090 22093 13fa41a96 22092->22093 22094 13fa41b83 22093->22094 22097 13fa41a9f 22093->22097 22101 13fa418c8 49 API calls std::_Xinvalid_argument 22094->22101 22099 13fa41ac4 22097->22099 22100 13fa4233c RtlPcToFileHeader RaiseException 22097->22100 22099->20729 22109 13fa4c338 22102->22109 22105 13fa4c4dc 22107 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22105->22107 22108 13fa4c4f5 22107->22108 22108->20734 22108->20735 22112 13fa4c360 22109->22112 22110 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22111 13fa4c3ff 22110->22111 22111->22105 22115 13fa4c408 47 API calls 22111->22115 22114 13fa4c3c5 22112->22114 22116 13fa60600 47 API calls 2 library calls 22112->22116 22114->22110 22115->22105 22116->22114 22118 13fa46a73 22117->22118 22120 13fa46ad5 22118->22120 22121 13fa46dd8 49 API calls 22118->22121 22120->20739 22121->22120 22122->20743 22123->20752 22126 13fa50768 22125->22126 22202 13fa4fe04 22126->22202 22129 13fa50e90 50 API calls 22130 13fa507c0 22129->22130 22131 13fa507d8 RegQueryValueExW 22130->22131 22133 13fa5080a 22130->22133 22132 13fa50f30 RegCloseKey 22131->22132 22132->22133 22133->20781 22135 13fa41b9c 49 API calls 22134->22135 22136 13fa4612e 22135->22136 22137 13fa50534 75 API calls 22136->22137 22138 13fa46155 22137->22138 22217 13fa4f01c CompareStringW 22138->22217 22140 13fa46171 22141 13fa46188 22140->22141 22218 13fa4f01c CompareStringW 22140->22218 22143 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22141->22143 22144 13fa45175 22143->22144 22144->20793 22144->20914 22146 13fa41b9c 49 API calls 22145->22146 22147 13fa50d00 22146->22147 22219 13fa50010 22147->22219 22149 13fa50d18 22150 13fa50d2a 22149->22150 22151 13fa424c0 2 API calls 22149->22151 22153 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22150->22153 22152 13fa50d3a 22151->22152 22154 13fa50fb8 49 API calls 22152->22154 22155 13fa452a9 22153->22155 22156 13fa50d52 22154->22156 22155->20898 22156->22150 22157 13fa50d60 RegOpenKeyExW 22156->22157 22158 13fa50f30 RegCloseKey 22157->22158 22158->22150 22229 13fa4a30c 22159->22229 22162 13fa49af3 22162->20850 22165 13fa49ade FindClose 22165->22162 22167 13fa48849 22166->22167 22168 13fa5ff3a 22167->22168 22170 13fa5ff6d 22167->22170 22275 13fa62c08 11 API calls memcpy_s 22168->22275 22172 13fa5ff73 22170->22172 22173 13fa5ff80 22170->22173 22171 13fa5ff3f 22276 13fa5b104 47 API calls _invalid_parameter_noinfo_noreturn 22171->22276 22277 13fa62c08 11 API calls memcpy_s 22172->22277 22263 13fa65984 22173->22263 22177 13fa454ae 22177->20855 22185 13fa5f860 22177->22185 22186 13fa5f890 22185->22186 22412 13fa5f5b0 22186->22412 22190 13fa5f8d4 22191 13fa454de 22190->22191 22420 13fa5ad18 47 API calls 2 library calls 22190->22420 22193 13fa5fa28 22191->22193 22194 13fa5fa58 22193->22194 22423 13fa5f904 22194->22423 22196 13fa5fa71 22197 13fa5fa96 22196->22197 22433 13fa5ad18 47 API calls 2 library calls 22196->22433 22200 13fa5faab 22197->22200 22434 13fa5ad18 47 API calls 2 library calls 22197->22434 22200->20855 22201->20882 22205 13fa4fd28 22202->22205 22206 13fa424c0 2 API calls 22205->22206 22207 13fa4fd63 22206->22207 22208 13fa4f9d4 72 API calls 22207->22208 22209 13fa4fd7f 22208->22209 22210 13fa424c0 2 API calls 22209->22210 22215 13fa4fd83 22209->22215 22211 13fa4fda1 22210->22211 22216 13fa4fbc8 49 API calls 22211->22216 22213 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22214 13fa4fdf5 22213->22214 22214->22129 22214->22133 22215->22213 22216->22215 22217->22140 22218->22141 22220 13fa424c0 2 API calls 22219->22220 22221 13fa50049 22220->22221 22222 13fa4f9d4 72 API calls 22221->22222 22226 13fa5006d 22222->22226 22223 13fa50075 22224 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22223->22224 22225 13fa500fd 22224->22225 22225->22149 22226->22223 22228 13fa510cc 49 API calls 22226->22228 22228->22226 22230 13fa4a31a 22229->22230 22255 13fa4abdc 22230->22255 22233 13fa49b10 22234 13fa49bd9 FindNextFileW 22233->22234 22235 13fa49b4b 22233->22235 22236 13fa49be8 GetLastError 22234->22236 22237 13fa49bfa 22234->22237 22238 13fa49b53 FindFirstFileW 22235->22238 22254 13fa49bc6 22236->22254 22239 13fa47078 49 API calls 22237->22239 22238->22237 22240 13fa49b6e 22238->22240 22241 13fa49c05 22239->22241 22242 13fa424c0 2 API calls 22240->22242 22244 13fa41b9c 49 API calls 22241->22244 22245 13fa49b78 22242->22245 22243 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22246 13fa49ad8 22243->22246 22247 13fa49c14 22244->22247 22248 13fa4a7ac 51 API calls 22245->22248 22246->22162 22246->22165 22249 13fa4a2e8 49 API calls 22247->22249 22250 13fa49b86 22248->22250 22249->22254 22251 13fa49ba5 22250->22251 22252 13fa49b94 FindFirstFileW 22250->22252 22251->22237 22253 13fa49bb5 GetLastError 22251->22253 22252->22251 22253->22254 22254->22243 22256 13fa4abef 22255->22256 22259 13fa4b068 22256->22259 22262 13fa4b09f 22259->22262 22260 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22261 13fa49ac5 22260->22261 22261->22162 22261->22233 22262->22260 22280 13fa66708 EnterCriticalSection 22263->22280 22275->22171 22276->22177 22277->22177 22413 13fa5f5d0 22412->22413 22414 13fa5f5fd 22412->22414 22413->22414 22415 13fa5f605 22413->22415 22416 13fa5f5da 22413->22416 22414->22190 22419 13fa5ad18 47 API calls 2 library calls 22414->22419 22422 13fa5f4f0 78 API calls 22415->22422 22421 13fa5b038 47 API calls _invalid_parameter_noinfo_noreturn 22416->22421 22419->22190 22420->22191 22421->22414 22422->22414 22424 13fa5f94d 22423->22424 22425 13fa5f91f 22423->22425 22432 13fa5f93f 22424->22432 22435 13fa6408c EnterCriticalSection 22424->22435 22436 13fa5b038 47 API calls _invalid_parameter_noinfo_noreturn 22425->22436 22432->22196 22433->22197 22434->22200 22436->22432 22437->20921 22439 13fa54e2c 22464 13fa545e4 22439->22464 22442 13fa54f78 22526 13fa55298 7 API calls 2 library calls 22442->22526 22443 13fa54e48 __scrt_acquire_startup_lock 22445 13fa54f82 22443->22445 22448 13fa54e66 22443->22448 22527 13fa55298 7 API calls 2 library calls 22445->22527 22447 13fa54f8d BuildCatchObjectHelperInternal 22449 13fa54e8b 22448->22449 22452 13fa54ea8 __scrt_release_startup_lock 22448->22452 22472 13fa61f64 22448->22472 22451 13fa54f11 22476 13fa553e4 22451->22476 22452->22451 22523 13fa61268 47 API calls __GSHandlerCheck_EH 22452->22523 22454 13fa54f16 22479 13fa61ef4 22454->22479 22465 13fa54606 __scrt_initialize_crt 22464->22465 22528 13fa575e4 22465->22528 22471 13fa5460f 22471->22442 22471->22443 22473 13fa61f9a 22472->22473 22474 13fa61f69 22472->22474 22473->22452 22474->22473 22808 13fa54e10 22474->22808 22817 13fa564a0 22476->22817 22480 13fa67d70 67 API calls 22479->22480 22482 13fa61f03 22480->22482 22481 13fa54f1e 22484 13fa51d3c 22481->22484 22482->22481 22819 13fa680ac 47 API calls 22482->22819 22820 13fa4eaa4 GetModuleHandleW 22484->22820 22489 13fa41b9c 49 API calls 22490 13fa51d88 22489->22490 22839 13fa4b994 22490->22839 22523->22451 22526->22445 22527->22447 22542 13fa5a8ac 22528->22542 22531 13fa5460b 22531->22471 22535 13fa61e0c 22531->22535 22536 13fa689cc 22535->22536 22537 13fa54618 22536->22537 22576 13fa67cb8 22536->22576 22591 13fa64410 22536->22591 22602 13fa67d70 22536->22602 22537->22471 22541 13fa5760c 7 API calls 2 library calls 22537->22541 22541->22471 22543 13fa5a8b4 22542->22543 22545 13fa5a8e5 22543->22545 22546 13fa575ed 22543->22546 22556 13fa5aba8 22543->22556 22561 13fa5a8f4 DeleteCriticalSection 22545->22561 22546->22531 22548 13fa5774c 22546->22548 22572 13fa5aa7c 22548->22572 22562 13fa5a92c 22556->22562 22559 13fa5abe8 22559->22543 22560 13fa5abf3 InitializeCriticalSectionAndSpinCount 22560->22559 22561->22546 22563 13fa5aa53 22562->22563 22570 13fa5a970 __vcrt_FlsAlloc 22562->22570 22563->22559 22563->22560 22564 13fa5a99e LoadLibraryExW 22566 13fa5aa15 22564->22566 22567 13fa5a9bf GetLastError 22564->22567 22565 13fa5aa35 GetProcAddress 22565->22563 22569 13fa5aa46 22565->22569 22566->22565 22568 13fa5aa2c FreeLibrary 22566->22568 22567->22570 22568->22565 22569->22563 22570->22563 22570->22564 22570->22565 22571 13fa5a9e1 LoadLibraryExW 22570->22571 22571->22566 22571->22570 22573 13fa5a92c __vcrt_FlsAlloc 5 API calls 22572->22573 22574 13fa5aaa1 TlsAlloc 22573->22574 22577 13fa67cdb 22576->22577 22579 13fa67ce5 22577->22579 22617 13fa66708 EnterCriticalSection 22577->22617 22582 13fa67d57 22579->22582 22608 13fa62394 22579->22608 22582->22536 22621 13fa66708 EnterCriticalSection 22591->22621 22603 13fa67d7d 22602->22603 22607 13fa67dc2 22602->22607 22622 13fa628a4 22603->22622 22607->22536 22618 13fa68af0 EnterCriticalSection LeaveCriticalSection BuildCatchObjectHelperInternal 22608->22618 22610 13fa6239d 22611 13fa623ac 22610->22611 22619 13fa68b40 47 API calls 4 library calls 22610->22619 22612 13fa623b5 IsProcessorFeaturePresent 22611->22612 22613 13fa623df BuildCatchObjectHelperInternal 22611->22613 22615 13fa623c4 22612->22615 22620 13fa5ae38 14 API calls 2 library calls 22615->22620 22618->22610 22619->22611 22620->22613 22623 13fa628b5 FlsGetValue 22622->22623 22624 13fa628d0 FlsSetValue 22622->22624 22625 13fa628c2 22623->22625 22626 13fa628ca 22623->22626 22624->22625 22627 13fa628dd 22624->22627 22628 13fa62394 BuildCatchObjectHelperInternal 47 API calls 22625->22628 22630 13fa628c8 22625->22630 22626->22624 22665 13fa667e8 22627->22665 22631 13fa62945 22628->22631 22642 13fa67a48 22630->22642 22633 13fa6290a FlsSetValue 22636 13fa62928 22633->22636 22637 13fa62916 FlsSetValue 22633->22637 22634 13fa628fa FlsSetValue 22635 13fa62903 22634->22635 22672 13fa62c28 11 API calls 2 library calls 22635->22672 22673 13fa6257c 11 API calls memcpy_s 22636->22673 22637->22635 22640 13fa62930 22674 13fa62c28 11 API calls 2 library calls 22640->22674 22643 13fa67cb8 67 API calls 22642->22643 22644 13fa67a7d 22643->22644 22677 13fa67748 22644->22677 22649 13fa67ab3 22703 13fa62c28 11 API calls 2 library calls 22649->22703 22651 13fa67ac2 22651->22651 22692 13fa67dec 22651->22692 22654 13fa67bbe 22704 13fa62c08 11 API calls memcpy_s 22654->22704 22656 13fa67bd8 22658 13fa67c19 22656->22658 22706 13fa62c28 11 API calls 2 library calls 22656->22706 22657 13fa67bc3 22705 13fa62c28 11 API calls 2 library calls 22657->22705 22660 13fa67c80 22658->22660 22707 13fa67578 47 API calls 4 library calls 22658->22707 22708 13fa62c28 11 API calls 2 library calls 22660->22708 22663 13fa67a9a 22663->22607 22671 13fa667f9 memcpy_s 22665->22671 22666 13fa6684a 22676 13fa62c08 11 API calls memcpy_s 22666->22676 22667 13fa6682e RtlAllocateHeap 22669 13fa628ec 22667->22669 22667->22671 22669->22633 22669->22634 22671->22666 22671->22667 22675 13fa60d78 EnterCriticalSection LeaveCriticalSection memcpy_s 22671->22675 22672->22625 22673->22640 22674->22630 22675->22671 22676->22669 22709 13fa67294 22677->22709 22680 13fa67768 GetOEMCP 22682 13fa6778f 22680->22682 22681 13fa6777a 22681->22682 22683 13fa6777f GetACP 22681->22683 22682->22663 22684 13fa62c64 22682->22684 22683->22682 22685 13fa62caf 22684->22685 22690 13fa62c73 memcpy_s 22684->22690 22721 13fa62c08 11 API calls memcpy_s 22685->22721 22687 13fa62c96 HeapAlloc 22689 13fa62cad 22687->22689 22687->22690 22688 13fa62cb4 22688->22649 22688->22651 22689->22688 22690->22685 22690->22687 22720 13fa60d78 EnterCriticalSection LeaveCriticalSection memcpy_s 22690->22720 22693 13fa67748 49 API calls 22692->22693 22694 13fa67e19 22693->22694 22695 13fa67f6f 22694->22695 22697 13fa67e56 IsValidCodePage 22694->22697 22701 13fa67e70 memcpy_s 22694->22701 22696 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22695->22696 22698 13fa67bb5 22696->22698 22697->22695 22699 13fa67e67 22697->22699 22698->22654 22698->22656 22700 13fa67e96 GetCPInfo 22699->22700 22699->22701 22700->22695 22700->22701 22722 13fa67860 22701->22722 22703->22663 22704->22657 22705->22663 22706->22658 22707->22660 22708->22663 22710 13fa672b8 22709->22710 22711 13fa672b3 22709->22711 22710->22711 22717 13fa627d0 47 API calls 3 library calls 22710->22717 22711->22680 22711->22681 22713 13fa672d3 22718 13fa62cc4 47 API calls __swprintf_l 22713->22718 22715 13fa672f6 22719 13fa62d30 47 API calls __swprintf_l 22715->22719 22717->22713 22718->22715 22719->22711 22720->22690 22721->22688 22723 13fa6789d GetCPInfo 22722->22723 22724 13fa67993 22722->22724 22723->22724 22730 13fa678b0 22723->22730 22725 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22724->22725 22726 13fa67a32 22725->22726 22726->22695 22733 13fa695b0 22730->22733 22734 13fa67294 47 API calls 22733->22734 22735 13fa695f2 22734->22735 22753 13fa681d0 22735->22753 22755 13fa681d9 MultiByteToWideChar 22753->22755 22816 13fa55488 SetUnhandledExceptionFilter 22808->22816 22818 13fa553fb GetStartupInfoW 22817->22818 22818->22454 22819->22482 22821 13fa4eaf1 22820->22821 22822 13fa4eabf GetProcAddress 22820->22822 22825 13fa4d818 22821->22825 22823 13fa4eae1 GetProcAddress 22822->22823 22824 13fa4ead4 22822->22824 22823->22821 22824->22823 22893 13fa4d920 22825->22893 22828 13fa41b9c 49 API calls 22829 13fa4d85e 22828->22829 22830 13fa4ab00 50 API calls 22829->22830 22831 13fa4d86e 22830->22831 22896 13fa4d954 22831->22896 22834 13fa4d8cb LoadLibraryExW 22836 13fa4d900 22834->22836 22835 13fa4d8a8 22835->22834 22837 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22836->22837 22838 13fa4d90f 22837->22838 22838->22489 22840 13fa424c0 2 API calls 22839->22840 22841 13fa4b9b6 22840->22841 22842 13fa4d954 59 API calls 22841->22842 22843 13fa4b9c4 22842->22843 22928 13fa4ba0c 22843->22928 22894 13fa4d92e FreeLibrary 22893->22894 22895 13fa4d84d 22893->22895 22894->22895 22895->22828 22897 13fa4d984 22896->22897 22898 13fa4d99f 22897->22898 22899 13fa47078 49 API calls 22897->22899 22900 13fa4dafa 22898->22900 22901 13fa4d9bb RegOpenKeyExW 22898->22901 22899->22898 22903 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22900->22903 22901->22900 22902 13fa4d9e7 RegQueryValueExW 22901->22902 22904 13fa4da14 22902->22904 22905 13fa4daf0 RegCloseKey 22902->22905 22906 13fa4d888 GetVersionExW 22903->22906 22907 13fa41ebc 49 API calls 22904->22907 22905->22900 22906->22835 22908 13fa4da2b 22907->22908 22909 13fa4da43 RegQueryValueExW 22908->22909 22910 13fa4dadc 22909->22910 22911 13fa4da6c 22909->22911 22910->22905 22925 13fa4dbc0 49 API calls 22911->22925 22913 13fa4da7d 22914 13fa41b9c 49 API calls 22913->22914 22915 13fa4da92 22914->22915 22926 13fa4e434 51 API calls 22915->22926 22917 13fa4da9c 22927 13fa4a23c 49 API calls 22917->22927 22919 13fa4daa8 22920 13fa4a3d4 49 API calls 22919->22920 22921 13fa4dab9 22920->22921 22922 13fa485e0 53 API calls 22921->22922 22923 13fa4dacc 22922->22923 22923->22910 22924 13fa47078 49 API calls 22923->22924 22924->22910 22925->22913 22926->22917 22927->22919 22929 13fa4ba35 22928->22929 22930 13fa424c0 2 API calls 22929->22930 22931 13fa4ba56 22930->22931 22932 13fa4ba92 22931->22932 22933 13fa4ba6d 22931->22933 22935 13fa47078 49 API calls 22932->22935 22934 13fa4ab00 50 API calls 22933->22934 22936 13fa4ba77 22934->22936 22939 13fa4ba85 22935->22939 22937 13fa46a24 47 API calls 22936->22937 22937->22939 22983 13fa475ac 22939->22983 22944 13fa4baba 22945 13fa4cd80 49 API calls 22944->22945 22948 13fa4bb02 22944->22948 22964 13fa4bd1c __vcrt_freefls 22944->22964 22945->22944 23013 13fa600c0 47 API calls 3 library calls 22948->23013 22950 13fa4bb29 23014 13fa600c0 47 API calls 3 library calls 22950->23014 22952 13fa4bb4f 22953 13fa4bc39 22952->22953 22962 13fa4bb65 __vcrt_FlsAlloc 22952->22962 23018 13fa47e80 10 API calls 22953->23018 22957 13fa4bc48 22957->22964 23019 13fa47c30 GetStdHandle ReadFile GetLastError GetLastError GetFileType 22957->23019 22960 13fa4bc30 22960->22953 22960->22964 22961 13fa4bc73 22961->22964 22978 13fa4bc7f __vcrt_freefls __vcrt_FlsAlloc 22961->22978 23020 13fa4ecd8 MultiByteToWideChar 22961->23020 22962->22952 22962->22960 23015 13fa48000 10 API calls 22962->23015 23016 13fa47c30 GetStdHandle ReadFile GetLastError GetLastError GetFileType 22962->23016 23017 13fa47e80 10 API calls 22962->23017 23004 13fa47644 22964->23004 22965 13fa4bf13 23022 13fa4c244 49 API calls 22965->23022 22967 13fa4c213 23026 13fa4c244 49 API calls 22967->23026 22969 13fa4c229 23027 13fa54904 8 API calls 22969->23027 22971 13fa4cd80 49 API calls 22973 13fa4bf29 __vcrt_freefls 22971->22973 22972 13fa4c242 22973->22971 22974 13fa4bf8f 22973->22974 23023 13fa600c0 47 API calls 3 library calls 22974->23023 22976 13fa4ec84 WideCharToMultiByte 22976->22978 22977 13fa4bfcd 23024 13fa600c0 47 API calls 3 library calls 22977->23024 22978->22964 22978->22965 22978->22967 22978->22969 22978->22976 23021 13fa4b65c 51 API calls __swprintf_l 22978->23021 23025 13fa60600 47 API calls 2 library calls 22978->23025 22984 13fa424c0 2 API calls 22983->22984 22985 13fa475cc 22984->22985 22986 13fa47690 22985->22986 22987 13fa476c5 22986->22987 22988 13fa44f78 2 API calls 22987->22988 22989 13fa4770f 22988->22989 22990 13fa47728 CreateFileW 22989->22990 22991 13fa4775d GetLastError 22990->22991 22994 13fa477cb 22990->22994 22992 13fa424c0 2 API calls 22991->22992 22993 13fa4776f 22992->22993 22996 13fa4a7ac 51 API calls 22993->22996 22995 13fa47823 22994->22995 22997 13fa47805 SetFileTime 22994->22997 22998 13fa47078 49 API calls 22995->22998 22999 13fa47849 22995->22999 23000 13fa4777d 22996->23000 22997->22995 22998->22999 23002 13fa543d0 BuildCatchObjectHelperInternal 8 API calls 22999->23002 23000->22994 23001 13fa4778b CreateFileW GetLastError 23000->23001 23001->22994 23003 13fa4786a 23002->23003 23003->22944 23005 13fa47662 23004->23005 23006 13fa4767b 23004->23006 23005->23006 23007 13fa47668 23005->23007 23008 13fa47675 23007->23008 23009 13fa4766e 23007->23009 23029 13fa479a0 9 API calls 23008->23029 23028 13fa47a00 53 API calls BuildCatchObjectHelperInternal 23009->23028 23012 13fa47673 23012->23006 23013->22950 23014->22952 23015->22962 23016->22962 23017->22962 23018->22957 23019->22961 23020->22978 23021->22978 23022->22973 23023->22977 23024->22964 23025->22978 23026->22969 23027->22972 23028->23012 23029->23012

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1082 13fa4ba0c-13fa4ba6b call 13fa55060 call 13fa424c0 call 13fa4ac44 1089 13fa4ba92-13fa4ba97 call 13fa47078 1082->1089 1090 13fa4ba6d-13fa4ba90 call 13fa4ab00 call 13fa46a24 call 13fa42050 1082->1090 1094 13fa4ba9c-13fa4babf call 13fa475ac call 13fa47690 1089->1094 1090->1094 1103 13fa4bac5-13fa4baca 1094->1103 1104 13fa4bff4-13fa4c037 call 13fa47644 call 13fa42050 call 13fa543d0 1094->1104 1106 13fa4bad1-13fa4bb00 call 13fa4cd80 * 2 1103->1106 1115 13fa4bb02-13fa4bb59 call 13fa4cd74 call 13fa41bd0 call 13fa600c0 call 13fa4cd74 call 13fa41bd0 call 13fa600c0 1106->1115 1129 13fa4bb5c-13fa4bb5f 1115->1129 1130 13fa4bb65-13fa4bb95 call 13fa48000 call 13fa47c30 1129->1130 1131 13fa4bc39-13fa4bc5b call 13fa47e80 call 13fa6058c 1129->1131 1140 13fa4bb97 1130->1140 1141 13fa4bc0a-13fa4bc2a call 13fa47e80 1130->1141 1131->1104 1142 13fa4bc61-13fa4bc7d call 13fa47c30 1131->1142 1144 13fa4bb9e-13fa4bba2 1140->1144 1141->1129 1152 13fa4bc30-13fa4bc33 1141->1152 1150 13fa4bca1-13fa4bcb4 call 13fa6058c 1142->1150 1151 13fa4bc7f-13fa4bc87 1142->1151 1147 13fa4bbc8-13fa4bbcd 1144->1147 1148 13fa4bba4-13fa4bba8 1144->1148 1154 13fa4bbcf-13fa4bbd4 1147->1154 1155 13fa4bbfb-13fa4bc04 1147->1155 1148->1147 1153 13fa4bbaa-13fa4bbc2 call 13fa604e0 1148->1153 1150->1104 1166 13fa4bcba-13fa4bcd5 call 13fa4ecd8 call 13fa600a8 1150->1166 1156 13fa4bcd8-13fa4bd1a call 13fa4dfb4 call 13fa6058c 1151->1156 1152->1104 1152->1131 1153->1147 1167 13fa4bc89-13fa4bc8d 1153->1167 1154->1155 1160 13fa4bbd6-13fa4bbdc 1154->1160 1155->1144 1157 13fa4bc06 1155->1157 1175 13fa4bd29-13fa4bd3e 1156->1175 1176 13fa4bd1c-13fa4bd24 call 13fa600a8 1156->1176 1157->1141 1160->1155 1164 13fa4bbde-13fa4bbf5 call 13fa60560 1160->1164 1164->1155 1172 13fa4bc92-13fa4bc9c 1164->1172 1166->1156 1167->1157 1172->1141 1179 13fa4bf13-13fa4bf4d call 13fa4c244 call 13fa600a8 * 2 call 13fa4cd14 1175->1179 1180 13fa4bd44-13fa4bd4f 1175->1180 1176->1104 1229 13fa4bf8f-13fa4bff3 call 13fa41bd0 call 13fa4cd74 call 13fa41bd0 call 13fa600c0 call 13fa4cd74 call 13fa41bd0 call 13fa600c0 1179->1229 1230 13fa4bf4f-13fa4bf8d call 13fa4cd80 * 2 call 13fa4cd14 1179->1230 1183 13fa4bd55-13fa4bd5a 1180->1183 1184 13fa4c15f-13fa4c169 1180->1184 1186 13fa4bd67-13fa4bd6c 1183->1186 1187 13fa4bd5c-13fa4bd61 1183->1187 1184->1179 1189 13fa4c16f-13fa4c179 1184->1189 1192 13fa4bd72-13fa4bda3 1186->1192 1193 13fa4c03d-13fa4c04b call 13fa4df9c 1186->1193 1187->1184 1187->1186 1190 13fa4c1e8-13fa4c1f2 1189->1190 1191 13fa4c17b-13fa4c181 1189->1191 1199 13fa4c213-13fa4c235 call 13fa4c244 1190->1199 1200 13fa4c1f4-13fa4c1f7 1190->1200 1195 13fa4c187-13fa4c193 1191->1195 1196 13fa4bf0a-13fa4bf0d 1191->1196 1198 13fa4bda8-13fa4bdcc call 13fa5fc10 call 13fa60560 1192->1198 1213 13fa4c051-13fa4c07e call 13fa4dfd8 call 13fa4d7f0 1193->1213 1214 13fa4c15a 1193->1214 1203 13fa4c195-13fa4c199 1195->1203 1204 13fa4c1d2-13fa4c1d4 1195->1204 1196->1179 1196->1180 1234 13fa4bde5-13fa4bdf0 1198->1234 1235 13fa4bdce-13fa4bddc 1198->1235 1224 13fa4c23d-13fa4c243 call 13fa54904 1199->1224 1200->1199 1207 13fa4c1f9-13fa4c1ff 1200->1207 1211 13fa4c1c0-13fa4c1c7 1203->1211 1212 13fa4c19b-13fa4c19f 1203->1212 1215 13fa4c1d9-13fa4c1e3 1204->1215 1207->1196 1217 13fa4c205-13fa4c20e 1207->1217 1211->1215 1219 13fa4c1a1-13fa4c1a5 1212->1219 1220 13fa4c1c9-13fa4c1d0 1212->1220 1213->1214 1245 13fa4c084-13fa4c114 call 13fa4ec84 call 13fa4dfb4 call 13fa4e004 call 13fa4dfb4 call 13fa4cd74 call 13fa41bd0 call 13fa60600 1213->1245 1214->1184 1215->1196 1217->1196 1225 13fa4c1a7-13fa4c1ab 1219->1225 1226 13fa4c1ba 1219->1226 1220->1215 1225->1217 1232 13fa4c1ad-13fa4c1b8 1225->1232 1226->1211 1229->1104 1230->1229 1232->1215 1234->1198 1236 13fa4bdf2-13fa4be02 1234->1236 1235->1234 1241 13fa4bdde-13fa4bde1 1235->1241 1242 13fa4be25 1236->1242 1243 13fa4be04-13fa4be16 call 13fa4dfb4 1236->1243 1241->1234 1248 13fa4c038 1242->1248 1249 13fa4be2b 1242->1249 1253 13fa4be1b-13fa4be20 1243->1253 1299 13fa4c116-13fa4c127 1245->1299 1300 13fa4c12c-13fa4c13c 1245->1300 1248->1193 1254 13fa4be31-13fa4be3d 1249->1254 1253->1196 1258 13fa4be45-13fa4be48 1254->1258 1259 13fa4be3f-13fa4be43 1254->1259 1258->1254 1259->1258 1264 13fa4be4a-13fa4be53 1259->1264 1268 13fa4be55-13fa4be5f 1264->1268 1269 13fa4be7c-13fa4be86 1264->1269 1272 13fa4be62-13fa4be66 1268->1272 1269->1224 1273 13fa4be8c-13fa4beb1 call 13fa4ec84 1269->1273 1272->1269 1278 13fa4be68-13fa4be7a 1272->1278 1282 13fa4bed7-13fa4bf02 call 13fa4b65c 1273->1282 1283 13fa4beb3-13fa4bed2 call 13fa60594 1273->1283 1278->1269 1278->1272 1295 13fa4bf07 1282->1295 1283->1253 1295->1196 1299->1300 1301 13fa4c13f-13fa4c144 1300->1301 1302 13fa4c155-13fa4c158 1301->1302 1303 13fa4c146-13fa4c14f 1301->1303 1302->1301 1303->1295 1303->1302
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: __swprintf_l
                              • String ID: ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                              • API String ID: 1488884202-2291855099
                              • Opcode ID: d9c6479bb24b80900e483b0d07dfaef48e528c2e4b3a1bd587cb1a39ebcdf1dd
                              • Instruction ID: 228d8e0bdcb9a2d6236edd34bb779d2a79e0164f63040c478f351b673e7f7430
                              • Opcode Fuzzy Hash: d9c6479bb24b80900e483b0d07dfaef48e528c2e4b3a1bd587cb1a39ebcdf1dd
                              • Instruction Fuzzy Hash: 0922AC32A11A8095FB20EB25D8503D977A1F784788F80513AEA4E677E6EF78CB47C740

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1724 13fa6cc50-13fa6ccc3 call 13fa6c984 1727 13fa6ccc5-13fa6ccce call 13fa62be8 1724->1727 1728 13fa6ccdd-13fa6cce7 call 13fa6906c 1724->1728 1733 13fa6ccd1-13fa6ccd8 call 13fa62c08 1727->1733 1734 13fa6cd02-13fa6cd6b CreateFileW 1728->1734 1735 13fa6cce9-13fa6cd00 call 13fa62be8 call 13fa62c08 1728->1735 1747 13fa6d01e-13fa6d03e 1733->1747 1738 13fa6cde8-13fa6cdf3 GetFileType 1734->1738 1739 13fa6cd6d-13fa6cd73 1734->1739 1735->1733 1741 13fa6cdf5-13fa6ce30 GetLastError call 13fa62b7c CloseHandle 1738->1741 1742 13fa6ce46-13fa6ce4d 1738->1742 1744 13fa6cdb5-13fa6cde3 GetLastError call 13fa62b7c 1739->1744 1745 13fa6cd75-13fa6cd79 1739->1745 1741->1733 1758 13fa6ce36-13fa6ce41 call 13fa62c08 1741->1758 1750 13fa6ce55-13fa6ce58 1742->1750 1751 13fa6ce4f-13fa6ce53 1742->1751 1744->1733 1745->1744 1752 13fa6cd7b-13fa6cdb3 CreateFileW 1745->1752 1756 13fa6ce5e-13fa6ceb3 call 13fa68f84 1750->1756 1757 13fa6ce5a 1750->1757 1751->1756 1752->1738 1752->1744 1762 13fa6ceb5-13fa6cec1 call 13fa6cb8c 1756->1762 1763 13fa6ced2-13fa6cf03 call 13fa6c704 1756->1763 1757->1756 1758->1733 1762->1763 1769 13fa6cec3 1762->1769 1770 13fa6cf05-13fa6cf07 1763->1770 1771 13fa6cf09-13fa6cf4b 1763->1771 1772 13fa6cec5-13fa6cecd call 13fa6581c 1769->1772 1770->1772 1773 13fa6cf6d-13fa6cf78 1771->1773 1774 13fa6cf4d-13fa6cf51 1771->1774 1772->1747 1775 13fa6cf7e-13fa6cf82 1773->1775 1776 13fa6d01c 1773->1776 1774->1773 1778 13fa6cf53-13fa6cf68 1774->1778 1775->1776 1779 13fa6cf88-13fa6cfcd CloseHandle CreateFileW 1775->1779 1776->1747 1778->1773 1781 13fa6d002-13fa6d017 1779->1781 1782 13fa6cfcf-13fa6cffd GetLastError call 13fa62b7c call 13fa691ac 1779->1782 1781->1776 1782->1781
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                              • String ID:
                              • API String ID: 1617910340-0
                              • Opcode ID: 5a884f97d7ff67d6aca4df2dac599e8cec8c3a25a94e88d1a4cc9f66a8369aa6
                              • Instruction ID: b3213cface3d6328763bf34471c8f36703a3de689e17d46ea9aa8ace9fb20941
                              • Opcode Fuzzy Hash: 5a884f97d7ff67d6aca4df2dac599e8cec8c3a25a94e88d1a4cc9f66a8369aa6
                              • Instruction Fuzzy Hash: F3C19E36B20A4085EB10CFA9C4917EC3BB5F389BA8F115229DE2E977D5CB39C656C740

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: FileFind$ErrorFirstLast$Next
                              • String ID:
                              • API String ID: 869497890-0
                              • Opcode ID: 039dc7a200847a608efe71cbd31d7291781ba74b3c729308aa8b03dc8734d955
                              • Instruction ID: 20c7bc91600e727830f8422948a67d94ee38a16a48d07721a099a0f753cff868
                              • Opcode Fuzzy Hash: 039dc7a200847a608efe71cbd31d7291781ba74b3c729308aa8b03dc8734d955
                              • Instruction Fuzzy Hash: F9416532608A4496DA20DB25E5913ED73A0F7897A4F400329EB6D47BD5DF2CC65BC700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 59578552-0
                              • Opcode ID: 8ba2dbe03e17a1741fb447493e08548d6c454a77f43b12b85ad60658992c6f05
                              • Instruction ID: 5e63757be86aa032fbdf9752eb3c1c40fbc97b98d684e1cd37abda99ccca421d
                              • Opcode Fuzzy Hash: 8ba2dbe03e17a1741fb447493e08548d6c454a77f43b12b85ad60658992c6f05
                              • Instruction Fuzzy Hash: 0CE0EC30E15101CAEE5C37B558463EC34E12B95338F90033DA16D436C2CA9D47974A22

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Load$Library$AddressDeleteDialogIconObjectParamProc$CommandCreateDefaultDirectoryEnvironmentFontFreeHandleInitializeLayoutLineModuleProcessSystemUninitializeVariableVersion
                              • String ID: DONEDLG$MS Shell Dlg$RARICON$SETUPDLG$riched20.dll$sfxcmd$uninstall.lng
                              • API String ID: 2333794796-1726429148
                              • Opcode ID: 674a6ebc5775ab99176284ceeb78bc3c54b1a6d67ce76aba6fad6e141aabf849
                              • Instruction ID: 75d9454157db70894044957ba251353049061a4f28d1d2e17a08b00b6b5e78ab
                              • Opcode Fuzzy Hash: 674a6ebc5775ab99176284ceeb78bc3c54b1a6d67ce76aba6fad6e141aabf849
                              • Instruction Fuzzy Hash: A0614772A04A4496FA109F65E8547DABBE1F784380F90003EEA8E47B75DF78C64BCB40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 655 13fa459f0-13fa45aa3 call 13fa4db8c call 13fa41b9c * 3 call 13fa50388 call 13fa42050 * 3 672 13fa45aa5-13fa45aa7 655->672 673 13fa45aac-13fa45b61 call 13fa41b9c call 13fa4ab00 call 13fa42050 call 13fa46c60 call 13fa46c18 call 13fa42050 call 13fa41b9c * 2 call 13fa50388 call 13fa42050 * 2 call 13fa4694c 655->673 674 13fa460d2-13fa460f4 call 13fa543d0 672->674 701 13fa45b63-13fa45b7e call 13fa46b9c 673->701 702 13fa45b80-13fa45b8e call 13fa471c0 673->702 707 13fa45b93-13fa45ba7 call 13fa471c0 701->707 702->707 710 13fa45ba9-13fa45bba call 13fa42050 707->710 711 13fa45bbb-13fa45bbe 707->711 710->711 713 13fa45bd1-13fa45bdb call 13fa4694c 711->713 714 13fa45bc0-13fa45bcc call 13fa42050 711->714 719 13fa45bf8-13fa45c06 call 13fa471c0 713->719 720 13fa45bdd-13fa45bf6 call 13fa46b9c 713->720 714->713 725 13fa45c09-13fa45c1d call 13fa471c0 719->725 720->725 728 13fa45c31-13fa45c34 725->728 729 13fa45c1f-13fa45c30 call 13fa42050 725->729 731 13fa45c36-13fa45c42 call 13fa42050 728->731 732 13fa45c47-13fa45ccb call 13fa424c0 call 13fa41b9c * 3 call 13fa50674 call 13fa42050 * 3 call 13fa4694c 728->732 729->728 731->732 753 13fa45ccd-13fa45cfe call 13fa41b9c * 2 call 13fa50388 732->753 754 13fa45d19-13fa45e4f call 13fa4db8c call 13fa41b9c * 3 call 13fa50388 call 13fa42050 * 3 call 13fa41b9c * 2 call 13fa50388 call 13fa42050 * 2 call 13fa41b9c * 3 call 13fa50674 call 13fa42050 * 3 call 13fa4694c 732->754 766 13fa45d03-13fa45d14 call 13fa42050 * 2 753->766 806 13fa45e51-13fa45e82 call 13fa41b9c * 2 call 13fa50388 754->806 807 13fa45e9d-13fa4603d call 13fa41b9c * 3 call 13fa50388 call 13fa42050 * 3 call 13fa4db8c call 13fa41b9c * 3 call 13fa50388 call 13fa42050 * 3 call 13fa41b9c * 2 call 13fa50388 call 13fa42050 * 2 call 13fa41b9c * 3 call 13fa50674 call 13fa42050 * 3 call 13fa4694c 754->807 766->754 819 13fa45e87-13fa45e98 call 13fa42050 * 2 806->819 873 13fa4603f-13fa46070 call 13fa41b9c * 2 call 13fa50388 807->873 874 13fa4608b-13fa460a3 SHChangeNotify call 13fa42050 807->874 819->807 885 13fa46075-13fa46086 call 13fa42050 * 2 873->885 877 13fa460a8-13fa460d0 call 13fa42050 * 4 874->877 877->674 885->874
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: LoadString
                              • String ID: " "%1"$.rev$WinRAR$WinRAR.REV$WinRAR.REV\DefaultIcon$WinRAR.REV\shell\open\command$WinRAR.ZIP$WinRAR.ZIP\DefaultIcon$WinRAR.ZIP\shell\open\command$WinRAR.exe$WinRAR\DefaultIcon$WinRAR\shell\open\command
                              • API String ID: 2948472770-3100727910
                              • Opcode ID: c722b656afdd6144150e3ce6f53847c9c5fec5c30a87a715cff640ce5be26c05
                              • Instruction ID: 9dabbb0da419aec90d91d1fb33dd8cafad9c6ab1443631659753620d1419bb8a
                              • Opcode Fuzzy Hash: c722b656afdd6144150e3ce6f53847c9c5fec5c30a87a715cff640ce5be26c05
                              • Instruction Fuzzy Hash: 55125971615541A1EA01EFA0D4517DEB761EBD1394F80203AB64E97BFAEE78CB8BC700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 894 13fa522d0-13fa52324 call 13fa41150 897 13fa5263e 894->897 898 13fa5232a-13fa52330 894->898 901 13fa52641-13fa52664 call 13fa543d0 897->901 899 13fa52336-13fa52338 898->899 900 13fa524de-13fa524f4 call 13fa41b9c 898->900 902 13fa52341-13fa52347 899->902 903 13fa5233a-13fa5233c 899->903 910 13fa524fa-13fa52550 call 13fa4db8c call 13fa41b9c call 13fa46c18 call 13fa46a1c call 13fa42050 * 2 900->910 907 13fa52467-13fa52489 call 13fa424dc call 13fa42e10 call 13fa462f8 902->907 908 13fa5234d-13fa5234f 902->908 903->901 937 13fa5248e-13fa5249a call 13fa52e94 907->937 911 13fa52355-13fa5235b 908->911 912 13fa52451-13fa52457 908->912 968 13fa52552-13fa5261e call 13fa4db8c call 13fa41b9c call 13fa46c18 call 13fa46a1c call 13fa42050 * 2 call 13fa41130 call 13fa42970 call 13fa53cd0 call 13fa42720 SetForegroundWindow SendMessageW GetSysColor SendDlgItemMessageW 910->968 915 13fa52361-13fa52363 911->915 916 13fa52434-13fa5244c call 13fa424dc call 13fa42720 911->916 917 13fa52459-13fa52462 EndDialog 912->917 921 13fa52365-13fa52368 915->921 922 13fa523a0-13fa523a7 915->922 916->897 917->897 928 13fa52393-13fa5239b call 13fa43544 921->928 929 13fa5236a-13fa5236d 921->929 922->897 925 13fa523ad-13fa523b4 call 13fa49fd8 922->925 925->897 943 13fa523ba-13fa523ca IsDlgButtonChecked 925->943 928->897 929->897 934 13fa52373-13fa5238e IsDlgButtonChecked call 13fa46480 929->934 934->897 949 13fa524a1-13fa524d9 call 13fa41b9c call 13fa44fc4 call 13fa42050 937->949 950 13fa5249c call 13fa529c8 937->950 943->897 947 13fa523d0-13fa5242f call 13fa4db8c call 13fa41b9c call 13fa4db8c call 13fa41b9c call 13fa51cc4 call 13fa42050 * 2 943->947 947->897 949->917 950->949 998 13fa52635-13fa52639 call 13fa42050 968->998 999 13fa52620-13fa52634 SendMessageW 968->999 998->897 999->998
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: MessageSend$ButtonCheckedColorForegroundItemWindow
                              • String ID: $ $.ace$HELPIntegrationSettings$SETUPDLG
                              • API String ID: 2255778568-2511250736
                              • Opcode ID: 260f5e3393e060c1f4b1b6e26fcf222c7ce071ea7f890c00ef5338bda82b7b35
                              • Instruction ID: 425564a4e868b81c165dbd3f3fbfcdf71e6476e55b53d449353b561574f2bd86
                              • Opcode Fuzzy Hash: 260f5e3393e060c1f4b1b6e26fcf222c7ce071ea7f890c00ef5338bda82b7b35
                              • Instruction Fuzzy Hash: B6917B31F1054096FB21EBA1D8557ED77A1AB95B88F404039D94E67BEAEF28CB0BC350

                              Control-flow Graph

                              APIs
                                • Part of subcall function 000000013FA49CF0: GetVersionExW.KERNEL32 ref: 000000013FA49D21
                              • SHChangeNotify.SHELL32 ref: 000000013FA43ACC
                                • Part of subcall function 000000013FA50910: RegOpenKeyExW.ADVAPI32 ref: 000000013FA50984
                                • Part of subcall function 000000013FA50910: RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,?,80000000,{B41DB860-8EE4-11D2-9906-E49FADC173CA},?,000000013FA44549), ref: 000000013FA5099E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ChangeDeleteNotifyOpenValueVersion
                              • String ID: ApplicationDescription$Capabilities$Capabilities\FileAssociations$Software\WinRAR\Capabilities$WinRAR$WinRAR.ZIP$WinRAR32$\Software\RegisteredApplications$rarext.dll$rarext32.dll${B41DB860-64E4-11D2-9906-E49FADC173CA}${B41DB860-8EE4-11D2-9906-E49FADC173CA}
                              • API String ID: 4091171417-1834283350
                              • Opcode ID: 655c141e39e2900d2e0b3796d4f0039d3bf8e7af58d529d17644e48c5fa34ef5
                              • Instruction ID: 7901b7d31ee46c5cad511b68b3de9dc36b8eeda0ac0a752aeee459d39530eb84
                              • Opcode Fuzzy Hash: 655c141e39e2900d2e0b3796d4f0039d3bf8e7af58d529d17644e48c5fa34ef5
                              • Instruction Fuzzy Hash: 6871AA71A24645A2EA00DB61D8517DD7361F7C4744F81603AEA4E577AAEF78CB0BC700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1787 13fa684e8-13fa6853a 1788 13fa68540-13fa68543 1787->1788 1789 13fa6862b 1787->1789 1791 13fa68545-13fa68548 1788->1791 1792 13fa6854d-13fa68550 1788->1792 1790 13fa6862d-13fa68649 1789->1790 1791->1790 1793 13fa68556-13fa68565 1792->1793 1794 13fa68610-13fa68623 1792->1794 1795 13fa68567-13fa6856a 1793->1795 1796 13fa68575-13fa68594 LoadLibraryExW 1793->1796 1794->1789 1797 13fa68570 1795->1797 1798 13fa6866a-13fa68679 GetProcAddress 1795->1798 1799 13fa6864a-13fa6865f 1796->1799 1800 13fa6859a-13fa685a3 GetLastError 1796->1800 1801 13fa685fc-13fa68603 1797->1801 1803 13fa6867b-13fa686a2 1798->1803 1804 13fa68609 1798->1804 1799->1798 1802 13fa68661-13fa68664 FreeLibrary 1799->1802 1805 13fa685a5-13fa685bc call 13fa60560 1800->1805 1806 13fa685ea-13fa685f4 1800->1806 1801->1793 1801->1804 1802->1798 1803->1790 1804->1794 1805->1806 1809 13fa685be-13fa685d2 call 13fa60560 1805->1809 1806->1801 1809->1806 1812 13fa685d4-13fa685e8 LoadLibraryExW 1809->1812 1812->1799 1812->1806
                              APIs
                              • FreeLibrary.KERNEL32(?,00000000,000000013FA68796,?,?,00000030,000000013FA68E08), ref: 000000013FA68664
                              • GetProcAddress.KERNEL32(?,00000000,000000013FA68796,?,?,00000030,000000013FA68E08), ref: 000000013FA68670
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AddressFreeLibraryProc
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3013587201-537541572
                              • Opcode ID: 0ff21987e665f8d4942c95e68111f333ee23c6f90dc1472269bfea777c5e3f05
                              • Instruction ID: 60e73354af1e05a9ebbfda0612d036f8fcfe69634b3f757c10edb1e7ccaa3f60
                              • Opcode Fuzzy Hash: 0ff21987e665f8d4942c95e68111f333ee23c6f90dc1472269bfea777c5e3f05
                              • Instruction Fuzzy Hash: 8B41D272B11A1081EA16CB16AA10BD637E9BF85BB0F49853D9D1E97794EF38CA47C304

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1813 13fa5a92c-13fa5a96a 1814 13fa5a970-13fa5a973 1813->1814 1815 13fa5aa5b 1813->1815 1816 13fa5aa5d-13fa5aa79 1814->1816 1817 13fa5a979 1814->1817 1815->1816 1818 13fa5a97c 1817->1818 1819 13fa5a982-13fa5a991 1818->1819 1820 13fa5aa53 1818->1820 1821 13fa5a993-13fa5a996 1819->1821 1822 13fa5a99e-13fa5a9bd LoadLibraryExW 1819->1822 1820->1815 1823 13fa5aa35-13fa5aa44 GetProcAddress 1821->1823 1824 13fa5a99c 1821->1824 1825 13fa5aa15-13fa5aa2a 1822->1825 1826 13fa5a9bf-13fa5a9c8 GetLastError 1822->1826 1823->1820 1831 13fa5aa46-13fa5aa51 1823->1831 1827 13fa5aa09-13fa5aa10 1824->1827 1825->1823 1830 13fa5aa2c-13fa5aa2f FreeLibrary 1825->1830 1828 13fa5a9f7-13fa5aa01 1826->1828 1829 13fa5a9ca-13fa5a9df call 13fa60560 1826->1829 1827->1818 1828->1827 1829->1828 1834 13fa5a9e1-13fa5a9f5 LoadLibraryExW 1829->1834 1830->1823 1831->1816 1834->1825 1834->1828
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,000000013FA5ABDE,?,?,?,000000013FA5A8D0,?,?,00000001,000000013FA575ED), ref: 000000013FA5A9B1
                              • GetLastError.KERNEL32(?,?,?,000000013FA5ABDE,?,?,?,000000013FA5A8D0,?,?,00000001,000000013FA575ED), ref: 000000013FA5A9BF
                              • LoadLibraryExW.KERNEL32(?,?,?,000000013FA5ABDE,?,?,?,000000013FA5A8D0,?,?,00000001,000000013FA575ED), ref: 000000013FA5A9E9
                              • FreeLibrary.KERNEL32(?,?,?,000000013FA5ABDE,?,?,?,000000013FA5A8D0,?,?,00000001,000000013FA575ED), ref: 000000013FA5AA2F
                              • GetProcAddress.KERNEL32(?,?,?,000000013FA5ABDE,?,?,?,000000013FA5A8D0,?,?,00000001,000000013FA575ED), ref: 000000013FA5AA3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: ae15335fa6c61b048509c49a196b3e4ebd52445835e68971fd082157b79502c1
                              • Instruction ID: bd3ccf37d2fb38151b0a8bc79935d5cb18218e36c2934c7f3af222ba29f562f6
                              • Opcode Fuzzy Hash: ae15335fa6c61b048509c49a196b3e4ebd52445835e68971fd082157b79502c1
                              • Instruction Fuzzy Hash: 7431F071B22B40D9EE12DB86A8047D533A4FB48BA0F59413D9E5E0B790EF38C647C710

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2150 13fa47690-13fa476c3 2151 13fa476c5-13fa476c9 2150->2151 2152 13fa476cf 2150->2152 2151->2152 2153 13fa476cb-13fa476cd 2151->2153 2154 13fa476d1-13fa47757 call 13fa44f78 call 13fa418c0 CreateFileW 2152->2154 2153->2154 2159 13fa477dd-13fa477e1 2154->2159 2160 13fa4775d-13fa4777f GetLastError call 13fa424c0 call 13fa4a7ac 2154->2160 2161 13fa477e7-13fa477eb 2159->2161 2175 13fa47781-13fa477c9 call 13fa418c0 CreateFileW GetLastError 2160->2175 2176 13fa477cb 2160->2176 2163 13fa477ed-13fa477f0 2161->2163 2164 13fa477f9-13fa477fd 2161->2164 2163->2164 2166 13fa477f2 2163->2166 2167 13fa47823-13fa47837 2164->2167 2168 13fa477ff-13fa47803 2164->2168 2166->2164 2171 13fa4784d-13fa47880 call 13fa44fb0 call 13fa543d0 2167->2171 2172 13fa47839-13fa47849 call 13fa47078 2167->2172 2168->2167 2170 13fa47805-13fa4781d SetFileTime 2168->2170 2170->2167 2172->2171 2180 13fa477d1-13fa477db call 13fa42050 2175->2180 2176->2180 2180->2161
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast$Time
                              • String ID:
                              • API String ID: 1999340476-0
                              • Opcode ID: 9e4bd7dc1d78f2eec6e2f3f86765b8b68f57d069d993987501a293f250e7639f
                              • Instruction ID: cbbc0c242a9090eaa7954f0cde9b1c58ccecdc4a830f5c542f616e6a9f4f2f4c
                              • Opcode Fuzzy Hash: 9e4bd7dc1d78f2eec6e2f3f86765b8b68f57d069d993987501a293f250e7639f
                              • Instruction Fuzzy Hash: 9E51D332A0468086EB208B25E4557E97BA0F3857B8F541329DF6E27BD1CB7DC65A8B40
                              APIs
                              • GetConsoleMode.KERNEL32 ref: 000000013FA64F6C
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000013FA6ED1D), ref: 000000013FA64FF7
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ConsoleErrorLastMode
                              • String ID:
                              • API String ID: 953036326-0
                              • Opcode ID: e90719db0a3677f1c5c5c75af093351ecd695ad417a6a7f727859d7f3e3c672d
                              • Instruction ID: c7235b9f8b98897fd9aa7efd292d25fd3c63b83f5731c9dd918b02d33b5fd16c
                              • Opcode Fuzzy Hash: e90719db0a3677f1c5c5c75af093351ecd695ad417a6a7f727859d7f3e3c672d
                              • Instruction Fuzzy Hash: 8A91BC32F106508DFB609F6998907ED3BA0F785BA8F54512DDE0E67A89DB34CA87C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 1333970121-0
                              • Opcode ID: 506870551e74ba66f43a32b50561d502f5abb45002dcd2912f5178c8f1cd33c1
                              • Instruction ID: e799edc7806cf93f21de656322e8d7095090f898b32ddbe3abc08693a4d156dd
                              • Opcode Fuzzy Hash: 506870551e74ba66f43a32b50561d502f5abb45002dcd2912f5178c8f1cd33c1
                              • Instruction Fuzzy Hash: 3F316035E01240C5FA24AB6AD469BE937919B85B48F84443DAD8E4B6E7DF68CB4BC310
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: LibraryQueryValue$FreeLoadOpenVersion
                              • String ID: rarlng.dll
                              • API String ID: 518641560-1675521814
                              • Opcode ID: 8fc8f0e80092ea857dbb5572429849bdd6dbd36d0b8eec7680ff9d1c3c9282a3
                              • Instruction ID: cff3f7acde5570cbce4ec327d97cfdb4ecb46583e6dc245a021fd4048cbb2c7c
                              • Opcode Fuzzy Hash: 8fc8f0e80092ea857dbb5572429849bdd6dbd36d0b8eec7680ff9d1c3c9282a3
                              • Instruction Fuzzy Hash: B221FF32A14A44D6FA20DB21E8613E977B0F785744F944039968D577A5DF3CDB5ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: LoadString
                              • String ID: Process RAR, ZIP and other archive formats
                              • API String ID: 2948472770-1543766675
                              • Opcode ID: 27196e2b612bc1e3c4a8521804f8a5637015dacf60a8f7efddfea519938ad03a
                              • Instruction ID: de675459dd266dda09fad79dacd5bba0a9254ebae73dfda4bb52f0b40d528997
                              • Opcode Fuzzy Hash: 27196e2b612bc1e3c4a8521804f8a5637015dacf60a8f7efddfea519938ad03a
                              • Instruction Fuzzy Hash: 6E015EB1F1064086EB408F16E9447D5BBA1B789BC4F54843CCE0D97B25DE7CC6438B00
                              APIs
                              • SHGetMalloc.SHELL32(?,?,80000001,000000013FA4F40A), ref: 000000013FA4A506
                              • SHGetSpecialFolderLocation.SHELL32 ref: 000000013FA4A520
                                • Part of subcall function 000000013FA4A58C: SHGetPathFromIDListW.SHELL32(?,?,?,?,?,?,00000000,000000013FA4A537,?,?,80000001,000000013FA4F40A), ref: 000000013FA4A5BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: FolderFromListLocationMallocPathSpecial
                              • String ID: WinRAR
                              • API String ID: 628029987-3970807970
                              • Opcode ID: f442b72b01f6799e087adf63796d1bc45824a189814b0aa24eef02aa4cdb49b7
                              • Instruction ID: 95a619d7639825674784ac59c4790e0ee41ccb889fc3aedd1c75a4afc1c87fa3
                              • Opcode Fuzzy Hash: f442b72b01f6799e087adf63796d1bc45824a189814b0aa24eef02aa4cdb49b7
                              • Instruction Fuzzy Hash: 46019E76A0064081EE14EF12F9413D97370E78ABD0F145039DE1E5775ADE38C64ACB00
                              APIs
                              • CreateDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,00000000,000000013FA48531,?,?,?,?,000000013FA44D7D), ref: 000000013FA4848B
                              • CreateDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000013FA48531,?,?,?,?,000000013FA44D7D), ref: 000000013FA484D6
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000013FA48531,?,?,?,?,000000013FA44D7D), ref: 000000013FA484F0
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: 119d1b7c1e8ecb251e36dd25af98fd014e2dcece50bfe7be2aad24c3ca019ed5
                              • Instruction ID: eef6b5cac4955808632b4e13205e5f6303dbfd816a1e3d7a464eda26ae8bff13
                              • Opcode Fuzzy Hash: 119d1b7c1e8ecb251e36dd25af98fd014e2dcece50bfe7be2aad24c3ca019ed5
                              • Instruction Fuzzy Hash: 33219032A0474082FB20EB25B5413EE73E1A7C5B80F554539EE8E677A6DF28CB478601
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Info
                              • String ID:
                              • API String ID: 1807457897-3916222277
                              • Opcode ID: d609b306aa90a6e86a120eb8bec561c599a7f558c6ee5cfc10257db2acb9f7fb
                              • Instruction ID: 162b16f3cb54072bc3562420cd24e7ca1d6c2b0e615063a7d2e1afd27f6dbb22
                              • Opcode Fuzzy Hash: d609b306aa90a6e86a120eb8bec561c599a7f558c6ee5cfc10257db2acb9f7fb
                              • Instruction Fuzzy Hash: 3C51C373A286C08AE761CF34D0443DE7BE1F388759F94412AD78D43A85CB78C646CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx
                              • API String ID: 2568140703-3893581201
                              • Opcode ID: 14163775033d92efcd0e7639a2b76caa422f1feb78f516e3bb7a962bfccaca7d
                              • Instruction ID: 2ea536360f6ff644a5606e152d711defdf03bf74352c71c16d40900be74c5fd4
                              • Opcode Fuzzy Hash: 14163775033d92efcd0e7639a2b76caa422f1feb78f516e3bb7a962bfccaca7d
                              • Instruction Fuzzy Hash: 30212C35A08B8086D764CB56B84078AB7A5F7C8BD0F44412AEECD83B19DF38C5458B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Open
                              • String ID: Setup\%s
                              • API String ID: 71445658-3923963727
                              • Opcode ID: 834792c083aa9531ec049165a8bfdb2affc619c55bd8ffaaf1cb2faf1f413acc
                              • Instruction ID: e87595866b9e7953545c757756b056b39e769f37da3cf0bf0a5adf972b0e9a3d
                              • Opcode Fuzzy Hash: 834792c083aa9531ec049165a8bfdb2affc619c55bd8ffaaf1cb2faf1f413acc
                              • Instruction Fuzzy Hash: 1E01843171868081EA50DB51E5557EAB760E794BC4F845039F98E87B65DF28C647CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: FolderPath
                              • String ID: unknown_folder
                              • API String ID: 1514166925-3920786785
                              • Opcode ID: 145e2e9d963d889d7e1754b5122d00a80c18d701d8f130c86778bcac917942fc
                              • Instruction ID: 348a6e7c55bc765c9bc43e6d2022272e22f2e82d29ba002ee2df81b84645520e
                              • Opcode Fuzzy Hash: 145e2e9d963d889d7e1754b5122d00a80c18d701d8f130c86778bcac917942fc
                              • Instruction Fuzzy Hash: D6F03632714B8086EF208B65F9D9BDB77A4EB98784F4410399A8E07B55DF7CC25A8B00
                              APIs
                                • Part of subcall function 000000013FA67748: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013FA67A84), ref: 000000013FA67772
                              • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,000000013FA67BB5), ref: 000000013FA67E59
                              • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,000000013FA67BB5), ref: 000000013FA67E9D
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CodeInfoPageValid
                              • String ID:
                              • API String ID: 546120528-0
                              • Opcode ID: bbc342652c04a1561528c405f5cf782d502d5ecce9fede569b84d28ff7a4694c
                              • Instruction ID: be44c726d8afa4f8a25540333bb7ba208ae00c906e5ae82687b7fd4fe3d70d3a
                              • Opcode Fuzzy Hash: bbc342652c04a1561528c405f5cf782d502d5ecce9fede569b84d28ff7a4694c
                              • Instruction Fuzzy Hash: 0A81EE72A14680C6FB658F25E550BE9BBA1E784BA1F49413EDA8E076D0DB39CB47C310
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystem
                              • String ID:
                              • API String ID: 1175261203-0
                              • Opcode ID: d208f5da171bed4fcfaa80a060daddecaad378c7615b6e038c805bd4663b8183
                              • Instruction ID: 8ee367b854d2dd40fbbe4f92f18f2a75d2019bc27ccffb2f71e1b33bbea5d944
                              • Opcode Fuzzy Hash: d208f5da171bed4fcfaa80a060daddecaad378c7615b6e038c805bd4663b8183
                              • Instruction Fuzzy Hash: CE210632B01944D5EB11EFB2D8A13ED3370E798784F811439990DA7B9AEE24CB4BC350
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Delete
                              • String ID:
                              • API String ID: 1035893169-0
                              • Opcode ID: 7197f7c9a84460caba81b9a2fa45b8d2cb4c195b378382774d0ee6ef408dddaf
                              • Instruction ID: 74ef1a0ee94176bd9e61324c745c4db60425428a8a05c6104e9b11b3d496e744
                              • Opcode Fuzzy Hash: 7197f7c9a84460caba81b9a2fa45b8d2cb4c195b378382774d0ee6ef408dddaf
                              • Instruction Fuzzy Hash: 6C117232A14A8091EA10DB52E415BDA73B1F789BC0F414139ED8D57B66DF28CB0BCB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 063e234ee543b75c609a2a2d665c9cac07cd632388d8e33a92bca93a9607434a
                              • Instruction ID: 5f637d8b6e82b4c037a80e199d10a039b90003fdba867dc4afb38f246ac5b93c
                              • Opcode Fuzzy Hash: 063e234ee543b75c609a2a2d665c9cac07cd632388d8e33a92bca93a9607434a
                              • Instruction Fuzzy Hash: CE016732A0464192FA20DB21F4513EF73B4BB85BC4F440139AD8D57766EF28C7468B40
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,?,000000013FA485E9,?,?,?,?,000000013FA4DACC), ref: 000000013FA48634
                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,?,000000013FA485E9,?,?,?,?,000000013FA4DACC), ref: 000000013FA4866A
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: b9796f00f5f3e62c0cc3b9bf8d100f5eee812f57bc602c33e712cfebc6b799ae
                              • Instruction ID: fe12f1f5049ed84ccc0f0bd5c65e285430bb1f699c272d26825ad1c88b91e4bb
                              • Opcode Fuzzy Hash: b9796f00f5f3e62c0cc3b9bf8d100f5eee812f57bc602c33e712cfebc6b799ae
                              • Instruction Fuzzy Hash: E1016232B0464082EA10EB61F4553EE73B1B7C9794F400639EA9E577A6DF68C7468B80
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                              • String ID:
                              • API String ID: 3765095794-0
                              • Opcode ID: cf9752706fb3b2d85260c216e82f7d6346addd2573ec072980270183322e8e90
                              • Instruction ID: 9789379bf3e44810083bea3bc4ef821199bb2ab7812ebedc6ecb72dd86fef2b9
                              • Opcode Fuzzy Hash: cf9752706fb3b2d85260c216e82f7d6346addd2573ec072980270183322e8e90
                              • Instruction Fuzzy Hash: 3EE04F74E00604D8FA106B74EC4D3D53B602725321FA0027DD8AD971E2EB68C7078700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection__vcrt___vcrt_initialize_locks__vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 4086592313-0
                              • Opcode ID: 67f8ebb3a655a5d0760db362755270c6d8cc3ec891241b5d64b73321766c1e09
                              • Instruction ID: a8a3f0f1bfe8403b13f96404cf369038bf3cd69e47955c905d20b98b696796a0
                              • Opcode Fuzzy Hash: 67f8ebb3a655a5d0760db362755270c6d8cc3ec891241b5d64b73321766c1e09
                              • Instruction Fuzzy Hash: EAD012B0E04248C0FC613AAA264E3F833481B22306F9010BCA9DC372C34B0A034B6932
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CreateInstance
                              • String ID:
                              • API String ID: 542301482-0
                              • Opcode ID: 250c1967b7947a4e5db30bf88e72e085f1e1b3666d2b8087b75b39e9bad60602
                              • Instruction ID: e2f3525ba12385133f67443ccbfc0d453633a657b95027a04fcffb3ec0d0ca22
                              • Opcode Fuzzy Hash: 250c1967b7947a4e5db30bf88e72e085f1e1b3666d2b8087b75b39e9bad60602
                              • Instruction Fuzzy Hash: 7F51F4BAB00B4485EB009F6AD8947ED33A5F748FC8F10842ACE5E57725EE39C64AC740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 3c1d6ceced2890062a55d49d93a70a5e380d595c7b31ccd5b6b6402ce8271c82
                              • Instruction ID: 1285586f87d0b706158362c22082409e2a23851085d800bddc2b9046ecff0ffa
                              • Opcode Fuzzy Hash: 3c1d6ceced2890062a55d49d93a70a5e380d595c7b31ccd5b6b6402ce8271c82
                              • Instruction Fuzzy Hash: 8221CC36704B8198EA64DF12A4487DE73A5FB99BC8F94803AEE8D43B60DF38C556D700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: f9eeefa2a41b6c18c4bcefad43a8d6e0da4b2a279dcb1f6dbbe3020d78446531
                              • Instruction ID: 37d8a84b0ce6f8dc927c624ad89e5591f18c12127fbebc7fc03a9dd10a52a200
                              • Opcode Fuzzy Hash: f9eeefa2a41b6c18c4bcefad43a8d6e0da4b2a279dcb1f6dbbe3020d78446531
                              • Instruction Fuzzy Hash: DA214132625A8091EA50DB21F4157DA77A0F7C57C0F845139EADE47BAADF29CA07DB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: f75b6b23e85acd21aeef6088aa5ebbe3bea0ea50ee5a5f0a4c781c9bb3204dcc
                              • Instruction ID: 451bf8cc2d264cf52a79dcf3abc17cc7f6fd8215d6f1449729ce024e361e2982
                              • Opcode Fuzzy Hash: f75b6b23e85acd21aeef6088aa5ebbe3bea0ea50ee5a5f0a4c781c9bb3204dcc
                              • Instruction Fuzzy Hash: 50219032E14640C1EE60AF5194047EDB2A0BB86B94F54443DEBDC57B86DB3DC6478B20
                              APIs
                                • Part of subcall function 000000013FA50E90: RegOpenKeyExW.KERNEL32 ref: 000000013FA50EF8
                              • RegQueryValueExW.ADVAPI32 ref: 000000013FA507FA
                                • Part of subcall function 000000013FA50F30: RegCloseKey.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000013FA42A13), ref: 000000013FA50F3D
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: c4efccf40e05dff8761a4e7be21237d08091014ffb6ed155ea1aaa3c9e558b7e
                              • Instruction ID: 0543261a72d2ed78ca30ee274547693495241812be5f809cd1e17ea1d3748878
                              • Opcode Fuzzy Hash: c4efccf40e05dff8761a4e7be21237d08091014ffb6ed155ea1aaa3c9e558b7e
                              • Instruction Fuzzy Hash: 3321D572B14B80C6EB408B42A4087CE7394F758BD0F548139EF8C17B55DB78DA02C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: ae6c88fadc11fafcbe02f483e9e4b698663d53b01c8f0caa7853e87e7a3c4fd4
                              • Instruction ID: 12e2b350124ff3519aa45c8b3e5291e055f456bc04524b659f91184898f919e7
                              • Opcode Fuzzy Hash: ae6c88fadc11fafcbe02f483e9e4b698663d53b01c8f0caa7853e87e7a3c4fd4
                              • Instruction Fuzzy Hash: 4521A83261468087DB629F19D44079976A1F7C4BA5F646238EB6D876D9DB39C902CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 0334126c3873f792f2fc5eaf72785f01b5800c288c9f76bb35a8979c5b6789e5
                              • Instruction ID: 0d98a5767a1ca75fe9c8584ce9b78f969196552f26599fdf9a8380f8750bb2e6
                              • Opcode Fuzzy Hash: 0334126c3873f792f2fc5eaf72785f01b5800c288c9f76bb35a8979c5b6789e5
                              • Instruction Fuzzy Hash: C6114C72A0869182EB20DF52F4917DAB7A1F798794F504039AE8D83B55DB3CD61ACB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 0cb685f65c0a7a0e1e37e3eca9e9cedcba49b88fc53fcde52ba4e27b57c02335
                              • Instruction ID: afe31074a28f5f8bf6f029c812bdb58a3e5e2a377f18b2d537d688c611185ca8
                              • Opcode Fuzzy Hash: 0cb685f65c0a7a0e1e37e3eca9e9cedcba49b88fc53fcde52ba4e27b57c02335
                              • Instruction Fuzzy Hash: 0911A071B14781C6EA10DB53B5487EDB3A1B788FC0F448038AE8D57B66CF38D6028700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: cbcd02c80306eb5c30c2ec56ea5594bf361163305aba3b834803e9f4bdb87ea8
                              • Instruction ID: ff93a971d3386e7b050afdc560b977afe24f2a1cd9e8c08042f2cc0232b6d87a
                              • Opcode Fuzzy Hash: cbcd02c80306eb5c30c2ec56ea5594bf361163305aba3b834803e9f4bdb87ea8
                              • Instruction Fuzzy Hash: 0C11C471B1478086EB10CB52B9497ED73A5B748BC0F148039EE8D47B95DB38CA06C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: d0875275f171a7a31bd08b644d176a746cdc9500c6c192686afbdff6ec71bb61
                              • Instruction ID: fb6f0b90a20aceb7bbd19eed45a6721f114e7baff62bd6f4e3800952753859d6
                              • Opcode Fuzzy Hash: d0875275f171a7a31bd08b644d176a746cdc9500c6c192686afbdff6ec71bb61
                              • Instruction Fuzzy Hash: 25118832A1464082F7109F14E5403D9BBA9FB80BA0F55003DEA5D577A2DB78CA128B10
                              APIs
                              • RtlAllocateHeap.NTDLL(?,?,00000000,000000013FA629AA,?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000), ref: 000000013FA6683D
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 3de377a288751709d2d753e8fa0ee3b9e0c7d4ffae579bf188502d589b502302
                              • Instruction ID: aa2e23540ebeb826df0563b665b51630bbb3441265b8c658b7f606d56158215a
                              • Opcode Fuzzy Hash: 3de377a288751709d2d753e8fa0ee3b9e0c7d4ffae579bf188502d589b502302
                              • Instruction Fuzzy Hash: EBF03A74F0160585FE555BB298653E576D49FC8BA4F4C943C8A0E8F3D2EE6CE7838260
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Find$FileFirst$CloseErrorLast
                              • String ID:
                              • API String ID: 1464966427-0
                              • Opcode ID: 244c18171c55cd05b08285cba3c131faabc899983e6720fe1d04a03a6beb305b
                              • Instruction ID: 81ec27504d6f2a5d6e1cc66271278b26add5bb2a648f6481fff5cfbab2bf99bf
                              • Opcode Fuzzy Hash: 244c18171c55cd05b08285cba3c131faabc899983e6720fe1d04a03a6beb305b
                              • Instruction Fuzzy Hash: D5F090B2A0C28085EE50AF75A1063D83760AB1ABB4F184368DA7C177CBCB24C65BC715
                              APIs
                                • Part of subcall function 000000013FA4D954: RegOpenKeyExW.ADVAPI32 ref: 000000013FA4D9D9
                                • Part of subcall function 000000013FA4D954: RegQueryValueExW.ADVAPI32 ref: 000000013FA4DA06
                                • Part of subcall function 000000013FA4D954: RegQueryValueExW.ADVAPI32 ref: 000000013FA4DA62
                                • Part of subcall function 000000013FA4C2E0: FindResourceW.KERNEL32(?,?,?,?,000000013FA4B9DA), ref: 000000013FA4C2F8
                              • SetProcessDefaultLayout.USER32 ref: 000000013FA4B9E8
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: QueryValue$DefaultFindLayoutOpenProcessResource
                              • String ID:
                              • API String ID: 2975701166-0
                              • Opcode ID: ce358db20ef98a70b7721a141b0215e2e482cfe962ffb1492a86eac3695b9d7f
                              • Instruction ID: c200f06bb05e828c8650cc37a0e3f69658708c0f831adf401339fd1137f14097
                              • Opcode Fuzzy Hash: ce358db20ef98a70b7721a141b0215e2e482cfe962ffb1492a86eac3695b9d7f
                              • Instruction Fuzzy Hash: 6FF06D32A1054082FA20AB21E4223D933B1FB89784F411039EA8D577A7EE2CCB0BCB00
                              APIs
                                • Part of subcall function 000000013FA50E90: RegOpenKeyExW.KERNEL32 ref: 000000013FA50EF8
                              • RegQueryValueExW.KERNEL32 ref: 000000013FA50A0E
                                • Part of subcall function 000000013FA50F30: RegCloseKey.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000013FA42A13), ref: 000000013FA50F3D
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: b28d6e5ef8a0bada95eb7f6cd82cbf3fa9bb0c92fab4ca71622e637ded223263
                              • Instruction ID: cce5cb297e915a7480e50b23f2b240d03ec7bc7e1c95cbba7a4a2d6485d3ae22
                              • Opcode Fuzzy Hash: b28d6e5ef8a0bada95eb7f6cd82cbf3fa9bb0c92fab4ca71622e637ded223263
                              • Instruction Fuzzy Hash: 26F0B433B2474286EA549761B1587AAB3D0AB887D4F448438FF8C07B65EF3CC5068B00
                              APIs
                              • RegCloseKey.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000013FA42A13), ref: 000000013FA50F3D
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Close
                              • String ID:
                              • API String ID: 3535843008-0
                              • Opcode ID: 87a8160b2385b7052fa0bddc8138c7931c27e6b833a69534fc4c5103b51b5e89
                              • Instruction ID: 769a3f6ed3e61f8b1f4af17cae1b2f0f6c0ee40ee9784cd0b9bf7ee7d2a7e1be
                              • Opcode Fuzzy Hash: 87a8160b2385b7052fa0bddc8138c7931c27e6b833a69534fc4c5103b51b5e89
                              • Instruction Fuzzy Hash: DFC01220B0A202CAFA682AE2149A7A022A40B24302E08A0B8CC9D06250D2049A9F6A30
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Window$Rect$LongText$ByteCharClassClientItemMessageMetricsMultiNameSendSystemWide
                              • String ID: $%s:$CAPTION$COMBOBOX
                              • API String ID: 1955950163-420924974
                              • Opcode ID: 6538b7537d9744e663b9209f056bddb7a1244888f7b5beb2aab799001cc52a56
                              • Instruction ID: 39880296ba947f3999ff43ad33065097223f30aab469769ca1fdda94e0dd6da7
                              • Opcode Fuzzy Hash: 6538b7537d9744e663b9209f056bddb7a1244888f7b5beb2aab799001cc52a56
                              • Instruction Fuzzy Hash: D0B1C532B146404BEB18DF69E8547EA7BA1F384B84F445029EE4E5BB59DF3CDA06CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 612d4024f7f14bdabea5988eae53a56f9fd5274ba911ab0d7eb538ae21b424af
                              • Instruction ID: d019a02b67246e3093fc28c27d9b9c22ff223a7c7464a9289cb73ba88f580344
                              • Opcode Fuzzy Hash: 612d4024f7f14bdabea5988eae53a56f9fd5274ba911ab0d7eb538ae21b424af
                              • Instruction Fuzzy Hash: 7B315E72615B80CAEB608FA0E8547ED73B4F784748F44442EDA8E47B98DF38C649CB10
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 22a8a8918700894889141e66ab020d1d3935d4b281343a48718a2dfde1590204
                              • Instruction ID: 3f8958510c4e9f9ca46d6cc8562b25e7c953f1421b88dc9433244673c0580de5
                              • Opcode Fuzzy Hash: 22a8a8918700894889141e66ab020d1d3935d4b281343a48718a2dfde1590204
                              • Instruction Fuzzy Hash: F9316032614F8086DB60CF65E8447DE73B4F788758F54012AEA8D43B99DF38C65ACB00
                              APIs
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000013FA47B54), ref: 000000013FA4859F
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: DiskFreeSpace
                              • String ID:
                              • API String ID: 1705453755-0
                              • Opcode ID: a6540a61208f146433847296f128e9269bc552dd4a353a3d2ecd1adfb1b2af06
                              • Instruction ID: 38d966134aeaa167e36e53a1c1d79f0df3514f55c07da2c813fee1848c98c02f
                              • Opcode Fuzzy Hash: a6540a61208f146433847296f128e9269bc552dd4a353a3d2ecd1adfb1b2af06
                              • Instruction Fuzzy Hash: 4F112B32B0060499FB00DBA5E4513DD37B4A748788F881039DE1D67756DA24CA96C750
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ButtonChecked
                              • String ID:
                              • API String ID: 1719414920-0
                              • Opcode ID: f9d8ab637eb24184b32b57c176e8d714b3476a1fca790ed65686e66c6b25a53b
                              • Instruction ID: 1fe3bb47f0a02b122ca7903a947c0ff478a0acb32e6f61b05218b03097efff6e
                              • Opcode Fuzzy Hash: f9d8ab637eb24184b32b57c176e8d714b3476a1fca790ed65686e66c6b25a53b
                              • Instruction Fuzzy Hash: DA514821B077C1D7E7098FBAA52478E25AEEB44755F18C0389E5243B56DF2CCAAEC710
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ButtonCheck$ItemVersion
                              • String ID:
                              • API String ID: 2185970780-0
                              • Opcode ID: 0de064b7d3677288e546893f392448c3059468422443991210ac89a973ff9831
                              • Instruction ID: 2338bac15e7f7c0a5c4111f0b1f97c6479108a59a0c55ef801dbdb3ea7a6f3ea
                              • Opcode Fuzzy Hash: 0de064b7d3677288e546893f392448c3059468422443991210ac89a973ff9831
                              • Instruction Fuzzy Hash: 63515231B182E143F7255F72A42079E7B66E786F49F044124DD8647F9ADF2D86178710
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ButtonItem$CheckCheckedText$Dialog
                              • String ID: AlwaysArc$HELPContextItems$SETUPCONTEXTITEMS$Setup\MenuItems$Setup\TopMenuItems
                              • API String ID: 1934181330-3208996673
                              • Opcode ID: 2bdda98e59e8a188823461f89e70ef37dd36baef0cc151e82424f98d8931dbca
                              • Instruction ID: 44db56f6923b7d44745f9cfc3393f70b248c305143d753827cde3e024932643c
                              • Opcode Fuzzy Hash: 2bdda98e59e8a188823461f89e70ef37dd36baef0cc151e82424f98d8931dbca
                              • Instruction Fuzzy Hash: 04B18C32A10A41A2EB00DB65D8907ED77B1F785344F90503ADA4D63BAAEF38DB0BC740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CloseExecuteHandleObjectShellSingleWait
                              • String ID: -Uninstall$-install$-install -extall$@$NewContextMenu$RarExtInstaller.exe$RarExtPackage.msix$Setup$p
                              • API String ID: 3837156514-3709660866
                              • Opcode ID: 7e93bfabf9090363ca603b1bd5bed5fe911c43080d95a3a9ed5f41ae4d71bd59
                              • Instruction ID: 3c2954e6e81deb5e531a4a7808f689de0d4cdd21533e16245c3385be0052e5cb
                              • Opcode Fuzzy Hash: 7e93bfabf9090363ca603b1bd5bed5fe911c43080d95a3a9ed5f41ae4d71bd59
                              • Instruction Fuzzy Hash: A4410D72B50A40A9FB10EF60D8517ED33B1E79474CF8150399A4E57AA9EF24CB0BC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                              • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 2565136772-3242537097
                              • Opcode ID: ea39b9d3a45375645a710de0d40b2cb44fe158dd939409e827fc684225a6d213
                              • Instruction ID: 0fce37be6db03e34b61e07bd6b26d268945f0f4b66ac9cfebf476e31af110317
                              • Opcode Fuzzy Hash: ea39b9d3a45375645a710de0d40b2cb44fe158dd939409e827fc684225a6d213
                              • Instruction Fuzzy Hash: B921FA34E12A41C1FE549BA1F8A8BE577A1BB44750F88113DDD4F03AA4EF28C75B8710
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: MessageSend$LoadString$DialogExecuteItemShell
                              • String ID: DONEDLG$License.txt$WinRAR.exe$open$order.htm$rarreg.key
                              • API String ID: 1810245377-3354913336
                              • Opcode ID: 4e8e7ae967622b0db637f84a1eb5b4b398e7f23c8492858c0ab334fdf474ba1b
                              • Instruction ID: 98f0deae31e0f514f33b5b81b8a27b5c6abfc57d160966ac8cd85134cacc0624
                              • Opcode Fuzzy Hash: 4e8e7ae967622b0db637f84a1eb5b4b398e7f23c8492858c0ab334fdf474ba1b
                              • Instruction Fuzzy Hash: 4E614C32A0064095FB28EFA5D9557EC37A1E785788F40403DDA4E6BB96DF29DB4BC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: NamePathShort$AddressDesktopProcWindow
                              • String ID: .htm$::/html/$HtmlHelpW$hhctrl.ocx$winrar.chm
                              • API String ID: 3733684519-3807848278
                              • Opcode ID: 03d21b9d154919de187d96e892aac703863466a068bfd16c4a3369779880b0e0
                              • Instruction ID: 2db74a32f4fbed36f9ac24c1f46db3fe6d4e92c5f1ef28bee0448edb9513949d
                              • Opcode Fuzzy Hash: 03d21b9d154919de187d96e892aac703863466a068bfd16c4a3369779880b0e0
                              • Instruction Fuzzy Hash: 69A18E32F1094096FB10EBA1D8953EC33A1A795798F405639D94E67BE6EF28C70BC340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: f$f$p$p$f
                              • API String ID: 3215553584-1325933183
                              • Opcode ID: 918110c4f9f180979157d3e61df1fb092bde457b5c786976cc7a193decc9b109
                              • Instruction ID: c752d45f7c2efac41f07b91cd7b300f006fa15e7e4a5c62b9f587c56a3844038
                              • Opcode Fuzzy Hash: 918110c4f9f180979157d3e61df1fb092bde457b5c786976cc7a193decc9b109
                              • Instruction Fuzzy Hash: 6312B376E08141C6FB649E55E04C7F9B6E2F3807D6F94412AE6CE47BD8D738CA828B14
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 86107186efc731f63c471ce2a910a7739a646a68a99b995652a66406ce9e25c1
                              • Instruction ID: ff70bb51494bf5ed6af5b51873b255aaf7d577335d899ae286e93be792fdf5e7
                              • Opcode Fuzzy Hash: 86107186efc731f63c471ce2a910a7739a646a68a99b995652a66406ce9e25c1
                              • Instruction Fuzzy Hash: 22E18D72A04B44CAEB20DF65E5893DD7BA4F745B98F144229EECD57B9ACB34C682C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: QueryValue$CloseOpen
                              • String ID: LanguageFolder$LngFolder0$Software\WinRAR\General
                              • API String ID: 1586453840-1245967352
                              • Opcode ID: f59093d3a318ac0f2855b01a6632a7d805f5c0b6e2d13faf31636cd8fe75cc1f
                              • Instruction ID: f4c0215eed86ce45097443ddceae099f10ac5bbeed2fa9698c7392b62b243e5b
                              • Opcode Fuzzy Hash: f59093d3a318ac0f2855b01a6632a7d805f5c0b6e2d13faf31636cd8fe75cc1f
                              • Instruction Fuzzy Hash: B1413432B1590099FB10EBB1D4517ED33B1EB98788F4051399E4EA7BA9EE28C74BC750
                              APIs
                              • SHChangeNotify.SHELL32 ref: 000000013FA539FB
                                • Part of subcall function 000000013FA43804: SHChangeNotify.SHELL32 ref: 000000013FA43ACC
                                • Part of subcall function 000000013FA50830: RegDeleteKeyW.ADVAPI32 ref: 000000013FA508C1
                                • Part of subcall function 000000013FA50830: RegDeleteKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,80000000,000000013FA44369), ref: 000000013FA508CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ChangeDeleteNotify
                              • String ID: .rev$WinRAR$WinRAR.REV$WinRAR.ZIP$\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\WinRAR.exe$\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinRAR archiver
                              • API String ID: 3372569710-753117775
                              • Opcode ID: 770402fac772db25c45765877efd48a45866dcba2743461567665e7f4a3ec9e1
                              • Instruction ID: 1289ece6b2a18eea14a24e283f9dc542ec1c24f1751ece3bc14a4b77eed40301
                              • Opcode Fuzzy Hash: 770402fac772db25c45765877efd48a45866dcba2743461567665e7f4a3ec9e1
                              • Instruction Fuzzy Hash: 4B313F72F20A1194FB00EBB4DC51BED3371A794798F855039995E677AADF64C74AC300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID: extall$init$msi$noexplorer$setup$wait$warning
                              • API String ID: 3472027048-3182653736
                              • Opcode ID: f842f864596803cfa88902f8cf2d33cbb6b14615db1a07561ef49b42e302d54e
                              • Instruction ID: 2b2760eb5bd355e348eb89a5df8640ee5c03810e15e1f97f38a3b174dd65f790
                              • Opcode Fuzzy Hash: f842f864596803cfa88902f8cf2d33cbb6b14615db1a07561ef49b42e302d54e
                              • Instruction Fuzzy Hash: 9D818571B0564090FA20EB62D8557EE77A1AB94784F40503DAE4EA77DAEF28CB4BC350
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 22afc90d2ec416ddfb1f31815257910a1631523b1aaf3cc3bac322a63677a082
                              • Instruction ID: 3f24e0f6c543a3b297f3060aa15f3855a99fb1c6f937c2326b58d6bd7db8dc6b
                              • Opcode Fuzzy Hash: 22afc90d2ec416ddfb1f31815257910a1631523b1aaf3cc3bac322a63677a082
                              • Instruction Fuzzy Hash: 5EC1F232A04B8581EB60AB6594443EE3BA1F7C1BE5F954139EE4E037D2DB79CA4B8700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: BlanketClearCreateFreeInstanceProxyStringVariant
                              • String ID: Name$SELECT * FROM Win32_OperatingSystem$WQL
                              • API String ID: 1619944124-3970706604
                              • Opcode ID: 82c572e6526df74e39f08359baa425f18f845bbca955219d631614638e6115b2
                              • Instruction ID: 93b6dce7c1420c6a12dda9a35e4818da89f4860060a5334a97aeb70a6aa6a7f3
                              • Opcode Fuzzy Hash: 82c572e6526df74e39f08359baa425f18f845bbca955219d631614638e6115b2
                              • Instruction Fuzzy Hash: 5C711A36615B45D5EB10DF69E8907DD73A4F788B88F40412AEE4E97B68DF38C61ACB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocString
                              • String ID: SELECT * FROM Win32_OperatingSystem
                              • API String ID: 262959230-522155302
                              • Opcode ID: b97cd699669659a6b4b244d3dafff1a66f46610d3474d65fc75facd8b81971d4
                              • Instruction ID: 5813eb01b67b309d7d9f12246a4da3902baec89b03cada290df6e7e5a22ec880
                              • Opcode Fuzzy Hash: b97cd699669659a6b4b244d3dafff1a66f46610d3474d65fc75facd8b81971d4
                              • Instruction Fuzzy Hash: 0541A371A00744C9EB149F72A8247E936D4FB44BA4F14463CAEAE877D5DF78C6978700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: QueryValue$CloseOpen
                              • String ID: AppData$Software\WinRAR\Paths
                              • API String ID: 1586453840-3415417297
                              • Opcode ID: 7ea94a5ab615e7167d612436de936715c50d4b06d05bb809f09725913d83a1da
                              • Instruction ID: fe8058bf7d59abb15fcfaecc0bf50fb00c91b8e9e5b3544a98cc11ccbb40ebeb
                              • Opcode Fuzzy Hash: 7ea94a5ab615e7167d612436de936715c50d4b06d05bb809f09725913d83a1da
                              • Instruction Fuzzy Hash: 1B31FD32B10A1085FB10EFA1E852BDD73B4BB95B98F405139AD5E67B96DF28C647C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: 64d8b6d2fa1f20503ea5e12ef57315d09cff250f3b32b9b17cd815889d89d66a
                              • Instruction ID: 3e7f7a82e468146d9ee402e8ecca0bee89c1ff94929d1b1dbb490a27bc84fce4
                              • Opcode Fuzzy Hash: 64d8b6d2fa1f20503ea5e12ef57315d09cff250f3b32b9b17cd815889d89d66a
                              • Instruction Fuzzy Hash: 30216730E4164042FE6967615E557EE76EA5FC47B0F144B3CAA3E4BBD6EE2CA6034300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 524c1238896a24298de38ba156bc34f1697fc9d3054d7a6538b84981dae55f09
                              • Instruction ID: 988769459657a9fca1edf793a97ca61ea2d80c859e43f2d6bc0021fe8877b72b
                              • Opcode Fuzzy Hash: 524c1238896a24298de38ba156bc34f1697fc9d3054d7a6538b84981dae55f09
                              • Instruction Fuzzy Hash: 58119031B24B4086F7508B52F894B59B6A4F798FE4F140238EE5E87B94DF7CC6498B44
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: SetDefaultDllDirectories$SetDllDirectoryW$kernel32
                              • API String ID: 667068680-1824683568
                              • Opcode ID: 44525a4faca62f4414b76b31e444f96628f226f460dce766c84114fcf7f9ea35
                              • Instruction ID: 4151bd4deeb6ade5aa226c3f12a35112d63a92fd33c738d967a33cb78e5f3fe3
                              • Opcode Fuzzy Hash: 44525a4faca62f4414b76b31e444f96628f226f460dce766c84114fcf7f9ea35
                              • Instruction Fuzzy Hash: E1E0C970A51A4191FE149B96AC68BE033A1FB58745F44003DC80F03361EE6CD78FC720
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 3523768491-393685449
                              • Opcode ID: e23b0d52ab4e95c5317352a92a95699e4d7113afaceee32e9ae3998c479be248
                              • Instruction ID: c70affe82fb5286213af85d84ea4d43f654b9241eff86ec2712cedda1e33bbc6
                              • Opcode Fuzzy Hash: e23b0d52ab4e95c5317352a92a95699e4d7113afaceee32e9ae3998c479be248
                              • Instruction Fuzzy Hash: 05E1AE72A00784CAEB20DF69D4883ED3BA0F744798F154229EECD57BA6DB34C686C700
                              APIs
                              • GetLastError.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA62957
                              • FlsSetValue.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA6298D
                              • FlsSetValue.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA629BA
                              • FlsSetValue.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA629CB
                              • FlsSetValue.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA629DC
                              • SetLastError.KERNEL32(?,?,0000BD129431FAD8,000000013FA62C11,?,?,?,?,000000013FA6DC2A,?,?,00000000,000000013FA684AF,?,?,?), ref: 000000013FA629F7
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: dff555305baf8c6bbb18520eb4ee7e1ce059de402ddfa06c014ff71944a3e7c5
                              • Instruction ID: 6e6aa62339cb7473717d2d387adf94ea7a041323746cbe17bcde45e6b98665db
                              • Opcode Fuzzy Hash: dff555305baf8c6bbb18520eb4ee7e1ce059de402ddfa06c014ff71944a3e7c5
                              • Instruction Fuzzy Hash: D8119D35F4124042FA6467215A517EA76E65FC97B0F044B3CA93E4B7C6EE2C86438200
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm$f
                              • API String ID: 2395640692-629598281
                              • Opcode ID: 7775b4defbcb5f99eb859b462b1ce1532b374c60451568ab5971c4e951d484a3
                              • Instruction ID: b2a68a5c45fdd568b9d5737cb98e97ea16506342746f3ea02fc541cae6a30c9c
                              • Opcode Fuzzy Hash: 7775b4defbcb5f99eb859b462b1ce1532b374c60451568ab5971c4e951d484a3
                              • Instruction Fuzzy Hash: 4E51C132B11604CAEB14CF25E448B9D3BA5F354BA9F558138EE9E67788DB34DA83C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: bf761600861b132889fd9b1f172135b27a05a3466beb4e5c14af3cf7c120c4f4
                              • Instruction ID: 5d3a2bd5a6e0a40cb40302a92e21877c220ba94e35d5ed968b75e9fd0abdd1aa
                              • Opcode Fuzzy Hash: bf761600861b132889fd9b1f172135b27a05a3466beb4e5c14af3cf7c120c4f4
                              • Instruction Fuzzy Hash: 09F06D71B11B0481EA108BA4E854BA97360FB89B75F54063DCAAE872E4CF2CC64AC700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: AdjustPointer
                              • String ID:
                              • API String ID: 1740715915-0
                              • Opcode ID: 4ed7d74887577429148c6cbc321fbf402f01857698d88e3335b941d18dc210ad
                              • Instruction ID: e3f477942cf2be986c0b8ba4b62dbcfe9e5e723b7aef0cd359184852cdbe8e45
                              • Opcode Fuzzy Hash: 4ed7d74887577429148c6cbc321fbf402f01857698d88e3335b941d18dc210ad
                              • Instruction Fuzzy Hash: 04B1BF72E02A88C1FE65DF55D4887A97794EB44B86F1A843D9ECE27785DB38CA43C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleWrite
                              • String ID:
                              • API String ID: 1958782092-0
                              • Opcode ID: 62e8346bb91db0c532f292c343c03e476f980d018ee13cef993d3fd6b2175ab9
                              • Instruction ID: 5c6601b0df518c7b4813e62d23250740e4fb0001e9b1468b87b3e02e0216e5a0
                              • Opcode Fuzzy Hash: 62e8346bb91db0c532f292c343c03e476f980d018ee13cef993d3fd6b2175ab9
                              • Instruction Fuzzy Hash: AC517E72B14A8082EA60CB66E8507AA73A4F784BD1F550139EE5F57B94DF3CCA47C710
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: 7d170ee21146607bbe660a37fa86ebaeee6952599cd635bf8a876dcf144f681b
                              • Instruction ID: b21dd75381730f5d5523b993fd338fcaa50c16fb53915b45991acabad342fc69
                              • Opcode Fuzzy Hash: 7d170ee21146607bbe660a37fa86ebaeee6952599cd635bf8a876dcf144f681b
                              • Instruction Fuzzy Hash: 4011CE3BE50A0211FA64113CF8533E930416BD93B4F19063CAB6E4B2DEFB288B434605
                              APIs
                              • FlsGetValue.KERNEL32(?,?,?,000000013FA5ADC7,?,?,00000000,000000013FA5B062,?,?,?,?,?,000000013FA5AFEE), ref: 000000013FA62A2F
                              • FlsSetValue.KERNEL32(?,?,?,000000013FA5ADC7,?,?,00000000,000000013FA5B062,?,?,?,?,?,000000013FA5AFEE), ref: 000000013FA62A4E
                              • FlsSetValue.KERNEL32(?,?,?,000000013FA5ADC7,?,?,00000000,000000013FA5B062,?,?,?,?,?,000000013FA5AFEE), ref: 000000013FA62A76
                              • FlsSetValue.KERNEL32(?,?,?,000000013FA5ADC7,?,?,00000000,000000013FA5B062,?,?,?,?,?,000000013FA5AFEE), ref: 000000013FA62A87
                              • FlsSetValue.KERNEL32(?,?,?,000000013FA5ADC7,?,?,00000000,000000013FA5B062,?,?,?,?,?,000000013FA5AFEE), ref: 000000013FA62A98
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 86fe035e00d1d602777038774878a2897c9adc8476b94adbf3c7bc8eeb7a768f
                              • Instruction ID: b5576d0344f26e41b3962863cab6adade4cbc12c62c6fd628c73da0319c48d92
                              • Opcode Fuzzy Hash: 86fe035e00d1d602777038774878a2897c9adc8476b94adbf3c7bc8eeb7a768f
                              • Instruction Fuzzy Hash: 22114930E5064042FF6897259A917EA36EA5FD43B0F444B3CA93E4BBD6EE6CC6038201
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: b150e93786705c8554998ac2570fbcbb747d9aea44a1ce3903b2cd1dc0555109
                              • Instruction ID: ee8acc9a33a4299e9b27408a0bc76a93956e45c8e712cefc1c1ac19ac44406e0
                              • Opcode Fuzzy Hash: b150e93786705c8554998ac2570fbcbb747d9aea44a1ce3903b2cd1dc0555109
                              • Instruction Fuzzy Hash: EA111739E4120442FE6D67315A527EA32DA4FC5370E580B3C9A3E4B7D2EE3C97434252
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                              • API String ID: 3215553584-1196891531
                              • Opcode ID: 7fb683387a68d5c04bac52ca321eebc2f52f39ad0e0b49bc1b2927c09cf77c47
                              • Instruction ID: b3fdcdb1235fa3cc0cf4b548c2329163220c8f5c6dd69395852b06056215b401
                              • Opcode Fuzzy Hash: 7fb683387a68d5c04bac52ca321eebc2f52f39ad0e0b49bc1b2927c09cf77c47
                              • Instruction Fuzzy Hash: 0C816972E04240CEFB658F6AC2547FC3BA0E791BA8F55802DDA0A576E9D729CB439701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 45395b0d9e84dc941235d35e9a201705667d822c282f2cfcf98b941ef1374899
                              • Instruction ID: 324940934cb98b85907e05009c8bede4d66f4cb21bffc79d85a3b9d1d24a9bc3
                              • Opcode Fuzzy Hash: 45395b0d9e84dc941235d35e9a201705667d822c282f2cfcf98b941ef1374899
                              • Instruction Fuzzy Hash: 9C916873A04B94CAE751CB65E9843DD7BB1F748788F14412AEE8D17B59DB38C296CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 5b7bff9964b32e473a3d72dd83a96cda547c82a61009bc5b50b31b359271a2a9
                              • Instruction ID: a4665aa8790a1bd3de37976d7981b445f574f2f88893e674fb9d4a223043e5a1
                              • Opcode Fuzzy Hash: 5b7bff9964b32e473a3d72dd83a96cda547c82a61009bc5b50b31b359271a2a9
                              • Instruction Fuzzy Hash: FB616872A05B88CAEB20DF66D5843DD77A0F348B98F044229EF8D17B99DB38C256C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: 3efbc5adb1b35bf9387d32f153c1a0c5f7e455fc31f4e7aa56dadfc3cbae41ac
                              • Instruction ID: 41a879d0104384500a7f70e9b0120c55754233a149f5895c1901c6d9cf578140
                              • Opcode Fuzzy Hash: 3efbc5adb1b35bf9387d32f153c1a0c5f7e455fc31f4e7aa56dadfc3cbae41ac
                              • Instruction Fuzzy Hash: CE518D72908380C6EB648F15D54839C77A4F399B95F18812EDADD4BBD5CB38DA62CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: DeleteEnumOpen
                              • String ID: %s\%s
                              • API String ID: 3661673891-4073750446
                              • Opcode ID: ee4ad5f429f7f22e6ac827ff870943090024caeee882214d004cf88cf4ce03f5
                              • Instruction ID: d9778316d1c44806b0e02a6d829a99eaab7f9285fb2e4a40564463672c10035b
                              • Opcode Fuzzy Hash: ee4ad5f429f7f22e6ac827ff870943090024caeee882214d004cf88cf4ce03f5
                              • Instruction Fuzzy Hash: 5B317A32614B8186E7208F21E8447DA73A5F789784F40413AEE8D53B29DF38C65ADB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 26408035adb1395c0d67a01588a12fd27370553c3153764cf8271abe9472c264
                              • Instruction ID: 955957d3d37ba919a8dbcb157e921b49377cbfbc055d545b2ad8520d81a54997
                              • Opcode Fuzzy Hash: 26408035adb1395c0d67a01588a12fd27370553c3153764cf8271abe9472c264
                              • Instruction Fuzzy Hash: 87D1EF72B05A808AE711CF79D4407EC37B6F384BA8F54422ADE5EA7B99DA34C617C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 1a5a69f94c3c2392b8f3d7b323fcec08d54a09625973528f3470f2396b08089e
                              • Instruction ID: eed52da22242b581563208def19f0d9c2eb07789e0dfdee6722465bc6b9fa544
                              • Opcode Fuzzy Hash: 1a5a69f94c3c2392b8f3d7b323fcec08d54a09625973528f3470f2396b08089e
                              • Instruction Fuzzy Hash: D021E131E04A8081EA709F61E4013A973A1F745F9AF144238EA5D677C5CF3CCE878B40
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 28489f2a19b775294e11c07c30f00bab8d3727b619ff7740ddda105378b5056a
                              • Instruction ID: 33c0caba6816238806b00bd30b7de5235188da0df554419db6f1ce925bfb2da2
                              • Opcode Fuzzy Hash: 28489f2a19b775294e11c07c30f00bab8d3727b619ff7740ddda105378b5056a
                              • Instruction Fuzzy Hash: B2E04F74F0174082FF096BB26819B6632A09B49B42F08903C8C0F47350DE3C858F8B10
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: __except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 1467352782-3733052814
                              • Opcode ID: e0da591f0232e5ebbdeae58dba383ee5c9de8b1426b5572abd1ad92e4fe3c4ae
                              • Instruction ID: 61dcc599ef86b69c273a22ed5d2f74ac15510d5c2aeac57971b82e8835bf35af
                              • Opcode Fuzzy Hash: e0da591f0232e5ebbdeae58dba383ee5c9de8b1426b5572abd1ad92e4fe3c4ae
                              • Instruction Fuzzy Hash: 6C71D472A08680CADB618F25D4887ED7BA4F358BC5F14912ADECD4BF89D738C656C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CreateFrameInfo__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2558813199-1018135373
                              • Opcode ID: 8d2a4aa2ab7e329685ea82b2eb22216d2f52d4cefc6765a04c2d9111d036c5f8
                              • Instruction ID: c5c9d762b5dac9ae5e2b2149ae53ce4e6995b9b1a3f8e336075141f66c144dfa
                              • Opcode Fuzzy Hash: 8d2a4aa2ab7e329685ea82b2eb22216d2f52d4cefc6765a04c2d9111d036c5f8
                              • Instruction Fuzzy Hash: 89511A72615744C6EA60EF2AE44439E77B4F389B91F140129EBCD47B66DB38D562CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 45e8d6af9c14fee518981ba34569510195d0e1be7be82232c76027dd83702c2e
                              • Instruction ID: 659229f40abf510bcb494def16691c1f4eb47b47c495557831e3e0854eb91f79
                              • Opcode Fuzzy Hash: 45e8d6af9c14fee518981ba34569510195d0e1be7be82232c76027dd83702c2e
                              • Instruction Fuzzy Hash: 9541B532B14A8086EB20CF25E4447DA77A0F798B94F844039EE8D87798DF7CC646C740
                              APIs
                              • RegOpenKeyExW.ADVAPI32 ref: 000000013FA50984
                              • RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,?,80000000,{B41DB860-8EE4-11D2-9906-E49FADC173CA},?,000000013FA44549), ref: 000000013FA5099E
                                • Part of subcall function 000000013FA50F30: RegCloseKey.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000013FA42A13), ref: 000000013FA50F3D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: CloseDeleteOpenValue
                              • String ID: {B41DB860-8EE4-11D2-9906-E49FADC173CA}
                              • API String ID: 849931509-2245766904
                              • Opcode ID: 2d210fb1e4e1126dc413cebfd423782a5d968d7b236636aece2cc9d099276581
                              • Instruction ID: bf53f9b626ddd84bcbdf80248fe37de9516f3222f293bb47439a836ebddd0b78
                              • Opcode Fuzzy Hash: 2d210fb1e4e1126dc413cebfd423782a5d968d7b236636aece2cc9d099276581
                              • Instruction Fuzzy Hash: AC11C671B2468081FA50AB52F8557EBB7A1ABC5FD0F405039BD8E477AADF28C74B8700
                              APIs
                              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FA42317), ref: 000000013FA5722C
                              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FA42317), ref: 000000013FA57272
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.425415701.000000013FA41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 000000013FA40000, based on PE: true
                              • Associated: 00000004.00000002.425411514.000000013FA40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425421662.000000013FA72000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425428933.000000013FA84000.00000004.00000001.01000000.0000000C.sdmpDownload File
                              • Associated: 00000004.00000002.425440793.000000013FA8F000.00000002.00000001.01000000.0000000C.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_13fa40000_Uninstall.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: f6114de55563274d79aa21e798b23dcadcad471fd49af5cc00c3ac97ad5869d3
                              • Instruction ID: 8e3e5bb931f92b6abea828d25af3f32330783e31ef201d619abbb1924c8805c0
                              • Opcode Fuzzy Hash: f6114de55563274d79aa21e798b23dcadcad471fd49af5cc00c3ac97ad5869d3
                              • Instruction Fuzzy Hash: B1111832614B8482EB218F15F444399B7E5F788B94F584229EECD17B69DF3DCA56CB00