Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S34C65xU.exe

Overview

General Information

Sample name:S34C65xU.exe
Analysis ID:1428818
MD5:1cd84bbd0b0dc7c19bedc0f5d292070b
SHA1:68840931dfaf6652cec3165b79de3daa9c100b64
SHA256:58ec960ce6f2f0c2f04fb70915767bb2caebf6a7b63411e92fbee6cc9e9bbad7
Infos:

Detection

Score:39
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:48
Range:0 - 100

Signatures

Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample crashes during execution, try analyze it on another analysis machine
  • System is w10x64_ra
  • S34C65xU.exe (PID: 5760 cmdline: "C:\Users\user\Desktop\S34C65xU.exe" MD5: 1CD84BBD0B0DC7C19BEDC0F5D292070B)
    • Samsung_Driver_Installer.exe (PID: 4560 cmdline: "C:\Driver\Samsung_Driver_Installer.exe" MD5: 15770FC2AC6D46F841CB5B8E3C453F32)
      • WerFault.exe (PID: 5336 cmdline: C:\Windows\system32\WerFault.exe -u -p 4560 -s 1800 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: S34C65xU.exeJoe Sandbox ML: detected

Compliance

barindex
Source: S34C65xU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: S34C65xU.exeStatic PE information: certificate valid
Source: C:\Driver\Samsung_Driver_Installer.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: S34C65xU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: UxTheme.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rsaenh.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: fastprox.pdbRSDS$ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rsaenh.pdbRSDS! source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptbase.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imagehlp.pdbRSDS y= source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcrypt.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: advapi32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ucrtbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemcomn.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcrt.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorjit.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: crypt32.pdbRSDSii source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptsp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: advapi32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32v582.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ws2_32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: CLBCatQ.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: profapi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shlwapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernel32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: userenv.pdbRSDSo source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msasn1.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorsec.pdbRSDSjw) source: WER3508.tmp.mdmp.5.dr
Source: Binary string: win32u.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WLDP.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcr80.AMD64.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoreei.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoree.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imm32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: oleaut32.pdbRSDS/ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ws2_32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcryptprimitives.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdbH source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcrt.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gpapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imm32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ole32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: version.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernel32.pdbRSDSJ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Management.pdbRSDSv3i source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msasn1.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WindowsCodecs.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorlib.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdb source: S34C65xU.exe, 00000000.00000003.1110186783.0000000002912000.00000004.00000020.00020000.00000000.sdmp, WER3508.tmp.mdmp.5.dr, Samsung_Driver_Installer.exe.0.dr
Source: Binary string: comctl32v582.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Kernel.Appcore.pdbRSDSX source: WER3508.tmp.mdmp.5.dr
Source: Binary string: DWrite.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Windows.Storage.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: combase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Drawing.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Management.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemprox.pdbRSDSo source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcr80.AMD64.pdbRSDSY source: WER3508.tmp.mdmp.5.dr
Source: Binary string: apphelp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: user32.pdbRSDS(. source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernelbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorlib.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rpcrt4.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32full.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: DWrite.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: UxTheme.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: win32u.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rpcrt4.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shcore.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcrypt.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gpapi.pdbRSDS+ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wmiutils.pdbRSDSk source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Windows.Storage.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shell32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoree.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcp_win.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: userenv.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcp_win.pdbRSDSO<+ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ntdll.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imagehlp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32full.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorsec.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wmiutils.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdiplus.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorwks.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: profapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WindowsCodecs.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: sechost.pdbRSDS2L source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WMINet_Utils.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ucrtbase.pdbRSDS:r source: WER3508.tmp.mdmp.5.dr
Source: Binary string: apphelp.pdbRSDSM source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WLDP.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorjit.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: sechost.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shcore.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shlwapi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msctf.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernelbase.pdbRSDS" source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemcomn.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: fastprox.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemsvc.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msctf.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Amsi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: version.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wintrust.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdiplus.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Drawing.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: user32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Kernel.Appcore.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ole32.pdbRSDS*= source: WER3508.tmp.mdmp.5.dr
Source: Binary string: CLBCatQ.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WMINet_Utils.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shell32.pdbRSDSE source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoreei.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcryptprimitives.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ntdll.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Amsi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: oleaut32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorwks.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wintrust.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemsvc.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: combase.pdbRSDSV source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptsp.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\KHK\Source\git\alzip-windows\alzip-windows.v11\ALZip\Bin\EGGSFX.pdb source: S34C65xU.exe, S34C65xU.exe, 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: IconCodecService.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemprox.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: crypt32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: IconCodecService.pdb source: WER3508.tmp.mdmp.5.dr
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0040420F __EH_prolog3_GS,_memset,FindFirstFileW,RemoveDirectoryW,GetFileAttributesW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_0040420F
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00406766 __EH_prolog3_GS,GetDlgItem,_memset,GetWindowTextW,MessageBoxW,FindFirstFileW,MessageBoxW,FindClose,EndDialog,0_2_00406766
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00406CB9 __EH_prolog3_GS,LoadIconW,SendMessageW,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,FindFirstFileW,FindClose,_memset,PathCompactPathExW,SetWindowTextW,SetWindowTextW,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,_memset,SHGetFileInfoW,SendMessageW,SendMessageW,SendMessageW,0_2_00406CB9
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0042FC86 FindFirstFileW,GetLastError,FindClose,SHGetFileInfoW,SHGetFileInfoW,SHGetFileInfoW,SHGetFileInfoW,0_2_0042FC86
Source: C:\Driver\Samsung_Driver_Installer.exeCode function: 4x nop then jmp 00007FF9D1DB2955h2_2_00007FF9D1DB1519
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: S34C65xU.exe, Samsung_Driver_Installer.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: C:\Users\user\Desktop\S34C65xU.exeFile created: C:\Driver\Manual_S34C65xU\S34C65xU.catJump to dropped file
Source: C:\Users\user\Desktop\S34C65xU.exeFile created: C:\Driver\S34C65xU.catJump to dropped file
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004100730_2_00410073
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00405E690_2_00405E69
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043A0600_2_0043A060
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043A3590_2_0043A359
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0040E3000_2_0040E300
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043830F0_2_0043830F
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004323FD0_2_004323FD
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004386CB0_2_004386CB
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043C7620_2_0043C762
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004487AB0_2_004487AB
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004348680_2_00434868
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0041082C0_2_0041082C
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004408B00_2_004408B0
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0044095D0_2_0044095D
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0045096C0_2_0045096C
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00438A0F0_2_00438A0F
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0044EA8B0_2_0044EA8B
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00434A970_2_00434A97
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00438DB10_2_00438DB1
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00440E320_2_00440E32
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00438EB60_2_00438EB6
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0044EFCF0_2_0044EFCF
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004390E40_2_004390E4
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004331B60_2_004331B6
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004412060_2_00441206
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043D2DD0_2_0043D2DD
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004112BA0_2_004112BA
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0044F5130_2_0044F513
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004416120_2_00441612
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0040F7470_2_0040F747
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00441A320_2_00441A32
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00439A850_2_00439A85
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0040FB0D0_2_0040FB0D
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0044FC0B0_2_0044FC0B
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00433E230_2_00433E23
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00439EB20_2_00439EB2
Source: C:\Driver\Samsung_Driver_Installer.exeCode function: 2_2_00007FF9D1DB09792_2_00007FF9D1DB0979
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: String function: 0044396C appears 43 times
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: String function: 00442764 appears 51 times
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: String function: 004426FB appears 221 times
Source: C:\Driver\Samsung_Driver_Installer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4560 -s 1800
Source: S34C65xU.exe, 00000000.00000003.1110186783.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSamsung_Driver_Installer.exeL vs S34C65xU.exe
Source: S34C65xU.exe, 00000000.00000003.1196372439.0000000000644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSamsung_Driver_Installer.exeL vs S34C65xU.exe
Source: S34C65xU.exe, 00000000.00000000.1108134487.0000000000488000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEGGSFX.sfx. vs S34C65xU.exe
Source: S34C65xU.exe, 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEGGSFX.sfx. vs S34C65xU.exe
Source: S34C65xU.exeBinary or memory string: OriginalFilenameEGGSFX.sfx. vs S34C65xU.exe
Source: S34C65xU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus39.evad.winEXE@4/12@0/0
Source: C:\Driver\Samsung_Driver_Installer.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4560
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\729adeb0-488a-4a23-aa81-8d6b88d7ec51Jump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeCommand line argument: KD0_2_00444B30
Source: C:\Users\user\Desktop\S34C65xU.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeFile read: C:\Users\user\Desktop\S34C65xU.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\S34C65xU.exe "C:\Users\user\Desktop\S34C65xU.exe"
Source: C:\Users\user\Desktop\S34C65xU.exeProcess created: C:\Driver\Samsung_Driver_Installer.exe "C:\Driver\Samsung_Driver_Installer.exe"
Source: C:\Driver\Samsung_Driver_Installer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4560 -s 1800
Source: C:\Users\user\Desktop\S34C65xU.exeProcess created: C:\Driver\Samsung_Driver_Installer.exe "C:\Driver\Samsung_Driver_Installer.exe" Jump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: version.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: riched20.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: usp10.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: msls31.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: amsi.dllJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Driver\Samsung_Driver_Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
Source: S34C65xU.exeStatic PE information: certificate valid
Source: S34C65xU.exeStatic file information: File size 3593752 > 1048576
Source: C:\Driver\Samsung_Driver_Installer.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: S34C65xU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: UxTheme.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rsaenh.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: fastprox.pdbRSDS$ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rsaenh.pdbRSDS! source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptbase.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imagehlp.pdbRSDS y= source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcrypt.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: advapi32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ucrtbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemcomn.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcrt.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorjit.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: crypt32.pdbRSDSii source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptsp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: advapi32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32v582.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ws2_32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: CLBCatQ.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: profapi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shlwapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernel32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: userenv.pdbRSDSo source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msasn1.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorsec.pdbRSDSjw) source: WER3508.tmp.mdmp.5.dr
Source: Binary string: win32u.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WLDP.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcr80.AMD64.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoreei.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoree.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imm32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: oleaut32.pdbRSDS/ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ws2_32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcryptprimitives.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdbH source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcrt.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gpapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imm32.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ole32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: version.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernel32.pdbRSDSJ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Management.pdbRSDSv3i source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msasn1.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WindowsCodecs.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorlib.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdb source: S34C65xU.exe, 00000000.00000003.1110186783.0000000002912000.00000004.00000020.00020000.00000000.sdmp, WER3508.tmp.mdmp.5.dr, Samsung_Driver_Installer.exe.0.dr
Source: Binary string: comctl32v582.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Kernel.Appcore.pdbRSDSX source: WER3508.tmp.mdmp.5.dr
Source: Binary string: DWrite.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Windows.Storage.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: combase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Drawing.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Management.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\Visual Studio 2019\Projects\MonitorDriverWinForms\obj\Debug\Samsung_Driver_Installer.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemprox.pdbRSDSo source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcr80.AMD64.pdbRSDSY source: WER3508.tmp.mdmp.5.dr
Source: Binary string: apphelp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: user32.pdbRSDS(. source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernelbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorlib.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rpcrt4.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32full.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: DWrite.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: UxTheme.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: win32u.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: rpcrt4.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shcore.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcrypt.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gpapi.pdbRSDS+ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wmiutils.pdbRSDSk source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Windows.Storage.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shell32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoree.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcp_win.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: userenv.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msvcp_win.pdbRSDSO<+ source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ntdll.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: imagehlp.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32full.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorsec.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wmiutils.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdiplus.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorwks.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdi32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: profapi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WindowsCodecs.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: sechost.pdbRSDS2L source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WMINet_Utils.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ucrtbase.pdbRSDS:r source: WER3508.tmp.mdmp.5.dr
Source: Binary string: apphelp.pdbRSDSM source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WLDP.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorjit.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: sechost.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shcore.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shlwapi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msctf.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: kernelbase.pdbRSDS" source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemcomn.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: fastprox.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemsvc.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: msctf.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Amsi.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: version.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wintrust.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: gdiplus.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Drawing.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: user32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Kernel.Appcore.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ole32.pdbRSDS*= source: WER3508.tmp.mdmp.5.dr
Source: Binary string: CLBCatQ.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: WMINet_Utils.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: shell32.pdbRSDSE source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptbase.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscoreei.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: bcryptprimitives.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: ntdll.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: Amsi.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: oleaut32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: mscorwks.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wintrust.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemsvc.pdbRSDS source: WER3508.tmp.mdmp.5.dr
Source: Binary string: combase.pdbRSDSV source: WER3508.tmp.mdmp.5.dr
Source: Binary string: cryptsp.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: D:\KHK\Source\git\alzip-windows\alzip-windows.v11\ALZip\Bin\EGGSFX.pdb source: S34C65xU.exe, S34C65xU.exe, 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: IconCodecService.pdbRSDS8 source: WER3508.tmp.mdmp.5.dr
Source: Binary string: comctl32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: wbemprox.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: crypt32.pdb source: WER3508.tmp.mdmp.5.dr
Source: Binary string: IconCodecService.pdb source: WER3508.tmp.mdmp.5.dr
Source: Samsung_Driver_Installer.exe.0.drStatic PE information: 0xC4A09AAF [Sun Jul 15 05:54:55 2074 UTC]
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004136CA LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004136CA
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004427D3 push ecx; ret 0_2_004427E6
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004439B1 push ecx; ret 0_2_004439C4
Source: C:\Driver\Samsung_Driver_Installer.exeCode function: 2_2_00007FF9D1DB4388 push EDE0B849h; retf 2_2_00007FF9D1DB43A8
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\S34C65xU.exeFile created: C:\Driver\Samsung_Driver_Installer.exeJump to dropped file
Source: C:\Driver\Samsung_Driver_Installer.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Driver\Samsung_Driver_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity Where DeviceID Like &apos;DISPLAY%&apos;
Source: C:\Driver\Samsung_Driver_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_VideoController
Source: C:\Driver\Samsung_Driver_Installer.exeMemory allocated: F60000 memory reserve | memory write watchJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeMemory allocated: 1AC00000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-40763
Source: C:\Users\user\Desktop\S34C65xU.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-39453
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0040420F __EH_prolog3_GS,_memset,FindFirstFileW,RemoveDirectoryW,GetFileAttributesW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_0040420F
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00406766 __EH_prolog3_GS,GetDlgItem,_memset,GetWindowTextW,MessageBoxW,FindFirstFileW,MessageBoxW,FindClose,EndDialog,0_2_00406766
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00406CB9 __EH_prolog3_GS,LoadIconW,SendMessageW,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,FindFirstFileW,FindClose,_memset,PathCompactPathExW,SetWindowTextW,SetWindowTextW,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetWindowTextW,SetWindowTextW,SetWindowTextW,SetWindowTextW,_memset,SHGetFileInfoW,SendMessageW,SendMessageW,SendMessageW,0_2_00406CB9
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0042FC86 FindFirstFileW,GetLastError,FindClose,SHGetFileInfoW,SHGetFileInfoW,SHGetFileInfoW,SHGetFileInfoW,0_2_0042FC86
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 b8 c1 67 22 50 4e-8b 1e 52 5b b1 3b 4a 34
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\S34C65xU.exeAPI call chain: ExitProcess graph end nodegraph_0-40764
Source: C:\Driver\Samsung_Driver_Installer.exeProcess queried: DebugPortJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043E025 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043E025
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_004136CA LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004136CA
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043E025 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043E025
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00444D9E __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00444D9E
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00449993 SetUnhandledExceptionFilter,0_2_00449993
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043DE6E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043DE6E
Source: C:\Driver\Samsung_Driver_Installer.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00408E7F _wcslen,_memset,ShellExecuteExW,WaitForSingleObject,WaitForSingleObject,PeekMessageW,TranslateMessage,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle,0_2_00408E7F
Source: C:\Users\user\Desktop\S34C65xU.exeProcess created: C:\Driver\Samsung_Driver_Installer.exe "C:\Driver\Samsung_Driver_Installer.exe" Jump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043A2F5 cpuid 0_2_0043A2F5
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: GetLocaleInfoA,0_2_0044C1AE
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: GetLocaleInfoW,0_2_0041F0FE
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Driver\Samsung_Driver_Installer.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_0043FA7B GetSystemTimeAsFileTime,__aulldiv,0_2_0043FA7B
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00445936 __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_00445936
Source: C:\Users\user\Desktop\S34C65xU.exeCode function: 0_2_00405E69 __EH_prolog3_GS,GetVersion,MessageBoxW,PostMessageW,GetDlgItem,GetDlgItem,SendMessageW,GetDlgItem,SetWindowTextW,SetWindowTextW,GetDlgItem,ShowWindow,GetDlgItem,ShowWindow,GetDlgItem,SetWindowTextW,SetFocus,ShowWindow,KiUserCallbackDispatcher,EnableWindow,ShowWindow,GetDlgItem,GetDlgItem,SendMessageW,ShellExecuteW,SetWindowTextW,EnableWindow,SetTimer,PostMessageW,0_2_00405E69
Source: C:\Driver\Samsung_Driver_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
22
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts11
Process Injection
1
Disable or Modify Tools
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager231
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS22
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script31
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials134
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
S34C65xU.exe8%ReversingLabs
S34C65xU.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Driver\Samsung_Driver_Installer.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            http://www.fontbureau.com/designers?Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://upx.sf.netAmcache.hve.5.drfalse
                high
                http://www.fontbureau.com/designersSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.krSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comlSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8Samsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://www.sakkal.comSamsung_Driver_Installer.exe, 00000002.00000002.1192644366.000000001CD02000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                No contacted IP infos
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1428818
                                Start date and time:2024-04-19 17:00:12 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 8s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:21
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:S34C65xU.exe
                                Detection:SUS
                                Classification:sus39.evad.winEXE@4/12@0/0
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 109
                                • Number of non-executed functions: 103
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, evoke-windowsservices-tas.msedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target Samsung_Driver_Installer.exe, PID 4560 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtSetInformationFile calls found.
                                • VT rate limit hit for: S34C65xU.exe
                                TimeTypeDescription
                                17:00:49API Interceptor1x Sleep call for process: WerFault.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):11673
                                Entropy (8bit):7.188984887935079
                                Encrypted:false
                                SSDEEP:192:VqgJyOtSECFF3Ee2yKO3FWQFyG74+Wg5rH0BJhHX01k9z3AZ/Cn:Ab3FRwG7VdVUB3R9ziy
                                MD5:4A1FD4ED8362D1C313C20893F0F438D8
                                SHA1:FB2E9085857D12852E715E12DB1D6EB20962F9A4
                                SHA-256:83B3563350106F5217C401C17CCA42B7D547604BCE40D9BFACB1EF65A2A5672F
                                SHA-512:FA5166BC6ECF1C4E78DD728335A5042BF5227B30C14882B571430630964CB72743C2730F74DA5157DCF043ED84EC81F7029C7A9E029DCA911684A068CB959A4B
                                Malicious:false
                                Reputation:low
                                Preview:0.-...*.H........-.0.-....1.0...`.H.e......0..K..+.....7.....<0..80...+.....7.....=....r.L..j..7yo..230414051838Z0...+.....7.....0..Z0....R1.7.A.F.3.2.2.9.6.0.2.7.3.5.A.2.6.4.6.9.D.2.6.7.E.6.6.D.6.5.B.2.E.6.3.5.2.E.9.7...1..Q0<..+.....7...1.0,...F.i.l.e........s.3.4.c.6.5.x.u...i.c.m...0E..+.....7...17050...+.....7.......0!0...+..........2)`'5.di.g.me..5..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0f..+.....7...1X0V...O.S.A.t.t.r.......@2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.1.0...0...0....R5.E.A.E.1.E.C.3.D.C.7.4.0.B.E.2.4.4.D.F.D.D.A.B.6.6.7.4.2.3.B.C.8.7.3.9.3.2.F.D...1..Q0<..+.....7...1.0,...F.i.l.e........s.3.4.c.6.5.x.u...i.n.f...0E..+.....7...17050...+.....7.......0!0...+........^....t..D..ft#..92.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0f..+.....7...1X0V...O.S.A.t.t.r.......@2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.1.0...0.......0...0
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:Microsoft color profile 2.2, RGB/XYZ-mntr device by SEC, 536 bytes, 14-3-2017 13:56:00, PCS, 0x3030303030303030 MD5 "Samsung S27C90xP"
                                Category:dropped
                                Size (bytes):536
                                Entropy (8bit):3.8303684686949593
                                Encrypted:false
                                SSDEEP:12:YNWcXOXOX+zWl58AskMzcXAlNdWL2GawtywRtRtTF2CL:BcuuZl58uMbletXXFFVL
                                MD5:6C345E7641695AA518D305FE0D24694D
                                SHA1:17AF3229602735A26469D267E66D65B2E6352E97
                                SHA-256:AF8DC473F567F0885738F44AD02122C8CA27BBDEC1D7D77B74F4044A2762A591
                                SHA-512:834126AB9F2D42772503469EDB497955905C7A73EADE70E541A578C5647D64A41C542A98A1850560D1E1668C2D687E97EC9F504EF64463FF90564AC6F466E4D8
                                Malicious:false
                                Reputation:low
                                Preview:......... ..mntrRGB XYZ .........8..acspMSFT....SEC............................-SEC.00000000-00000000-00000000-00000000.............desc.......prXYZ...`....gXYZ...t....bXYZ........wtpt........rTRC........gTRC........bTRC........cprt.......8desc........Samsung S27C90xP....................................................................................XYZ .......V..E.....XYZ ......@.........XYZ ......$........XYZ ...............\curv.........3..curv.........3..curv.........3..text....Copyright(c) 2023 Samsung Electronics Co., Ltd..
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:Windows setup INFormation
                                Category:dropped
                                Size (bytes):5646
                                Entropy (8bit):5.52461206696134
                                Encrypted:false
                                SSDEEP:96:sGsM825xMs4MsKc8Msqg9sJ7m5/5UGtrMT:s7M8ExmsYBQ5/5UGtC
                                MD5:F5EF5F497119CE33CC67885EBC562AE6
                                SHA1:5EAE1EC3DC740BE244DFDDAB667423BC873932FD
                                SHA-256:35768E8E4FD77DA64EC94A00AA842C224321F89690ABC5316372B289B09B6B49
                                SHA-512:1296B94189C18085F4757CAA5F099AFACBD7916D38A97B63F66769EB661641AB966069674623152B31B4CA3A7911535FDBA7B0075FC9B741E753B452BE85A45A
                                Malicious:false
                                Reputation:low
                                Preview:;==================================================..; S34C65xU.inf 04/14/2023 ver. 1.0Y..;..; Copyright 2023 Samsung Electronics Corporation..;..; This is a Setup information file for Samsung Monitor. ..;==================================================....[Version]..signature="$CHICAGO$"..Class=Monitor..ClassGuid={4D36E96E-E325-11CE-BFC1-08002BE10318}..Provider=%Samsung%..CatalogFile=S34C65xU.cat..DriverVer=04/14/2023,1.0.0.0....;==================================================..[ControlFlags]..ExcludeFromSelect.nt=Monitor\SAM73FC..ExcludeFromSelect.nt=Monitor\SAM73FD..ExcludeFromSelect.nt=Monitor\SAM73FB..ExcludeFromSelect.nt=Monitor\SAM73FF..ExcludeFromSelect.nt=Monitor\SAM73FE..ExcludeFromSelect.nt=Monitor\SAM7401..ExcludeFromSelect.nt=Monitor\SAM7400....[DestinationDirs]..DefaultDestDir = 11..S34C65xU_HDMI_20.CopyFiles = 23..S34C65xU_HDMI_14.CopyFiles = 23..S34C65xU_VRR.CopyFiles = 23..S34C65xU_DP_11.CopyFiles = 23..S34C65xU_DP_14.CopyFiles = 23..S34C65xU_USBC_11.CopyFiles = 2
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):11673
                                Entropy (8bit):7.188984887935079
                                Encrypted:false
                                SSDEEP:192:VqgJyOtSECFF3Ee2yKO3FWQFyG74+Wg5rH0BJhHX01k9z3AZ/Cn:Ab3FRwG7VdVUB3R9ziy
                                MD5:4A1FD4ED8362D1C313C20893F0F438D8
                                SHA1:FB2E9085857D12852E715E12DB1D6EB20962F9A4
                                SHA-256:83B3563350106F5217C401C17CCA42B7D547604BCE40D9BFACB1EF65A2A5672F
                                SHA-512:FA5166BC6ECF1C4E78DD728335A5042BF5227B30C14882B571430630964CB72743C2730F74DA5157DCF043ED84EC81F7029C7A9E029DCA911684A068CB959A4B
                                Malicious:false
                                Reputation:low
                                Preview:0.-...*.H........-.0.-....1.0...`.H.e......0..K..+.....7.....<0..80...+.....7.....=....r.L..j..7yo..230414051838Z0...+.....7.....0..Z0....R1.7.A.F.3.2.2.9.6.0.2.7.3.5.A.2.6.4.6.9.D.2.6.7.E.6.6.D.6.5.B.2.E.6.3.5.2.E.9.7...1..Q0<..+.....7...1.0,...F.i.l.e........s.3.4.c.6.5.x.u...i.c.m...0E..+.....7...17050...+.....7.......0!0...+..........2)`'5.di.g.me..5..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0f..+.....7...1X0V...O.S.A.t.t.r.......@2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.1.0...0...0....R5.E.A.E.1.E.C.3.D.C.7.4.0.B.E.2.4.4.D.F.D.D.A.B.6.6.7.4.2.3.B.C.8.7.3.9.3.2.F.D...1..Q0<..+.....7...1.0,...F.i.l.e........s.3.4.c.6.5.x.u...i.n.f...0E..+.....7...17050...+.....7.......0!0...+........^....t..D..ft#..92.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0f..+.....7...1X0V...O.S.A.t.t.r.......@2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.1.0...0.......0...0
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:Microsoft color profile 2.2, RGB/XYZ-mntr device by SEC, 536 bytes, 14-3-2017 13:56:00, PCS, 0x3030303030303030 MD5 "Samsung S27C90xP"
                                Category:dropped
                                Size (bytes):536
                                Entropy (8bit):3.8303684686949593
                                Encrypted:false
                                SSDEEP:12:YNWcXOXOX+zWl58AskMzcXAlNdWL2GawtywRtRtTF2CL:BcuuZl58uMbletXXFFVL
                                MD5:6C345E7641695AA518D305FE0D24694D
                                SHA1:17AF3229602735A26469D267E66D65B2E6352E97
                                SHA-256:AF8DC473F567F0885738F44AD02122C8CA27BBDEC1D7D77B74F4044A2762A591
                                SHA-512:834126AB9F2D42772503469EDB497955905C7A73EADE70E541A578C5647D64A41C542A98A1850560D1E1668C2D687E97EC9F504EF64463FF90564AC6F466E4D8
                                Malicious:false
                                Reputation:low
                                Preview:......... ..mntrRGB XYZ .........8..acspMSFT....SEC............................-SEC.00000000-00000000-00000000-00000000.............desc.......prXYZ...`....gXYZ...t....bXYZ........wtpt........rTRC........gTRC........bTRC........cprt.......8desc........Samsung S27C90xP....................................................................................XYZ .......V..E.....XYZ ......@.........XYZ ......$........XYZ ...............\curv.........3..curv.........3..curv.........3..text....Copyright(c) 2023 Samsung Electronics Co., Ltd..
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:Windows setup INFormation
                                Category:dropped
                                Size (bytes):5646
                                Entropy (8bit):5.52461206696134
                                Encrypted:false
                                SSDEEP:96:sGsM825xMs4MsKc8Msqg9sJ7m5/5UGtrMT:s7M8ExmsYBQ5/5UGtC
                                MD5:F5EF5F497119CE33CC67885EBC562AE6
                                SHA1:5EAE1EC3DC740BE244DFDDAB667423BC873932FD
                                SHA-256:35768E8E4FD77DA64EC94A00AA842C224321F89690ABC5316372B289B09B6B49
                                SHA-512:1296B94189C18085F4757CAA5F099AFACBD7916D38A97B63F66769EB661641AB966069674623152B31B4CA3A7911535FDBA7B0075FC9B741E753B452BE85A45A
                                Malicious:false
                                Reputation:low
                                Preview:;==================================================..; S34C65xU.inf 04/14/2023 ver. 1.0Y..;..; Copyright 2023 Samsung Electronics Corporation..;..; This is a Setup information file for Samsung Monitor. ..;==================================================....[Version]..signature="$CHICAGO$"..Class=Monitor..ClassGuid={4D36E96E-E325-11CE-BFC1-08002BE10318}..Provider=%Samsung%..CatalogFile=S34C65xU.cat..DriverVer=04/14/2023,1.0.0.0....;==================================================..[ControlFlags]..ExcludeFromSelect.nt=Monitor\SAM73FC..ExcludeFromSelect.nt=Monitor\SAM73FD..ExcludeFromSelect.nt=Monitor\SAM73FB..ExcludeFromSelect.nt=Monitor\SAM73FF..ExcludeFromSelect.nt=Monitor\SAM73FE..ExcludeFromSelect.nt=Monitor\SAM7401..ExcludeFromSelect.nt=Monitor\SAM7400....[DestinationDirs]..DefaultDestDir = 11..S34C65xU_HDMI_20.CopyFiles = 23..S34C65xU_HDMI_14.CopyFiles = 23..S34C65xU_VRR.CopyFiles = 23..S34C65xU_DP_11.CopyFiles = 23..S34C65xU_DP_14.CopyFiles = 23..S34C65xU_USBC_11.CopyFiles = 2
                                Process:C:\Users\user\Desktop\S34C65xU.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3338752
                                Entropy (8bit):7.994420891570565
                                Encrypted:true
                                SSDEEP:98304:L50fzFWwF9GHRm707c97Yj7pdFkhebQHGwx/:V0fJ8xU7Yjld2h8QmO
                                MD5:15770FC2AC6D46F841CB5B8E3C453F32
                                SHA1:271BFDACFBF864A5A42E4E99C8687BD7E76B6381
                                SHA-256:9E81D01ACF9F8FBAB2D551668B29A8E6F0017EE79D651BD3320BF0E51282CC5A
                                SHA-512:2C944A34C8026494DA7600CD2713AA9C75D385D7737B8F820F9D75840F58A239CE48426CBC8A1BD93C6310426954608DE8974F55B69AD731B5062C4F2DF038A4
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...2...........2.. ....2...@.. ....................... 3.......3...@.................................p.2.O.....2...............2..*....3.......2.8............................................ ............... ..H............text....2.. ....2................. ..`.rsrc.........2.......2.............@..@.reloc........3.......2.............@..B..................2.....H........1..P>..........do..`W2.........................................^..}.....(.......(.....*.0..?.........(....o....r...po ....s!.....o"....o#.....o"....o$.....o%...&*..0..+.........,..{.......+....,...{....o........(&....*6..s'...}....*z..}.....((......(......(.....*.0...........r...p.r...ps)......o*...o+....+H.o,...t.......re..po-...o...........,!.r}..p.re..po-...o....r...p(/......o0...-....,..o.......r...po1.......,.r...p....+...*...........Ts.......0..t........r...p.r
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.2073508070152252
                                Encrypted:false
                                SSDEEP:192:GiyU/wHD0kOiRaB89oHomV4b2svwuZFuO38XFzuiFhZ24lO8zp:0U/wHwkOiRava3ezuiFhY4lO89
                                MD5:CDF213E8902C90D195DDCF9D1A1973DB
                                SHA1:A85EDEA62173510C5436296221540C47E247619A
                                SHA-256:9AC2858EDE5C233203D76D0C2B14CF21F2E8D77E8795053FDC5797040E72F9B9
                                SHA-512:829FCD965EDCFD5BD60F85FF9B1180A8472D39D9C09A30EC782A29C1F160A0CDE4BA5250FF0A47310640CA541E0CF3EDA4CFB4E76440BAA0EA8D5EA97C91370D
                                Malicious:false
                                Reputation:low
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.0.1.2.4.4.3.5.6.3.3.0.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.0.1.2.4.4.4.8.2.6.3.2.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.0.3.b.f.1.7.d.-.4.e.1.a.-.4.0.9.e.-.8.3.a.e.-.3.b.c.1.c.c.2.0.5.2.f.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.0.1.a.0.2.3.5.-.3.6.6.a.-.4.4.6.7.-.8.3.d.7.-.4.4.8.b.1.9.c.3.f.d.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.a.m.s.u.n.g._.D.r.i.v.e.r._.I.n.s.t.a.l.l.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.a.m.s.u.n.g._.D.r.i.v.e.r._.I.n.s.t.a.l.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.d.0.-.0.0.0.1.-.0.0.1.7.-.e.1.c.6.-.b.7.5.8.6.a.9.2.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.9.6.c.e.8.7.0.6.c.4.b.5.b.3.0.6.7.4.0.6.8.e.8.5.5.9.5.f.e.4.8.0.0.0.0.0.0.0.0.!.0.0.0.0.2.7.1.b.f.d.a.c.f.b.f.8.6.4.a.5.a.4.2.e.4.
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:Mini DuMP crash report, 15 streams, Fri Apr 19 15:00:44 2024, 0x260521 type
                                Category:dropped
                                Size (bytes):9626230
                                Entropy (8bit):3.6323378769533936
                                Encrypted:false
                                SSDEEP:98304:r2Qg+pPrCGGvI/qa6jPW4wRCmnHPqYaFozy/:2BmnHyYaYy/
                                MD5:1918906E12A8CE66B71ACCE2DFBD7F7F
                                SHA1:ADDC953860B92C7D067D4F2F5F9193585C33E688
                                SHA-256:5A0F3137FDB0E3701C6A88FFEFE7C99BBFC1AA241E5D33D2A055C041E67F8FFF
                                SHA-512:864F019B47E168504F90984160D94AF889268243631428E96B7E4AECC3B781D2E607481353F06D060647C0BCC1333C8CE5EBB560DADDB33A216E26A78D2F79C2
                                Malicious:false
                                Reputation:low
                                Preview:MDMP..a..... ........."f!.&.................................l...l&...........&..........|F......dO...0..........`.......8...........T...............DJ..........0L..................................................................eJ.......L......Lw......................T............."f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8874
                                Entropy (8bit):3.7050703525647086
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJ+tVbg6YE3i6CNgmfdbFprM89b+VKfFSqm:R6lXJ8e6YEy6ogmfdbx+YfF2
                                MD5:951ED134794E45BD675F1C8DCA7B4DE7
                                SHA1:1BCCA6DF83BEB427383395646A086BAD477D2AD5
                                SHA-256:511DB32EE7DCE4A608329F86ED7EF9B0CE62FA49E3B71AB8558D0E235230B339
                                SHA-512:369643092E839A8B1CA1328562F637A8B5F9DCAAEE21C11E63E1D575952B7737CF5956089E03D6725D38BD8EAF998D623C85DABF69CBAAE9E39ED2CE61F6E7A0
                                Malicious:false
                                Reputation:low
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.5.6.0.<./.P.i.
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4848
                                Entropy (8bit):4.5306134415254675
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zs/Jg771I9t6rWda80ayYm8M4J4j2nF/Qyq85ElW8c3vnSoSxod:uIjfhI7a7dljJ3QfcaTOd
                                MD5:7817A2D847C9603AA0A2545F5EC6DC20
                                SHA1:28D9331035BBB3D463C09F3A1353CA22364331EA
                                SHA-256:D9C29B8663BD3E5C6882F9EF4337353947BD3A87172A443F95BD7834E2314109
                                SHA-512:3ECFCFDDD33E838899DB7AD46338A734DDF53A7986216EBDAFF7E245F6D9836C493B993A7FDC7C4484D395B328FF26B30600C01AB5A8C4900BA88FB88C840F41
                                Malicious:false
                                Reputation:low
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="286923" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.531123708755197
                                Encrypted:false
                                SSDEEP:6144:RC0egXHGcrp1Xc7dzUx0DhV0HaHLmmOHsxiQbDYSSBRtu8ZmvckxiBIuNRAW39K:1ezphLYsx5bDYFgXhsmqRv
                                MD5:894A2492CC19B45C0A6170D6C0466F49
                                SHA1:3AF211C76608543CBBC047D60951421EFF97051E
                                SHA-256:F75D556D92508DF486B1CB84174E82233D5722432BCDE3333B5C27866A6E31C0
                                SHA-512:1F5CAAFF01BBD4B940FF8EF21981C49A5BCE7706307A5D9025C1B77CF7B8DC336C86EB1F5DF02556D1FAEE765B9F817983A7EAB25394659B3465B7EF5B513CAF
                                Malicious:false
                                Reputation:low
                                Preview:regfL...L....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.k.Yj...............................................................................................................................................................................................................................................................................................................................................B..m........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                Entropy (8bit):7.995785559896405
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.39%
                                • UPX compressed Win32 Executable (30571/9) 0.30%
                                • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                File name:S34C65xU.exe
                                File size:3'593'752 bytes
                                MD5:1cd84bbd0b0dc7c19bedc0f5d292070b
                                SHA1:68840931dfaf6652cec3165b79de3daa9c100b64
                                SHA256:58ec960ce6f2f0c2f04fb70915767bb2caebf6a7b63411e92fbee6cc9e9bbad7
                                SHA512:20770f984a41954ede2643cb9c795e5ad0a2bfb1b09c9425b4ae3f1b786e81be4a687934186b750d8d2f885726df3c5bf55837de903c3a6e1b38ccb0dc231fe4
                                SSDEEP:98304:a5mYPP6dvNQFXgvfATgxunBs/RTvyLGRISVaxA4ESiA8Y:l46dIQ8BspT66RPayA18Y
                                TLSH:88F5333095C8EC05E03B267449A94BB29262CDC4ED2ADC12362D3DC8ED7E67B9D136F5
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......y..i=.}:=.}:=.}:...:<.}:4..:!.}:4..:..}:4..:..}:=.|:..}:4..:6.}:4..:..}:#..:<.}:4..:<.}:Rich=.}:........PE..L......]...........
                                Icon Hash:962b59d8292d3953
                                Entrypoint:0x4873b0
                                Entrypoint Section:UPX1
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5D9A8F18 [Mon Oct 7 01:04:24 2019 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:0
                                File Version Major:5
                                File Version Minor:0
                                Subsystem Version Major:5
                                Subsystem Version Minor:0
                                Import Hash:4422cd285129af661d70fbc1279af032
                                Signature Valid:true
                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                Signature Validation Error:The operation completed successfully
                                Error Number:0
                                Not Before, Not After
                                • 10/12/2021 01:00:00 08/01/2025 00:59:59
                                Subject Chain
                                • CN="Samsung Electronics CO., LTD.", O="Samsung Electronics CO., LTD.", L=Suwon-si, S=Gyeonggi-Do, C=KR, SERIALNUMBER=130111-0006246, OID.1.3.6.1.4.1.311.60.2.1.1=Suwon-si, OID.1.3.6.1.4.1.311.60.2.1.2=Gyeonggi-do, OID.1.3.6.1.4.1.311.60.2.1.3=KR, OID.2.5.4.15=Private Organization
                                Version:3
                                Thumbprint MD5:BA778A10518E1A503A80E58BDF9D8A88
                                Thumbprint SHA-1:A2CF6441659C71F58ABCAFFA7063AC444B575462
                                Thumbprint SHA-256:F8BA472F803A84B8D15DDD555625C1E30C29D05141316D892FD107C519236B0E
                                Serial:02B39B4EBDBAEF8A7D5509C8C58813C3
                                Instruction
                                pushad
                                mov esi, 00459000h
                                lea edi, dword ptr [esi-00058000h]
                                push edi
                                jmp 00007F04A8C94F3Dh
                                nop
                                mov al, byte ptr [esi]
                                inc esi
                                mov byte ptr [edi], al
                                inc edi
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                jc 00007F04A8C94F1Fh
                                mov eax, 00000001h
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                adc eax, eax
                                add ebx, ebx
                                jnc 00007F04A8C94F3Dh
                                jne 00007F04A8C94F5Ah
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                jc 00007F04A8C94F51h
                                dec eax
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                adc eax, eax
                                jmp 00007F04A8C94F06h
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                adc ecx, ecx
                                jmp 00007F04A8C94F84h
                                xor ecx, ecx
                                sub eax, 03h
                                jc 00007F04A8C94F43h
                                shl eax, 08h
                                mov al, byte ptr [esi]
                                inc esi
                                xor eax, FFFFFFFFh
                                je 00007F04A8C94FA7h
                                sar eax, 1
                                mov ebp, eax
                                jmp 00007F04A8C94F3Dh
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                jc 00007F04A8C94EFEh
                                inc ecx
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                jc 00007F04A8C94EF0h
                                add ebx, ebx
                                jne 00007F04A8C94F39h
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                adc ecx, ecx
                                add ebx, ebx
                                jnc 00007F04A8C94F21h
                                jne 00007F04A8C94F3Bh
                                mov ebx, dword ptr [esi]
                                sub esi, FFFFFFFCh
                                adc ebx, ebx
                                jnc 00007F04A8C94F16h
                                add ecx, 02h
                                cmp ebp, FFFFFB00h
                                adc ecx, 02h
                                lea edx, dword ptr [edi+ebp]
                                cmp ebp, FFFFFFFCh
                                jbe 00007F04A8C94F40h
                                mov al, byte ptr [edx]
                                Programming Language:
                                • [ASM] VS2008 SP1 build 30729
                                • [ C ] VS2008 SP1 build 30729
                                • [C++] VS2008 SP1 build 30729
                                • [IMP] VS2008 SP1 build 30729
                                • [RES] VS2008 build 21022
                                • [LNK] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x95c0c0x188.rsrc
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000xdc0c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x36ac180x2a00
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x875580x48UPX1
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                UPX00x10000x580000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                UPX10x590000x2f0000x2e60009c3f36f2fddf096caf4ff5e5d345a17False0.9848645973719676data7.9331856398945595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x880000xe0000xde00685172bbaff39ce28a95280b7ee0ff0eFalse0.7449852195945946data7.004750731092597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x8850c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsKoreanNorth Korea0.4914712153518124
                                RT_ICON0x8850c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsKoreanSouth Korea0.4914712153518124
                                RT_ICON0x893b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsKoreanNorth Korea0.651173285198556
                                RT_ICON0x893b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsKoreanSouth Korea0.651173285198556
                                RT_ICON0x89c640x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsKoreanNorth Korea0.37283236994219654
                                RT_ICON0x89c640x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsKoreanSouth Korea0.37283236994219654
                                RT_ICON0x8a1d00x7965PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedKoreanNorth Korea0.9906039836535058
                                RT_ICON0x8a1d00x7965PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedKoreanSouth Korea0.9906039836535058
                                RT_ICON0x91b3c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600KoreanNorth Korea0.3975103734439834
                                RT_ICON0x91b3c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600KoreanSouth Korea0.3975103734439834
                                RT_ICON0x940e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224KoreanNorth Korea0.43550656660412757
                                RT_ICON0x940e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224KoreanSouth Korea0.43550656660412757
                                RT_ICON0x951940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088KoreanNorth Korea0.4122340425531915
                                RT_ICON0x951940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088KoreanSouth Korea0.4122340425531915
                                RT_DIALOG0x7c5e00x2b0dataEnglishUnited States1.0159883720930232
                                RT_DIALOG0x7c8900x29cdataKoreanNorth Korea1.0164670658682635
                                RT_DIALOG0x7c8900x29cdataKoreanSouth Korea1.0164670658682635
                                RT_DIALOG0x7cb2c0x148dataEnglishUnited States1.0335365853658536
                                RT_DIALOG0x7cc740x118dataKoreanNorth Korea1.0392857142857144
                                RT_DIALOG0x7cc740x118dataKoreanSouth Korea1.0392857142857144
                                RT_DIALOG0x7cd8c0x302dataEnglishUnited States1.0142857142857142
                                RT_DIALOG0x7d0900x2eedataKoreanNorth Korea1.0146666666666666
                                RT_DIALOG0x7d0900x2eedataKoreanSouth Korea1.0146666666666666
                                RT_DIALOG0x7d3800x190dataEnglishUnited States1.0275
                                RT_DIALOG0x7d5100x170dataKoreanNorth Korea1.0298913043478262
                                RT_DIALOG0x7d5100x170dataKoreanSouth Korea1.0298913043478262
                                RT_STRING0x7d6800x260dataEnglishUnited States1.018092105263158
                                RT_STRING0x7d8e00x182dataKoreanNorth Korea1.028497409326425
                                RT_STRING0x7d8e00x182dataKoreanSouth Korea1.028497409326425
                                RT_STRING0x7da640x1c0BIOS (ia32) ROM Ext. (68*512)EnglishUnited States1.0245535714285714
                                RT_STRING0x7dc240x150IRIS Showcase file - version 8KoreanNorth Korea1.0327380952380953
                                RT_STRING0x7dc240x150IRIS Showcase file - version 8KoreanSouth Korea1.0327380952380953
                                RT_STRING0x7dd740x1d2dataEnglishUnited States1.0236051502145922
                                RT_STRING0x7df480x15adataKoreanNorth Korea1.0317919075144508
                                RT_STRING0x7df480x15adataKoreanSouth Korea1.0317919075144508
                                RT_STRING0x7e0a40x3d0dataEnglishUnited States1.0112704918032787
                                RT_STRING0x7e4740x262dataKoreanNorth Korea1.018032786885246
                                RT_STRING0x7e4740x262dataKoreanSouth Korea1.018032786885246
                                RT_STRING0x7e6d80x266dataEnglishUnited States0.993485342019544
                                RT_STRING0x7e9400x194dataKoreanNorth Korea1.0272277227722773
                                RT_STRING0x7e9400x194dataKoreanSouth Korea1.0272277227722773
                                RT_GROUP_ICON0x956000x68dataKoreanNorth Korea0.7019230769230769
                                RT_GROUP_ICON0x956000x68dataKoreanSouth Korea0.7019230769230769
                                RT_VERSION0x9566c0x32cdataKoreanNorth Korea0.4642857142857143
                                RT_VERSION0x9566c0x32cdataKoreanSouth Korea0.4642857142857143
                                RT_MANIFEST0x9599c0x26eASCII text, with CRLF line terminatorsEnglishUnited States0.5176848874598071
                                DLLImport
                                KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                COMDLG32.dllGetOpenFileNameW
                                SHELL32.dllSHGetMalloc
                                SHLWAPI.dllPathCompactPathExW
                                USER32.dllSetTimer
                                Language of compilation systemCountry where language is spokenMap
                                KoreanNorth Korea
                                KoreanSouth Korea
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:17:00:40
                                Start date:19/04/2024
                                Path:C:\Users\user\Desktop\S34C65xU.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\S34C65xU.exe"
                                Imagebase:0x400000
                                File size:3'593'752 bytes
                                MD5 hash:1CD84BBD0B0DC7C19BEDC0F5D292070B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:17:00:41
                                Start date:19/04/2024
                                Path:C:\Driver\Samsung_Driver_Installer.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Driver\Samsung_Driver_Installer.exe"
                                Imagebase:0x2e0000
                                File size:3'338'752 bytes
                                MD5 hash:15770FC2AC6D46F841CB5B8E3C453F32
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:5
                                Start time:17:00:43
                                Start date:19/04/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 4560 -s 1800
                                Imagebase:0x7ff7ea7c0000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.3%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:6.9%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:38
                                  execution_graph 39356 42c042 39357 42c050 39356->39357 39358 42c067 39357->39358 39360 42c0b3 39357->39360 39361 42c0cc 39360->39361 39365 42c105 39361->39365 39366 41ad54 39361->39366 39363 42c1cc 39363->39365 39370 43e18e 67 API calls 4 library calls 39363->39370 39365->39358 39367 41ad75 39366->39367 39368 41ad5f 39366->39368 39367->39363 39371 4161ee 39368->39371 39370->39365 39372 4161f8 39371->39372 39373 41620b 39371->39373 39376 4184c7 39372->39376 39373->39367 39374 416209 39374->39367 39377 4184e6 39376->39377 39387 4184df 39376->39387 39388 40d423 39377->39388 39380 40d423 ctype 6 API calls 39381 4184f5 39380->39381 39382 40d423 ctype 6 API calls 39381->39382 39381->39387 39383 418502 39382->39383 39384 40d423 ctype 6 API calls 39383->39384 39383->39387 39385 418518 39384->39385 39386 40d423 ctype 6 API calls 39385->39386 39386->39387 39387->39374 39389 40d430 39388->39389 39390 40d435 39388->39390 39392 43e173 6 API calls __get_daylight 39389->39392 39390->39380 39390->39387 39392->39390 39393 413723 39394 413733 39393->39394 39395 41372c FreeLibrary 39393->39395 39395->39394 39396 454a63 39401 4136ca 39396->39401 39402 4136d5 LoadLibraryW 39401->39402 39403 413710 39401->39403 39402->39403 39404 4136e9 GetProcAddress GetProcAddress 39402->39404 39405 43e492 39403->39405 39404->39403 39408 43e456 39405->39408 39407 43e49f 39409 43e462 ___BuildCatchObjectHelper 39408->39409 39416 4436cf 39409->39416 39415 43e483 ___BuildCatchObjectHelper 39415->39407 39442 44697c 39416->39442 39418 43e467 39419 43e36b 39418->39419 39451 442d60 TlsGetValue 39419->39451 39422 442d60 __decode_pointer 6 API calls 39423 43e38f 39422->39423 39424 43e412 39423->39424 39461 443590 68 API calls 6 library calls 39423->39461 39439 43e48c 39424->39439 39426 43e3ad 39427 43e3f9 39426->39427 39429 43e3d7 39426->39429 39430 43e3c8 39426->39430 39428 442ce5 __encode_pointer 6 API calls 39427->39428 39431 43e407 39428->39431 39429->39424 39433 43e3d1 39429->39433 39462 4434f0 73 API calls _realloc 39430->39462 39434 442ce5 __encode_pointer 6 API calls 39431->39434 39433->39429 39436 43e3ed 39433->39436 39463 4434f0 73 API calls _realloc 39433->39463 39434->39424 39464 442ce5 TlsGetValue 39436->39464 39437 43e3e7 39437->39424 39437->39436 39476 4436d8 39439->39476 39443 4469a4 RtlEnterCriticalSection 39442->39443 39444 446991 39442->39444 39443->39418 39449 4468b9 67 API calls 10 library calls 39444->39449 39446 446997 39446->39443 39450 443663 67 API calls 3 library calls 39446->39450 39448 4469a3 39448->39443 39449->39446 39450->39448 39452 442d78 39451->39452 39453 442d99 GetModuleHandleW 39451->39453 39452->39453 39454 442d82 TlsGetValue 39452->39454 39455 442db4 GetProcAddress 39453->39455 39456 442da9 39453->39456 39458 442d8d 39454->39458 39460 43e37f 39455->39460 39474 443633 Sleep GetModuleHandleW 39456->39474 39458->39453 39458->39460 39459 442daf 39459->39455 39459->39460 39460->39422 39461->39426 39462->39433 39463->39437 39465 442cfd 39464->39465 39466 442d1e GetModuleHandleW 39464->39466 39465->39466 39467 442d07 TlsGetValue 39465->39467 39468 442d2e 39466->39468 39469 442d39 GetProcAddress 39466->39469 39471 442d12 39467->39471 39475 443633 Sleep GetModuleHandleW 39468->39475 39473 442d16 39469->39473 39471->39466 39471->39473 39472 442d34 39472->39469 39472->39473 39473->39427 39474->39459 39475->39472 39479 4468a2 RtlLeaveCriticalSection 39476->39479 39478 43e491 39478->39415 39479->39478 39480 404fa9 39481 405083 39480->39481 39482 404fc8 39480->39482 39483 405090 39481->39483 39484 405133 39481->39484 39485 405074 39482->39485 39486 404fce 39482->39486 39488 405093 39483->39488 39489 4050fa RtlEnterCriticalSection RtlLeaveCriticalSection 39483->39489 39836 405d7d 39484->39836 39668 405e69 39485->39668 39490 405069 39486->39490 39494 404fe0 39486->39494 39495 40505e 39486->39495 39492 405096 39488->39492 39493 4050ef 39488->39493 39497 405047 moneypunct 39489->39497 39852 405507 86 API calls 2 library calls 39490->39852 39498 4050e4 39492->39498 39499 405099 39492->39499 39812 4052d6 39493->39812 39501 404fe3 39494->39501 39502 40504f 39494->39502 39551 4055b5 39495->39551 39808 405246 GetDlgItem 39498->39808 39505 4050b5 39499->39505 39506 40509c 39499->39506 39508 405035 39501->39508 39509 404fe7 39501->39509 39526 405c50 39502->39526 39854 4024fa 77 API calls 39505->39854 39506->39497 39853 405d17 77 API calls 2 library calls 39506->39853 39508->39497 39511 40503b 39508->39511 39512 405012 39509->39512 39513 404fee 39509->39513 39851 405146 105 API calls 2 library calls 39511->39851 39850 401cea RtlEnterCriticalSection RtlLeaveCriticalSection 39512->39850 39513->39497 39849 401cea RtlEnterCriticalSection RtlLeaveCriticalSection 39513->39849 39517 4050bd 39855 401cea RtlEnterCriticalSection RtlLeaveCriticalSection 39517->39855 39519 405024 DialogBoxParamW 39519->39497 39520 405042 39520->39497 39523 4050cf DialogBoxParamW 39856 4024ce 77 API calls 39523->39856 39524 405006 DialogBoxParamW 39524->39497 39527 405d00 KiUserCallbackDispatcher 39526->39527 39528 405c6d 39526->39528 39543 405c7f 39527->39543 39529 405c70 39528->39529 39530 405cee 39528->39530 39533 405c94 GetDlgItem 39529->39533 39534 405c75 39529->39534 39978 40272d RtlEnterCriticalSection RtlLeaveCriticalSection 39530->39978 39958 4027a1 RtlEnterCriticalSection RtlLeaveCriticalSection 39533->39958 39538 405c8d 39534->39538 39542 405c7c 39534->39542 39535 405cf3 39979 4027a1 RtlEnterCriticalSection RtlLeaveCriticalSection 39535->39979 39537 405d15 39537->39497 39957 407361 81 API calls 2 library calls 39538->39957 39541 405ca4 39959 402a2e 39541->39959 39542->39543 39857 40748d 39542->39857 39980 43de6e 39543->39980 39550 405ce2 39550->39543 39974 40274d RtlEnterCriticalSection 39550->39974 40309 442764 39551->40309 39553 4055c4 RtlEnterCriticalSection RtlLeaveCriticalSection 40310 4023dd 39553->40310 39556 40562d 40313 402337 39556->40313 39557 405619 SetWindowTextW 39559 402b38 ~_Task_impl 75 API calls 39557->39559 39559->39556 39561 4011e0 75 API calls 39562 405648 39561->39562 39563 40146e ctype 67 API calls 39562->39563 39564 405665 39563->39564 39565 405671 39564->39565 39566 4057b5 _memset 39564->39566 39567 401059 75 API calls 39565->39567 39569 4057d0 SHGetSpecialFolderPathW 39566->39569 39568 405682 39567->39568 40321 408482 39568->40321 39570 401238 75 API calls 39569->39570 39572 4057fc 39570->39572 39573 4011e0 75 API calls 39572->39573 39574 405817 39573->39574 39575 40146e ctype 67 API calls 39574->39575 39577 40582f 39575->39577 39576 40568e 39623 405766 39576->39623 40397 401dbe 76 API calls 4 library calls 39576->40397 39580 402d5e 75 API calls 39577->39580 39582 4057b0 39580->39582 39584 401059 75 API calls 39582->39584 39587 405856 39584->39587 39585 4056b5 _wcslen 39590 4012fd 75 API calls 39585->39590 39589 40237f 75 API calls 39587->39589 39592 40585b GetDlgItem 39589->39592 39593 4056e6 39590->39593 39595 405883 SetWindowTextW 39592->39595 39596 40587d 39592->39596 40398 40369b 75 API calls 3 library calls 39593->40398 40386 402b38 39595->40386 39596->39595 39599 4056f8 39602 401040 75 API calls 39599->39602 39604 40570b 39602->39604 39603 40589e 7 API calls 39605 402a2e 76 API calls 39603->39605 39606 4011e0 75 API calls 39604->39606 39607 40591e SetWindowTextW GetDlgItem ShowWindow GetDlgItem 39605->39607 39608 40571c 39606->39608 39611 402a2e 76 API calls 39607->39611 39610 40146e ctype 67 API calls 39608->39610 39612 405732 39610->39612 39613 405976 39611->39613 39614 40146e ctype 67 API calls 39612->39614 39615 4011e0 75 API calls 39613->39615 39616 405740 39614->39616 39618 40146e ctype 67 API calls 39616->39618 39619 40574e 39618->39619 39621 40146e ctype 67 API calls 39619->39621 39621->39623 40330 4044fa 39623->40330 39669 405e78 __EH_prolog3_GS 39668->39669 39670 406111 GetDlgItem SendMessageW GetDlgItem 39669->39670 39671 405e96 GetVersion 39669->39671 40580 402781 RtlEnterCriticalSection RtlLeaveCriticalSection 39670->40580 39671->39670 39672 405ea8 39671->39672 39674 402a2e 76 API calls 39672->39674 39676 405eb2 MessageBoxW 39674->39676 39675 406141 39677 40614b 39675->39677 39678 40617c 39675->39678 39681 405ede 39676->39681 39800 4060e3 PostMessageW 39676->39800 39680 402a2e 76 API calls 39677->39680 39683 4061a0 39678->39683 39684 4061ad 39678->39684 39682 406155 SetWindowTextW 39680->39682 39686 401e56 76 API calls 39681->39686 39688 4061f9 39682->39688 39689 402a2e 76 API calls 39683->39689 40623 40280f 76 API calls 39684->40623 39692 405ee6 39686->39692 39693 40146e ctype 67 API calls 39688->39693 39694 4061a7 39689->39694 39690 40146e ctype 67 API calls 39695 40610a 39690->39695 39696 401285 6 API calls 39692->39696 39697 406200 GetDlgItem ShowWindow GetDlgItem ShowWindow GetDlgItem 39693->39697 39701 4011e0 75 API calls 39694->39701 39754 40658d 39695->39754 39698 405ef6 39696->39698 39699 402a2e 76 API calls 39697->39699 39702 405f54 39698->39702 39706 4012fd 75 API calls 39698->39706 39703 406246 SetWindowTextW 39699->39703 39700 4427e7 5 API calls 39704 406595 39700->39704 39705 4061bf 39701->39705 39725 4012fd 75 API calls 39702->39725 39713 40627f SetFocus 39703->39713 39704->39497 39708 40146e ctype 67 API calls 39705->39708 39709 405f12 39706->39709 39711 4061d4 SetWindowTextW 39708->39711 39710 401040 75 API calls 39709->39710 39712 405f22 39710->39712 39711->39688 39715 4011e0 75 API calls 39712->39715 39716 406299 39713->39716 39719 4062a4 39713->39719 39717 405f30 39715->39717 39718 4023f4 75 API calls 39716->39718 39720 40146e ctype 67 API calls 39717->39720 39718->39719 39721 4062de 39719->39721 39724 40146e ctype 67 API calls 39719->39724 39723 405f45 39720->39723 39722 406486 GetDlgItem SendMessageW 39721->39722 39726 4023f4 75 API calls 39721->39726 39728 4064a5 39722->39728 39729 4064fb 39722->39729 39727 40146e ctype 67 API calls 39723->39727 39724->39721 39730 405fb9 39725->39730 39744 4062f5 39726->39744 39727->39702 39728->39729 39737 402337 75 API calls 39728->39737 39731 406503 39729->39731 39732 406558 39729->39732 39733 401040 75 API calls 39730->39733 39736 402a2e 76 API calls 39731->39736 39734 406560 PostMessageW 39732->39734 39735 406574 39732->39735 39738 405fc9 39733->39738 39734->39735 40625 4027c1 79 API calls ~_Task_impl 39735->40625 39740 40650d 39736->39740 39741 4064c1 ShellExecuteW 39737->39741 39742 4011e0 75 API calls 39738->39742 39745 406516 39740->39745 39746 406519 SetWindowTextW EnableWindow SetTimer 39740->39746 39755 40146e ctype 67 API calls 39741->39755 39748 405fda 39742->39748 39743 406579 39749 40146e ctype 67 API calls 39743->39749 40581 4010df 39744->40581 39745->39746 39750 40146e ctype 67 API calls 39746->39750 39753 40146e ctype 67 API calls 39748->39753 39749->39754 39751 406554 39750->39751 39751->39743 39756 405fef 39753->39756 39754->39700 39758 4064f9 39755->39758 39759 40146e ctype 67 API calls 39756->39759 39758->39729 39761 406002 39759->39761 39763 4012fd 75 API calls 39761->39763 39765 406019 39763->39765 39768 401040 75 API calls 39765->39768 39770 406029 39768->39770 39769 4044fa 81 API calls 39771 406371 39769->39771 39772 4011e0 75 API calls 39770->39772 39773 4048a0 87 API calls 39771->39773 39774 40603a 39772->39774 39776 406388 39773->39776 39775 40146e ctype 67 API calls 39774->39775 39777 406051 39775->39777 39778 4048a0 87 API calls 39776->39778 39779 40146e ctype 67 API calls 39777->39779 39780 406398 ShowWindow KiUserCallbackDispatcher 39778->39780 39782 40605f 39779->39782 39781 402337 75 API calls 39780->39781 39784 4063c1 39781->39784 39783 408e7f 7 API calls 39782->39783 39785 40609c 39783->39785 40612 408e7f 39784->40612 39787 40146e ctype 67 API calls 39785->39787 39789 4060ad 39787->39789 39791 40146e ctype 67 API calls 39789->39791 39793 4060c1 39791->39793 39794 40146e ctype 67 API calls 39793->39794 39796 4060d5 39794->39796 39798 40146e ctype 67 API calls 39796->39798 39798->39800 39800->39690 40674 44d9c6 39808->40674 39811 4052cf moneypunct 39811->39497 40676 442764 39812->40676 39814 4052e5 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 39815 40533f RtlEnterCriticalSection RtlLeaveCriticalSection GetDlgItem 39814->39815 39817 405420 39815->39817 39818 4054db moneypunct 39817->39818 39819 40542f SendMessageW 39817->39819 39822 4427e7 5 API calls 39818->39822 39820 405447 39819->39820 39821 402a2e 76 API calls 39820->39821 39823 40545d 39821->39823 39824 405506 39822->39824 40677 408dfd 39823->40677 39824->39497 39826 40547c 39827 4011e0 75 API calls 39826->39827 39828 40548a 39827->39828 39829 40146e ctype 67 API calls 39828->39829 39830 40549f GetDlgItem 39829->39830 39831 4054b2 39830->39831 39832 4054b5 SetWindowTextW 39830->39832 39831->39832 39833 40146e ctype 67 API calls 39832->39833 39834 4054cc 39833->39834 39835 40146e ctype 67 API calls 39834->39835 39835->39818 39837 405d8c _memset __EH_prolog3_GS 39836->39837 39838 405ddb PathCompactPathExW 39837->39838 39839 4083d8 109 API calls 39838->39839 39840 405e0b GetDlgItem 39839->39840 39841 405e34 SetWindowTextW 39840->39841 39842 405e2e 39840->39842 39843 401078 ctype 67 API calls 39841->39843 39842->39841 39844 405e44 moneypunct 39843->39844 39845 40146e ctype 67 API calls 39844->39845 39846 405e60 39845->39846 39847 4427e7 5 API calls 39846->39847 39848 405e68 39847->39848 39848->39497 39849->39524 39850->39519 39851->39520 39852->39497 39853->39497 39854->39517 39855->39523 39856->39497 39988 442764 39857->39988 39859 40749c 8 API calls 39989 43e4b0 39859->39989 39861 407534 GetWindowTextW 39991 401238 39861->39991 39864 407577 39865 402a2e 76 API calls 39864->39865 39866 407584 MessageBoxW 39865->39866 39869 40146e ctype 67 API calls 39866->39869 39867 4075d9 39926 407712 39867->39926 39995 4012fd 39867->39995 39870 4075bc 39869->39870 39872 40146e ctype 67 API calls 39870->39872 39875 4075d1 39872->39875 39873 408e5f 69 API calls 39876 407733 39873->39876 40059 4427e7 39875->40059 39882 402a2e 76 API calls 39876->39882 39907 4077ac 39876->39907 39885 407748 MessageBoxW 39882->39885 39892 40146e ctype 67 API calls 39885->39892 39887 4077dc 40010 401059 39887->40010 39889 40146e ctype 67 API calls 39893 407653 39889->39893 39895 407782 39892->39895 39896 40146e ctype 67 API calls 39893->39896 39898 40146e ctype 67 API calls 39895->39898 39899 407666 GetDriveTypeW 39896->39899 39901 407797 39898->39901 39905 40768b 39899->39905 39899->39907 39900 4077f7 39903 402a2e 76 API calls 39900->39903 39904 40146e ctype 67 API calls 39901->39904 39906 407807 SetWindowTextW 39903->39906 39904->39907 40062 408e5f 39905->40062 39911 402a2e 76 API calls 39906->39911 40006 401285 39907->40006 39912 40783c 39911->39912 39913 4011e0 75 API calls 39912->39913 39915 40784b 39913->39915 39914 402a2e 76 API calls 39916 4076bf MessageBoxW 39914->39916 39917 40146e ctype 67 API calls 39915->39917 39920 40146e ctype 67 API calls 39916->39920 39919 407864 SetWindowTextW 39917->39919 39923 402a2e 76 API calls 39919->39923 39922 4076fe 39920->39922 39924 40146e ctype 67 API calls 39922->39924 39925 40788f 39923->39925 39924->39926 39927 4011e0 75 API calls 39925->39927 39926->39873 39928 40789e 39927->39928 39929 40146e ctype 67 API calls 39928->39929 39957->39543 39958->39541 39960 402a3d _memset __EH_prolog3_GS 39959->39960 39961 402a7b LoadStringW 39960->39961 39962 401238 75 API calls 39961->39962 39963 402aab 39962->39963 39964 4011e0 75 API calls 39963->39964 39965 402ac4 39964->39965 39966 40146e ctype 67 API calls 39965->39966 39967 402ad8 39966->39967 39968 4427e7 5 API calls 39967->39968 39969 402ae3 SetWindowTextW 39968->39969 39970 40146e 39969->39970 39971 401495 moneypunct ctype 39970->39971 39972 401475 39970->39972 39971->39550 39972->39971 40307 4018c6 67 API calls _memcpy_s 39972->40307 39975 402772 SetEvent 39974->39975 39976 40276a ResetEvent 39974->39976 39977 402778 RtlLeaveCriticalSection 39975->39977 39976->39977 39977->39543 39978->39535 39979->39550 39981 43de76 39980->39981 39982 43de78 IsDebuggerPresent 39980->39982 39981->39537 40308 442cdd 39982->40308 39985 4428d2 SetUnhandledExceptionFilter UnhandledExceptionFilter 39986 4428f7 GetCurrentProcess TerminateProcess 39985->39986 39987 4428ef __invoke_watson 39985->39987 39986->39537 39987->39986 39988->39859 39990 43e4bc __VEC_memzero 39989->39990 39990->39861 39992 401249 ctype 39991->39992 40070 4013b7 39992->40070 39994 401252 39994->39864 39994->39867 39996 401315 ctype 39995->39996 39997 40132a 75 API calls 39996->39997 39998 401324 39997->39998 39999 401040 39998->39999 40105 401258 39999->40105 40002 4011e0 40003 4011e4 40002->40003 40004 40132a 75 API calls 40003->40004 40005 4011f8 40004->40005 40005->39889 40007 40128d 40006->40007 40009 401292 40006->40009 40109 43e173 6 API calls __get_daylight 40007->40109 40009->39887 40066 402d5e 40009->40066 40011 40105d 40010->40011 40012 401258 75 API calls 40011->40012 40013 40106e 40012->40013 40014 40237f 40013->40014 40015 40238b __EH_prolog3 40014->40015 40016 4023b5 40015->40016 40018 401285 6 API calls 40015->40018 40017 4011e0 75 API calls 40016->40017 40019 4023c2 40017->40019 40020 4023a1 40018->40020 40021 40146e ctype 67 API calls 40019->40021 40020->40016 40022 402d5e 75 API calls 40020->40022 40023 4023d5 ~_Task_impl 40021->40023 40022->40016 40023->39900 40060 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40059->40060 40061 4427f1 40060->40061 40061->40061 40063 408e66 40062->40063 40065 4076a6 40062->40065 40264 43e6af 40063->40264 40065->39907 40065->39914 40067 402d67 _wcslen 40066->40067 40292 4030f4 40067->40292 40069 402d76 40069->39887 40071 4013c3 _wcslen 40070->40071 40072 4013f0 40071->40072 40073 4013d2 40071->40073 40092 401619 75 API calls 2 library calls 40072->40092 40079 40132a 40073->40079 40075 4013f9 40078 4013ee ctype 40075->40078 40093 4018c6 67 API calls _memcpy_s 40075->40093 40078->39994 40080 40133a 40079->40080 40081 40133f 40079->40081 40094 43de2b 75 API calls 4 library calls 40080->40094 40083 401353 40081->40083 40084 401368 40081->40084 40095 401540 40083->40095 40101 401619 75 API calls 2 library calls 40084->40101 40087 40135e 40089 401540 ~_Task_impl 75 API calls 40087->40089 40088 401366 ctype 40088->40078 40089->40088 40090 40136f 40090->40088 40102 4018c6 67 API calls _memcpy_s 40090->40102 40092->40075 40093->40078 40096 401549 40095->40096 40097 40154e 40095->40097 40103 43de2b 75 API calls 4 library calls 40096->40103 40099 401597 ctype 40097->40099 40104 4018e5 67 API calls _memmove_s 40097->40104 40099->40087 40101->40090 40102->40088 40104->40099 40106 401268 ctype 40105->40106 40107 40132a 75 API calls 40106->40107 40108 40104d 40107->40108 40108->40002 40109->40009 40267 43e626 40264->40267 40268 43e633 40267->40268 40269 43e657 40267->40269 40285 4402c0 67 API calls __getptd_noexit 40268->40285 40269->40268 40271 43e660 GetFileAttributesW 40269->40271 40273 43e66e GetLastError 40271->40273 40279 43e684 40271->40279 40272 43e638 40286 4402ad 67 API calls __getptd_noexit 40272->40286 40288 4402d3 67 API calls 3 library calls 40273->40288 40275 43e64f 40275->40065 40277 43e67a 40289 4402ad 67 API calls __getptd_noexit 40277->40289 40278 43e63f 40287 43e14d 6 API calls 2 library calls 40278->40287 40279->40275 40290 4402c0 67 API calls __getptd_noexit 40279->40290 40283 43e697 40291 4402ad 67 API calls __getptd_noexit 40283->40291 40285->40272 40286->40278 40288->40277 40289->40275 40290->40283 40291->40277 40293 403109 40292->40293 40294 403129 40293->40294 40295 40310d 40293->40295 40296 403142 40294->40296 40304 43ddf3 75 API calls 3 library calls 40294->40304 40303 4035f7 75 API calls 3 library calls 40295->40303 40298 403127 ctype 40296->40298 40305 401619 75 API calls 2 library calls 40296->40305 40298->40069 40301 403154 40301->40298 40306 4018c6 67 API calls _memcpy_s 40301->40306 40303->40298 40305->40301 40306->40298 40307->39971 40308->39985 40309->39553 40311 401059 75 API calls 40310->40311 40312 4023ef 40311->40312 40312->39556 40312->39557 40314 402349 40313->40314 40315 40236a 40313->40315 40316 401285 6 API calls 40314->40316 40317 401059 75 API calls 40315->40317 40318 402359 40316->40318 40319 402378 40317->40319 40318->40315 40320 402d5e 75 API calls 40318->40320 40319->39561 40320->40315 40526 40142a 40321->40526 40326 40142a ~_Task_impl 6 API calls 40327 4084b3 40326->40327 40534 4089e9 40327->40534 40331 404509 _memset __EH_prolog3_GS 40330->40331 40332 404573 SHGetSpecialFolderPathW 40331->40332 40333 401238 75 API calls 40332->40333 40334 40459b 40333->40334 40335 4011e0 75 API calls 40334->40335 40336 4045b5 40335->40336 40337 40146e ctype 67 API calls 40336->40337 40338 4045ce 40337->40338 40339 402d5e 75 API calls 40338->40339 40340 4045dc _memset 40339->40340 40341 4045ef GetTempPathW 40340->40341 40342 401238 75 API calls 40341->40342 40343 404616 40342->40343 40344 4011e0 75 API calls 40343->40344 40345 40462e 40344->40345 40387 401449 ~_Task_impl 6 API calls 40386->40387 40388 402b4f 40387->40388 40389 40142a ~_Task_impl 6 API calls 40388->40389 40390 402b60 40389->40390 40556 402d79 40390->40556 40393 401cea RtlEnterCriticalSection RtlLeaveCriticalSection 40393->39603 40397->39585 40398->39599 40527 401436 40526->40527 40539 4016da 40527->40539 40530 401449 40531 401455 40530->40531 40532 4016da ~_Task_impl 6 API calls 40531->40532 40533 401469 40532->40533 40533->40326 40544 401720 40534->40544 40536 408a16 40537 4084cb 40536->40537 40547 43f144 79 API calls __towupper_l 40536->40547 40537->39576 40542 4016e6 40539->40542 40541 401444 40541->40530 40542->40541 40543 43e173 6 API calls __get_daylight 40542->40543 40543->40541 40548 40182a 40544->40548 40547->40536 40549 401831 40548->40549 40550 40173d 40548->40550 40552 40183a 40549->40552 40554 43e173 6 API calls __get_daylight 40549->40554 40550->40536 40552->40550 40555 43e173 6 API calls __get_daylight 40552->40555 40554->40552 40555->40550 40557 40142a ~_Task_impl 6 API calls 40556->40557 40558 402d8d 40557->40558 40567 4016ae 40558->40567 40560 402d9d 40561 4016ae ~_Task_impl 6 API calls 40560->40561 40562 402db0 40561->40562 40563 401540 ~_Task_impl 75 API calls 40562->40563 40564 402db9 40563->40564 40565 4016da ~_Task_impl 6 API calls 40564->40565 40566 402b74 40565->40566 40566->40393 40568 4016b8 40567->40568 40569 4016ba 40567->40569 40568->40560 40570 4016d0 40569->40570 40572 43e173 6 API calls __get_daylight 40569->40572 40570->40560 40572->40570 40580->39675 40582 4010eb __EH_prolog3_GS 40581->40582 40583 401238 75 API calls 40582->40583 40592 4010fd 40583->40592 40584 401160 40626 4089b7 40584->40626 40587 4089b7 75 API calls 40588 4011c9 40587->40588 40591 40146e ctype 67 API calls 40588->40591 40589 401162 40589->40584 40594 4012fd 75 API calls 40589->40594 40590 401285 6 API calls 40590->40592 40593 4011d8 40591->40593 40592->40584 40592->40589 40592->40590 40631 4012a5 75 API calls ~_Task_impl 40592->40631 40596 4427e7 5 API calls 40593->40596 40597 401176 40594->40597 40598 4011dd 40596->40598 40599 401040 75 API calls 40597->40599 40606 4011fb 40598->40606 40600 401183 40599->40600 40601 4011e0 75 API calls 40600->40601 40602 401194 40601->40602 40603 40146e ctype 67 API calls 40602->40603 40604 4011a3 40603->40604 40605 40146e ctype 67 API calls 40604->40605 40605->40584 40607 401059 75 API calls 40606->40607 40608 40120b 40607->40608 40609 401210 40608->40609 40610 401059 75 API calls 40609->40610 40611 401220 40610->40611 40611->39769 40623->39694 40625->39743 40632 408837 40626->40632 40631->40592 40639 408843 __EH_prolog3_GS 40632->40639 40633 4088e8 40634 4427e7 5 API calls 40633->40634 40635 4088ef 40634->40635 40652 4088f2 40635->40652 40636 408881 40638 4012fd 75 API calls 40636->40638 40640 408890 40638->40640 40639->40633 40639->40636 40672 4089c9 75 API calls std::runtime_error::runtime_error 40639->40672 40641 401040 75 API calls 40640->40641 40642 40889d 40641->40642 40643 4011e0 75 API calls 40642->40643 40644 4088ab 40643->40644 40645 40146e ctype 67 API calls 40644->40645 40646 4088bf 40645->40646 40647 40146e ctype 67 API calls 40646->40647 40648 4088cf 40647->40648 40649 4011e0 75 API calls 40648->40649 40650 4088d9 40649->40650 40651 40146e ctype 67 API calls 40650->40651 40651->40633 40655 4088fe __EH_prolog3_GS 40652->40655 40653 4427e7 5 API calls 40654 4011be 40653->40654 40654->40587 40657 40894c 40655->40657 40671 40890a 40655->40671 40673 4089c9 75 API calls std::runtime_error::runtime_error 40655->40673 40658 4012fd 75 API calls 40657->40658 40659 40895b 40658->40659 40660 401040 75 API calls 40659->40660 40661 408968 40660->40661 40662 4011e0 75 API calls 40661->40662 40663 408976 40662->40663 40664 40146e ctype 67 API calls 40663->40664 40665 408986 40664->40665 40666 40146e ctype 67 API calls 40665->40666 40667 408995 40666->40667 40668 4011e0 75 API calls 40667->40668 40669 4089a0 40668->40669 40670 40146e ctype 67 API calls 40669->40670 40670->40671 40671->40653 40672->40639 40673->40655 40675 4052ba SendMessageW 40674->40675 40675->39811 40676->39814 40678 408e09 __EH_prolog3 40677->40678 40685 41b1ef 40678->40685 40680 408e1f 40689 408ac2 40680->40689 40682 408e33 40700 408c59 40682->40700 40684 408e48 ctype ~_Task_impl 40684->39826 40686 41b1fb __EH_prolog3 40685->40686 40719 43e277 40686->40719 40688 41b206 ~_Task_impl 40688->40680 40692 408b0c _wcslen 40689->40692 40690 408c3b 40691 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40690->40691 40693 408c55 40691->40693 40692->40690 40695 401238 75 API calls 40692->40695 40698 4011e0 75 API calls 40692->40698 40699 40146e 67 API calls ctype 40692->40699 40767 4083d8 40692->40767 40779 402bde 75 API calls ctype 40692->40779 40780 43f720 78 API calls 40692->40780 40693->40682 40695->40692 40698->40692 40699->40692 40704 408ca4 _wcslen 40700->40704 40701 40146e ctype 67 API calls 40703 408ddf 40701->40703 40702 402b38 ~_Task_impl 75 API calls 40702->40704 40705 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40703->40705 40704->40702 40709 408d99 40704->40709 40710 408d9b 40704->40710 40718 402d5e 75 API calls 40704->40718 40826 43f541 78 API calls __wcstoi64 40704->40826 40827 4091d4 75 API calls 2 library calls 40704->40827 40828 43f720 78 API calls 40704->40828 40829 40444a 75 API calls 2 library calls 40704->40829 40707 408df9 40705->40707 40707->40684 40709->40701 40712 401238 75 API calls 40710->40712 40714 408da9 40712->40714 40715 4011e0 75 API calls 40714->40715 40716 408dbd 40715->40716 40717 40146e ctype 67 API calls 40716->40717 40717->40709 40718->40704 40721 43e281 40719->40721 40722 43e29b 40721->40722 40726 43e29d std::bad_alloc::bad_alloc 40721->40726 40731 43ff12 40721->40731 40749 443437 6 API calls __decode_pointer 40721->40749 40722->40688 40724 43e2c3 40750 401904 67 API calls std::exception::exception 40724->40750 40726->40724 40728 43e492 __cinit 74 API calls 40726->40728 40727 43e2cd 40751 4422c9 RaiseException 40727->40751 40728->40724 40730 43e2db 40732 43ffc5 40731->40732 40742 43ff24 40731->40742 40761 443437 6 API calls __decode_pointer 40732->40761 40734 43ffcb 40762 4402ad 67 API calls __getptd_noexit 40734->40762 40739 43ff81 RtlAllocateHeap 40739->40742 40740 43ff35 40740->40742 40752 445081 67 API calls 2 library calls 40740->40752 40753 444ed6 67 API calls 7 library calls 40740->40753 40754 4436b7 40740->40754 40742->40739 40742->40740 40743 43ffb1 40742->40743 40746 43ffb6 40742->40746 40748 43ffbd 40742->40748 40757 43fec3 67 API calls 4 library calls 40742->40757 40758 443437 6 API calls __decode_pointer 40742->40758 40759 4402ad 67 API calls __getptd_noexit 40743->40759 40760 4402ad 67 API calls __getptd_noexit 40746->40760 40748->40721 40749->40721 40750->40727 40751->40730 40752->40740 40753->40740 40763 44368c GetModuleHandleW 40754->40763 40757->40742 40758->40742 40759->40746 40760->40748 40761->40734 40762->40748 40764 4436b5 ExitProcess 40763->40764 40765 4436a0 GetProcAddress 40763->40765 40765->40764 40766 4436b0 40765->40766 40766->40764 40768 4083f3 __write_nolock 40767->40768 40781 43f3e6 40768->40781 40771 401238 75 API calls 40772 40843a 40771->40772 40773 4011e0 75 API calls 40772->40773 40774 408454 40773->40774 40775 40146e ctype 67 API calls 40774->40775 40776 408469 40775->40776 40777 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40776->40777 40778 408480 40777->40778 40778->40692 40779->40692 40780->40692 40784 43f2da 40781->40784 40785 43f307 40784->40785 40786 43f2e7 40784->40786 40788 43f315 40785->40788 40790 43f33c 40785->40790 40814 4402ad 67 API calls __getptd_noexit 40786->40814 40795 408425 40788->40795 40816 4402ad 67 API calls __getptd_noexit 40788->40816 40789 43f2ec 40815 43e14d 6 API calls 2 library calls 40789->40815 40817 4402ad 67 API calls __getptd_noexit 40790->40817 40793 43f331 40825 43e14d 6 API calls 2 library calls 40793->40825 40795->40771 40796 43f341 40798 43f34f 40796->40798 40799 43f37c 40796->40799 40818 43f157 101 API calls 3 library calls 40798->40818 40821 43f157 101 API calls 3 library calls 40799->40821 40802 43f38a 40806 43f39f 40802->40806 40808 43f3b2 40802->40808 40803 43f361 40804 43f369 40803->40804 40803->40808 40819 4402ad 67 API calls __getptd_noexit 40804->40819 40822 4402ad 67 API calls __getptd_noexit 40806->40822 40807 43f36e 40807->40795 40820 4402ad 67 API calls __getptd_noexit 40807->40820 40808->40795 40824 4402ad 67 API calls __getptd_noexit 40808->40824 40810 43f3a4 40810->40795 40823 4402ad 67 API calls __getptd_noexit 40810->40823 40814->40789 40816->40793 40817->40796 40818->40803 40819->40807 40820->40795 40821->40802 40822->40810 40823->40795 40824->40793 40826->40704 40827->40704 40828->40704 40829->40704 40830 41d80a 40833 41d826 40830->40833 40832 41d812 moneypunct 40834 41d832 __EH_prolog3 40833->40834 40837 41d9b3 40834->40837 40836 41d852 ctype ~_Task_impl 40836->40832 40838 41d9e5 moneypunct 40837->40838 40839 41d9ba 40837->40839 40838->40836 40840 41d9e7 40839->40840 40842 41d9c7 40839->40842 40840->40838 40841 43fe35 __crtCompareStringA_stat 67 API calls 40840->40841 40841->40838 40842->40838 40844 4092d8 InterlockedDecrement 40842->40844 40844->40838 40845 42f6ef 40846 42f728 40845->40846 40847 42f700 ReadFile 40845->40847 40847->40846 40848 42f71b GetLastError 40847->40848 40848->40846 40849 40838d 40854 41edf5 40849->40854 40867 41fbeb 40849->40867 40882 403d69 40849->40882 40850 408396 40855 41ee01 40854->40855 40856 41ee06 40854->40856 40982 41ee5b 40855->40982 40857 43e277 std::runtime_error::runtime_error 75 API calls 40856->40857 40859 41ee0d 40857->40859 40956 418df7 40859->40956 40861 41ee2c 40862 41ee4e 40861->40862 40966 418ee0 40861->40966 40864 41ee3f 40974 415007 40864->40974 40866 41ee48 40866->40850 40868 41fbfa 40867->40868 40869 41fbfd 40867->40869 40868->40869 41141 414ae8 40868->41141 41145 4215f7 40868->41145 41149 421816 40868->41149 41153 416d6a 40868->41153 41156 41ee85 40868->41156 41161 421c86 40868->41161 41167 42f990 40868->41167 41172 416192 40868->41172 40870 41fc30 40869->40870 41193 4208f4 75 API calls ctype 40869->41193 41177 420046 40870->41177 41759 41ed5b 40882->41759 40884 403db5 40885 41edf5 78 API calls 40884->40885 40886 403dc6 40885->40886 40887 43e277 std::runtime_error::runtime_error 75 API calls 40886->40887 40888 403dcd 40887->40888 40889 418df7 78 API calls 40888->40889 40890 403e03 40889->40890 40891 43e277 std::runtime_error::runtime_error 75 API calls 40890->40891 40892 403e0a 40891->40892 41765 414f0b 40892->41765 40894 403e40 40895 43e277 std::runtime_error::runtime_error 75 API calls 40894->40895 40896 403e4a 40895->40896 40898 403e66 40896->40898 41837 41ef66 87 API calls 2 library calls 40896->41837 41776 41f354 40898->41776 40900 403e8a 40901 403ef0 40900->40901 40957 418e03 __EH_prolog3 ctype 40956->40957 40958 418e0c ctype ~_Task_impl 40957->40958 40988 415366 40957->40988 40958->40861 40960 418e4e ctype 40994 41b3af 40960->40994 40962 418e6c ctype 40962->40958 40964 41b3af 6 API calls 40962->40964 40997 41e5f8 40962->40997 41000 41909f 75 API calls ctype 40962->41000 40964->40962 40967 418eef ctype 40966->40967 41100 419107 40967->41100 40969 418ef7 40970 418f39 40969->40970 41124 43e173 6 API calls __get_daylight 40969->41124 41111 4153c3 40970->41111 40973 418f40 ctype 40973->40864 40975 415016 ctype 40974->40975 41128 4152d4 40975->41128 40977 415060 40978 4153c3 ctype 67 API calls 40977->40978 40981 415067 ctype 40978->40981 40980 41501e 40980->40977 41139 43e173 6 API calls __get_daylight 40980->41139 40981->40866 40983 41ee62 40982->40983 40984 41ee74 40982->40984 40985 418ee0 ctype 67 API calls 40983->40985 40984->40856 40986 41ee6b 40985->40986 40987 415007 ctype 67 API calls 40986->40987 40987->40984 40989 41537b 40988->40989 40990 415395 40989->40990 41001 4147d9 40989->41001 40990->40960 41007 416439 40994->41007 40996 41b3b8 40996->40962 41016 41d79d 40997->41016 41000->40962 41002 4147e5 41001->41002 41004 4147f4 41002->41004 41006 43e173 6 API calls __get_daylight 41002->41006 41005 415545 75 API calls ctype 41004->41005 41005->40990 41006->41004 41008 416445 __EH_prolog3 41007->41008 41011 416373 41008->41011 41010 41645a Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41010->40996 41012 416383 41011->41012 41014 416396 ctype 41011->41014 41015 41e218 6 API calls ctype 41012->41015 41014->41010 41015->41014 41017 41d7a9 ctype 41016->41017 41018 41d7cb 41016->41018 41017->41018 41021 41b510 41017->41021 41024 41b4f4 41017->41024 41018->40962 41027 416536 41021->41027 41023 41b519 41023->41018 41077 416719 41024->41077 41026 41b4ff 41026->41018 41028 416571 41027->41028 41029 41656a 41027->41029 41031 416594 41028->41031 41032 409270 78 API calls 41028->41032 41035 4165c1 Concurrency::details::ExternalContextBase::~ExternalContextBase 41028->41035 41037 409270 41029->41037 41044 41dbf2 77 API calls 41031->41044 41032->41031 41034 4165ac 41034->41035 41045 4163aa 41034->41045 41035->41023 41038 409294 41037->41038 41039 40927c 41037->41039 41038->41028 41051 41e3b9 41039->41051 41040 409284 41042 409270 78 API calls 41040->41042 41057 41b524 41040->41057 41042->41038 41044->41034 41046 4163e8 41045->41046 41047 4163bb 41045->41047 41046->41035 41048 409270 78 API calls 41047->41048 41049 4163c9 41047->41049 41048->41049 41049->41046 41076 41e23d 69 API calls ctype 41049->41076 41052 41e3c5 __EH_prolog3 41051->41052 41053 43e277 std::runtime_error::runtime_error 75 API calls 41052->41053 41054 41e3cc 41053->41054 41056 41e3de ~_Task_impl 41054->41056 41063 41af74 75 API calls 2 library calls 41054->41063 41056->41040 41058 41b55a 41057->41058 41059 409270 78 API calls 41058->41059 41060 41b566 41059->41060 41064 416847 41060->41064 41062 41b571 Concurrency::details::ExternalContextBase::~ExternalContextBase 41062->41038 41063->41056 41065 416853 __EH_prolog3 41064->41065 41070 41df93 41065->41070 41068 4163aa 78 API calls 41069 416875 Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41068->41069 41069->41062 41071 41dfa1 41070->41071 41072 41df9c 41070->41072 41074 41dc7d 77 API calls 41071->41074 41073 409270 78 API calls 41072->41073 41073->41071 41075 416867 41074->41075 41075->41068 41076->41046 41078 41674d 41077->41078 41080 416754 41077->41080 41079 409270 78 API calls 41078->41079 41079->41080 41081 416777 41080->41081 41082 409270 78 API calls 41080->41082 41086 4167a3 Concurrency::details::ExternalContextBase::~ExternalContextBase 41080->41086 41087 41dc6d 41081->41087 41082->41081 41085 4163aa 78 API calls 41085->41086 41086->41026 41090 41da07 41087->41090 41089 41678e 41089->41085 41089->41086 41091 41d9b3 ctype 68 API calls 41090->41091 41094 41da17 _wcslen _strlen 41091->41094 41092 43e277 std::runtime_error::runtime_error 75 API calls 41093 41da6b 41092->41093 41095 41dac5 41093->41095 41097 41dace _realloc 41093->41097 41098 41da91 41093->41098 41094->41092 41094->41097 41096 43ff12 _malloc 67 API calls 41095->41096 41096->41097 41097->41089 41098->41097 41099 41dab7 InterlockedIncrement 41098->41099 41099->41097 41101 4147d9 ctype 6 API calls 41100->41101 41102 41911c 41101->41102 41103 4147d9 ctype 6 API calls 41102->41103 41104 419127 41103->41104 41105 4147d9 ctype 6 API calls 41104->41105 41106 419132 41105->41106 41107 4147d9 ctype 6 API calls 41106->41107 41108 41913d 41107->41108 41110 41914e ctype 41108->41110 41125 43e173 6 API calls __get_daylight 41108->41125 41110->40969 41112 4147d9 ctype 6 API calls 41111->41112 41113 4153d8 41112->41113 41114 4147d9 ctype 6 API calls 41113->41114 41115 4153e3 41114->41115 41116 4147d9 ctype 6 API calls 41115->41116 41117 4153ee 41116->41117 41118 4147d9 ctype 6 API calls 41117->41118 41119 4153f9 41118->41119 41121 41540a 41119->41121 41126 43e173 6 API calls __get_daylight 41119->41126 41122 415432 41121->41122 41127 43de7d 67 API calls 3 library calls 41121->41127 41122->40973 41124->40969 41125->41110 41126->41121 41127->41122 41129 4147d9 ctype 6 API calls 41128->41129 41130 4152e9 41129->41130 41131 4147d9 ctype 6 API calls 41130->41131 41132 4152f4 41131->41132 41133 4147d9 ctype 6 API calls 41132->41133 41134 4152ff 41133->41134 41135 4147d9 ctype 6 API calls 41134->41135 41136 41530a 41135->41136 41138 41531b ctype 41136->41138 41140 43e173 6 API calls __get_daylight 41136->41140 41138->40980 41139->40980 41140->41138 41142 414af1 41141->41142 41143 414af8 41141->41143 41142->40869 41194 41a6d0 41143->41194 41146 421612 41145->41146 41198 421be8 41146->41198 41150 421822 41149->41150 41151 42183b 41149->41151 41152 421be8 92 API calls 41150->41152 41151->40869 41152->41151 41302 4165e7 41153->41302 41155 416d75 41155->40869 41157 409270 78 API calls 41156->41157 41158 41ee8d 41157->41158 41315 419fc5 41158->41315 41159 41eea0 41159->40869 41163 421c90 41161->41163 41164 421c94 41163->41164 41469 42b57e 41163->41469 41473 42163a 41163->41473 41491 42b93c 75 API calls ctype 41163->41491 41164->40869 41168 42f9ce _memset 41167->41168 41169 42f99d FindCloseChangeNotification 41167->41169 41168->40869 41169->41168 41170 42f9ad 41169->41170 41171 42f9bd SetFileAttributesW 41170->41171 41171->41168 41173 41619a 41172->41173 41174 4161ac 41172->41174 41511 4081a0 41173->41511 41174->40869 41178 420055 __EH_prolog3_GS 41177->41178 41179 416941 78 API calls 41178->41179 41188 420067 _wcsrchr ~_Task_impl 41179->41188 41180 4201a0 ~_Task_impl 41183 4427e7 5 API calls 41180->41183 41181 416f48 6 API calls 41181->41188 41182 417541 6 API calls 41182->41188 41184 41fc5e 41183->41184 41184->40850 41185 409256 75 API calls 41185->41188 41187 412dba 75 API calls 41187->41188 41188->41180 41188->41181 41188->41182 41188->41185 41188->41187 41190 408154 67 API calls ctype 41188->41190 41755 413579 75 API calls 3 library calls 41188->41755 41756 41fc62 79 API calls __wcsicoll 41188->41756 41757 41fcf6 110 API calls 6 library calls 41188->41757 41758 41fee5 75 API calls 41188->41758 41190->41188 41193->40870 41197 4163ed 6 API calls 3 library calls 41194->41197 41196 41a6d8 41196->41142 41197->41196 41199 421bf6 41198->41199 41200 421628 41198->41200 41202 421259 41199->41202 41200->40869 41203 42127c 41202->41203 41204 4212b8 41203->41204 41206 403925 WaitForSingleObject 41203->41206 41204->41200 41207 403969 41206->41207 41208 403caa 41206->41208 41209 403970 41207->41209 41210 403b9a 41207->41210 41289 401cca RtlEnterCriticalSection RtlLeaveCriticalSection 41208->41289 41212 40397b 41209->41212 41213 403a6e 41209->41213 41270 401cca RtlEnterCriticalSection RtlLeaveCriticalSection 41210->41270 41216 4039a4 41212->41216 41217 40397f 41212->41217 41222 403a96 41213->41222 41225 403995 ~_Task_impl 41213->41225 41231 403b2e 41213->41231 41215 403caf 41219 403cb3 RtlEnterCriticalSection RtlLeaveCriticalSection 41215->41219 41215->41225 41268 402781 RtlEnterCriticalSection RtlLeaveCriticalSection 41216->41268 41217->41225 41287 4141cd 75 API calls 41217->41287 41218 403b9f 41223 43e277 std::runtime_error::runtime_error 75 API calls 41218->41223 41218->41225 41219->41225 41230 416941 78 API calls 41222->41230 41233 403bae 41223->41233 41224 4039a9 41224->41225 41269 401cca RtlEnterCriticalSection RtlLeaveCriticalSection 41224->41269 41225->41204 41226 403b5d RtlEnterCriticalSection 41227 4011e0 75 API calls 41226->41227 41229 403b78 RtlLeaveCriticalSection 41227->41229 41229->41225 41234 403ab2 41230->41234 41231->41226 41235 43e492 __cinit 74 API calls 41231->41235 41232 4039b6 41236 403a22 41232->41236 41237 4039ba 41232->41237 41271 416ca1 41233->41271 41240 416f48 6 API calls 41234->41240 41242 403b5c 41235->41242 41241 43e277 std::runtime_error::runtime_error 75 API calls 41236->41241 41238 4039e1 41237->41238 41239 4039c5 41237->41239 41238->41225 41246 43e277 std::runtime_error::runtime_error 75 API calls 41238->41246 41243 43e277 std::runtime_error::runtime_error 75 API calls 41239->41243 41248 403ac4 ~_Task_impl 41240->41248 41245 4039cc PostMessageW 41241->41245 41242->41226 41243->41245 41245->41225 41246->41245 41250 417541 6 API calls 41248->41250 41249 403be5 ~_Task_impl 41274 416941 41249->41274 41251 403ae9 41250->41251 41288 401d0a 77 API calls 3 library calls 41251->41288 41254 403c1d 41280 416f48 41254->41280 41255 403aef SendMessageW 41257 403b29 ~_Task_impl 41255->41257 41258 403b1a ~_Task_impl 41255->41258 41257->41231 41258->41225 41259 403c2f ~_Task_impl 41284 417541 41259->41284 41262 401238 75 API calls 41263 403c5e 41262->41263 41264 4011e0 75 API calls 41263->41264 41265 403c78 41264->41265 41266 40146e ctype 67 API calls 41265->41266 41267 403c89 PostMessageW 41266->41267 41267->41225 41268->41224 41269->41232 41270->41218 41272 416941 78 API calls 41271->41272 41273 416cb0 ~_Task_impl 41272->41273 41273->41249 41275 41694d __EH_prolog3 41274->41275 41276 409270 78 API calls 41275->41276 41277 416961 41275->41277 41276->41277 41290 41ddd5 41277->41290 41279 416980 ctype Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41279->41254 41281 416f54 __EH_prolog3 41280->41281 41294 416e54 41281->41294 41283 416f67 Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41283->41259 41298 4164e5 41284->41298 41286 403c54 41286->41262 41287->41225 41288->41255 41289->41215 41291 41dde1 __EH_prolog3 41290->41291 41292 416373 6 API calls 41291->41292 41293 41ddfc Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41292->41293 41293->41279 41295 416e60 __EH_prolog3 41294->41295 41296 416e8b ctype ~_Task_impl 41295->41296 41297 40d423 ctype 6 API calls 41295->41297 41296->41283 41297->41296 41299 4164f1 __EH_prolog3 41298->41299 41300 416373 6 API calls 41299->41300 41301 416506 Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41300->41301 41301->41286 41303 416622 41302->41303 41304 41661b 41302->41304 41306 409270 78 API calls 41303->41306 41307 416645 41303->41307 41310 416672 Concurrency::details::ExternalContextBase::~ExternalContextBase 41303->41310 41305 409270 78 API calls 41304->41305 41305->41303 41306->41307 41312 41dc07 41307->41312 41310->41155 41311 4163aa 78 API calls 41311->41310 41313 41da07 77 API calls 41312->41313 41314 41665d 41313->41314 41314->41310 41314->41311 41316 419fe4 41315->41316 41323 419fda _memset ~_Task_impl 41315->41323 41325 41a141 41316->41325 41318 419fef ctype 41341 417b9d 41318->41341 41320 41a016 41344 41addb 41320->41344 41323->41159 41326 41a152 41325->41326 41356 41a1e9 41326->41356 41331 41a1ca 6 API calls 41332 41a181 41331->41332 41364 41a22e 41332->41364 41334 41a18d 41335 41a22e 6 API calls 41334->41335 41336 41a19d 41335->41336 41369 40300b 41336->41369 41338 41a1ac 41339 41a1e9 6 API calls 41338->41339 41340 41a1c5 41339->41340 41340->41318 41342 416536 78 API calls 41341->41342 41343 417ba8 41342->41343 41343->41320 41345 41ade5 41344->41345 41346 41a070 41344->41346 41379 416272 41345->41379 41348 409aa7 41346->41348 41391 409fe0 41348->41391 41350 409ab6 41351 409ac0 41350->41351 41352 409ac7 41350->41352 41398 40a07a 41351->41398 41414 40a1cf 78 API calls 41352->41414 41355 409ac5 41355->41323 41359 41a1f5 41356->41359 41358 41a168 41360 41a1ca 41358->41360 41359->41358 41375 43e173 6 API calls __get_daylight 41359->41375 41361 41a1d6 41360->41361 41362 41a1e9 6 API calls 41361->41362 41363 41a172 41362->41363 41363->41331 41365 41a238 41364->41365 41366 41a23a 41364->41366 41365->41334 41368 41a250 41366->41368 41376 43e173 6 API calls __get_daylight 41366->41376 41368->41334 41370 40301a 41369->41370 41372 40301f 41369->41372 41377 43de2b 75 API calls 4 library calls 41370->41377 41374 403060 std::runtime_error::~runtime_error 41372->41374 41378 40198f 67 API calls _memmove_s 41372->41378 41374->41338 41375->41358 41376->41368 41378->41374 41380 416292 41379->41380 41381 41627c 41379->41381 41380->41346 41384 42fb28 41381->41384 41387 42f66c 41384->41387 41388 416290 41387->41388 41389 42f686 SetFilePointer 41387->41389 41388->41346 41389->41388 41415 416db8 41391->41415 41397 40a054 ctype 41397->41350 41399 40a09f 41398->41399 41424 409d94 41399->41424 41401 40a0b2 41414->41355 41416 416536 78 API calls 41415->41416 41417 40a04a 41416->41417 41418 416dc2 41417->41418 41419 416536 78 API calls 41418->41419 41420 40a04f 41419->41420 41421 416dcc 41420->41421 41422 416536 78 API calls 41421->41422 41423 416dd5 41422->41423 41423->41397 41425 409da0 __EH_prolog3 41424->41425 41431 409e1e ~_Task_impl 41425->41431 41444 409e50 41425->41444 41431->41401 41445 409e88 _memset 41444->41445 41470 42b594 41469->41470 41471 42b58f 41469->41471 41470->41163 41492 43e173 6 API calls __get_daylight 41471->41492 41474 421680 41473->41474 41475 421793 41474->41475 41476 416f48 6 API calls 41474->41476 41475->41163 41477 42169f ~_Task_impl 41476->41477 41493 4174cf 41477->41493 41479 4216ca ~_Task_impl 41480 417541 6 API calls 41479->41480 41481 4216f3 41480->41481 41484 4216fe 41481->41484 41499 417c15 78 API calls _wcslen 41481->41499 41483 42175c 41483->41475 41486 421be8 92 API calls 41483->41486 41484->41483 41500 41a5bc 41484->41500 41486->41475 41487 42171a ~_Task_impl 41504 41aaf4 41487->41504 41490 41aaf4 6 API calls 41490->41483 41491->41163 41492->41470 41494 4174db __EH_prolog3 41493->41494 41495 4174ef 41494->41495 41496 409270 78 API calls 41494->41496 41497 41ddd5 6 API calls 41495->41497 41496->41495 41498 41750e ctype Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41497->41498 41498->41479 41499->41484 41501 41a5c8 __EH_prolog3 41500->41501 41502 416e54 6 API calls 41501->41502 41503 41a5db Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41502->41503 41503->41487 41507 41648a 41504->41507 41506 41ab01 41506->41483 41506->41490 41508 416496 __EH_prolog3 41507->41508 41509 416373 6 API calls 41508->41509 41510 4164ae Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 41509->41510 41510->41506 41542 417f06 41511->41542 41515 408203 41584 4186b3 41515->41584 41517 408229 41620 408154 41517->41620 41519 40827b 41625 417e3e 41519->41625 41521 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41522 40825c 41521->41522 41522->40869 41524 4082a3 41525 401238 75 API calls 41524->41525 41526 4082ad 41525->41526 41527 4011e0 75 API calls 41526->41527 41528 4082c6 41527->41528 41529 40146e ctype 67 API calls 41528->41529 41530 4082df SendMessageW 41529->41530 41531 408305 SendMessageW 41530->41531 41532 40833b 41530->41532 41533 40146e ctype 67 API calls 41531->41533 41633 4141a3 75 API calls 41532->41633 41534 408336 41533->41534 41534->41517 41536 408355 41537 417f06 83 API calls 41536->41537 41538 408366 41537->41538 41539 40146e ctype 67 API calls 41538->41539 41540 40837b 41539->41540 41540->41517 41545 417f54 41542->41545 41550 417fa3 41542->41550 41543 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41544 4081f5 41543->41544 41580 4080e4 41544->41580 41546 417f9a 41545->41546 41547 417faa 41545->41547 41545->41550 41548 408154 ctype 67 API calls 41546->41548 41634 42eda9 41547->41634 41548->41550 41550->41543 41552 417fc6 41554 43e277 std::runtime_error::runtime_error 75 API calls 41552->41554 41553 417ffc 41555 43e277 std::runtime_error::runtime_error 75 API calls 41553->41555 41557 417fcb 41554->41557 41556 418001 41555->41556 41563 417ffa 41556->41563 41646 417d2d 41556->41646 41558 417fe1 41557->41558 41560 417d2d 75 API calls 41557->41560 41655 41342f 41558->41655 41560->41558 41660 418a98 41563->41660 41565 41803b 41567 415366 75 API calls 41565->41567 41566 41805f 41568 40d423 ctype 6 API calls 41566->41568 41569 418059 41567->41569 41568->41569 41570 4180c3 41569->41570 41571 418097 41569->41571 41664 42faaf 41570->41664 41573 42eda9 76 API calls 41571->41573 41574 4180ae 41573->41574 41575 4180f6 41574->41575 41670 417ed3 67 API calls 2 library calls 41574->41670 41577 408154 ctype 67 API calls 41575->41577 41577->41550 41578 4180eb 41579 40d423 ctype 6 API calls 41578->41579 41579->41575 41581 4080f0 __EH_prolog3 41580->41581 41734 408110 41581->41734 41583 408106 ~_Task_impl 41583->41515 41585 418719 41584->41585 41604 41870f 41584->41604 41587 40d423 ctype 6 API calls 41585->41587 41585->41604 41586 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41588 408222 41586->41588 41589 418733 41587->41589 41588->41517 41588->41519 41590 40d423 ctype 6 API calls 41589->41590 41589->41604 41591 418741 41590->41591 41592 4187f6 41591->41592 41593 41874e 41591->41593 41594 40d423 ctype 6 API calls 41592->41594 41596 40d423 ctype 6 API calls 41593->41596 41595 41882d 41594->41595 41597 40d423 ctype 6 API calls 41595->41597 41595->41604 41598 41876a 41596->41598 41599 41883d 41597->41599 41603 40d423 ctype 6 API calls 41598->41603 41617 4187a8 41598->41617 41600 40d423 ctype 6 API calls 41599->41600 41599->41604 41601 418853 41600->41601 41738 42f38a 41601->41738 41605 41879b 41603->41605 41604->41586 41606 41342f 75 API calls 41605->41606 41606->41617 41607 418861 41608 4188d0 41607->41608 41609 4188ab 41607->41609 41610 401238 75 API calls 41608->41610 41611 409256 75 API calls 41609->41611 41612 4188de 41610->41612 41613 4188bb 41611->41613 41616 41342f 75 API calls 41612->41616 41614 41342f 75 API calls 41613->41614 41615 4188ce 41614->41615 41618 408154 ctype 67 API calls 41615->41618 41616->41615 41751 42fc0b 67 API calls ctype 41617->41751 41618->41604 41621 40146e ctype 67 API calls 41620->41621 41622 408161 41621->41622 41623 40146e ctype 67 API calls 41622->41623 41624 40816c 41623->41624 41624->41521 41626 417e4a __EH_prolog3 41625->41626 41627 409256 75 API calls 41626->41627 41628 417e5a 41627->41628 41629 41342f 75 API calls 41628->41629 41630 417e69 41629->41630 41631 408154 ctype 67 API calls 41630->41631 41632 417e72 ~_Task_impl 41631->41632 41632->41524 41633->41536 41635 42edb5 __EH_prolog3_GS 41634->41635 41671 409256 41635->41671 41637 42edc1 41674 41348c 41637->41674 41639 42edcd GetFileAttributesW 41641 42ede5 41639->41641 41642 408154 ctype 67 API calls 41641->41642 41643 42edf4 41642->41643 41644 4427e7 5 API calls 41643->41644 41645 417fbf 41644->41645 41645->41552 41645->41553 41647 417d39 __EH_prolog3 41646->41647 41648 417d64 41647->41648 41649 417d46 41647->41649 41650 43e277 std::runtime_error::runtime_error 75 API calls 41648->41650 41651 43e277 std::runtime_error::runtime_error 75 API calls 41649->41651 41652 417d6e 41650->41652 41654 417d4d ~_Task_impl 41651->41654 41652->41654 41711 42f18b 75 API calls 41652->41711 41654->41563 41656 40132a 75 API calls 41655->41656 41657 41343b 41656->41657 41658 40132a 75 API calls 41657->41658 41659 41344b 41658->41659 41659->41563 41662 418034 41660->41662 41663 418aaf 41660->41663 41661 40d423 ctype 6 API calls 41661->41663 41662->41565 41662->41566 41663->41661 41663->41662 41665 42fac3 41664->41665 41666 42fabe 41664->41666 41712 42f824 41665->41712 41733 42fae6 75 API calls ~_Task_impl 41666->41733 41668 42fad0 41668->41574 41670->41578 41672 401238 75 API calls 41671->41672 41673 409262 41672->41673 41673->41637 41675 413498 __EH_prolog3 41674->41675 41686 413628 41675->41686 41677 41349f 41706 412dba 41677->41706 41679 4134a8 41680 41342f 75 API calls 41679->41680 41681 4134b1 41680->41681 41682 408154 ctype 67 API calls 41681->41682 41683 4134ba 41682->41683 41684 402b38 ~_Task_impl 75 API calls 41683->41684 41685 4134c3 ~_Task_impl 41684->41685 41685->41639 41687 413634 __EH_prolog3 41686->41687 41688 41364c 41687->41688 41689 41363f 41687->41689 41709 4089c9 75 API calls std::runtime_error::runtime_error 41688->41709 41690 402b38 ~_Task_impl 75 API calls 41689->41690 41697 413648 ~_Task_impl 41690->41697 41692 413656 41693 4136b4 41692->41693 41694 41365e 41692->41694 41695 40132a 75 API calls 41693->41695 41710 413c86 75 API calls 3 library calls 41694->41710 41695->41697 41697->41677 41698 413668 41699 40132a 75 API calls 41698->41699 41700 413689 41699->41700 41701 40132a 75 API calls 41700->41701 41702 41369c 41701->41702 41703 40146e ctype 67 API calls 41702->41703 41704 4136a7 41703->41704 41705 40146e ctype 67 API calls 41704->41705 41705->41697 41707 401258 75 API calls 41706->41707 41708 412dc6 41707->41708 41708->41679 41709->41692 41710->41698 41711->41654 41714 42f830 __EH_prolog3 41712->41714 41713 42f887 CreateFileW 41715 42f8b1 41713->41715 41716 42f95c 41713->41716 41714->41713 41718 42f940 GetLastError 41715->41718 41719 42f8bb GetFileAttributesW SetFileAttributesW CreateFileW 41715->41719 41717 401238 75 API calls 41716->41717 41720 42f967 41717->41720 41728 42f90c ~_Task_impl 41718->41728 41721 42f913 41719->41721 41722 42f8f0 GetLastError SetFileAttributesW 41719->41722 41722->41728 41728->41668 41733->41665 41735 408127 _memset 41734->41735 41736 402b38 ~_Task_impl 75 API calls 41735->41736 41737 408151 41736->41737 41737->41583 41739 42f3aa 41738->41739 41747 42f413 41738->41747 41740 42f3bc GetFileTime 41739->41740 41744 42f44e 41739->41744 41741 42f406 GetLastError 41740->41741 41742 42f418 41740->41742 41741->41747 41742->41744 41752 42f568 126 API calls 41742->41752 41746 42f476 GetFileAttributesW 41744->41746 41744->41747 41745 42f426 41745->41744 41753 42f568 126 API calls 41745->41753 41746->41741 41746->41747 41747->41607 41749 42f43a 41749->41744 41754 42f568 126 API calls 41749->41754 41751->41604 41752->41745 41753->41749 41754->41744 41755->41188 41756->41188 41757->41188 41758->41188 41760 41ed67 __EH_prolog3 41759->41760 41846 418d0b 41760->41846 41762 41ed79 41856 414e19 41762->41856 41764 41ed86 ~_Task_impl 41764->40884 41766 414f17 __EH_prolog3 ctype 41765->41766 41767 414f23 ctype ~_Task_impl 41766->41767 41768 415366 75 API calls 41766->41768 41767->40894 41769 414f62 ctype 41768->41769 41770 41b3af 6 API calls 41769->41770 41773 414f80 ctype 41770->41773 41771 414fdb 41771->41767 41869 4151ae 6 API calls ctype 41771->41869 41773->41771 41774 41b3af 6 API calls 41773->41774 41868 41526c 75 API calls ctype 41773->41868 41774->41773 41870 41f168 41776->41870 41778 41f35b 41779 409270 78 API calls 41778->41779 41780 41f363 41779->41780 41781 409270 78 API calls 41780->41781 41782 41f36e 41781->41782 41782->40900 41837->40898 41847 418d17 __EH_prolog3 41846->41847 41848 43e277 std::runtime_error::runtime_error 75 API calls 41847->41848 41849 418d2a 41848->41849 41850 43e277 std::runtime_error::runtime_error 75 API calls 41849->41850 41851 418d53 41850->41851 41852 43e277 std::runtime_error::runtime_error 75 API calls 41851->41852 41853 418d74 41852->41853 41855 418d80 ~_Task_impl 41853->41855 41866 42eb7f RtlInitializeCriticalSection 41853->41866 41855->41762 41857 414e25 __EH_prolog3 41856->41857 41858 43e277 std::runtime_error::runtime_error 75 API calls 41857->41858 41859 414e38 41858->41859 41860 43e277 std::runtime_error::runtime_error 75 API calls 41859->41860 41861 414e61 41860->41861 41862 43e277 std::runtime_error::runtime_error 75 API calls 41861->41862 41863 414e82 41862->41863 41865 414e8e ~_Task_impl 41863->41865 41867 42eb7f RtlInitializeCriticalSection 41863->41867 41865->41764 41866->41855 41867->41865 41868->41773 41869->41767 41871 41f1c8 _memset 41870->41871 41872 402b38 ~_Task_impl 75 API calls 41871->41872 41873 41f1f5 41872->41873 41874 402b38 ~_Task_impl 75 API calls 41873->41874 41875 41f201 ~_Task_impl 41874->41875 41878 420aee 41875->41878 41877 41f22c ~_Task_impl 41877->41778 41881 420bb1 41878->41881 41884 420bc2 moneypunct 41881->41884 41885 420afe 41881->41885 41882 420bb1 ctype 67 API calls 41882->41884 41883 408154 ctype 67 API calls 41883->41884 41884->41882 41884->41883 41884->41885 41885->41877 42440 41def1 42441 43e277 std::runtime_error::runtime_error 75 API calls 42440->42441 42442 41def8 42441->42442 42443 414a32 42444 414a41 42443->42444 42445 414a3a 42443->42445 42446 416192 141 API calls 42444->42446 42448 40995f 42444->42448 42446->42445 42449 409999 42448->42449 42450 409d94 12 API calls 42449->42450 42455 409a2c 42449->42455 42451 4099de 42450->42451 42452 41addb SetFilePointer 42451->42452 42453 4099f5 42452->42453 42454 41ad54 6 API calls 42453->42454 42453->42455 42454->42455 42455->42445 42456 4162b5 42457 4162cb 42456->42457 42458 4162bd 42456->42458 42461 41892d 42458->42461 42462 418956 42461->42462 42463 4162ca 42461->42463 42462->42463 42464 40d423 ctype 6 API calls 42462->42464 42465 418973 42464->42465 42465->42463 42466 40d423 ctype 6 API calls 42465->42466 42467 418981 42466->42467 42468 4189e5 42467->42468 42469 41898a 42467->42469 42471 40d423 ctype 6 API calls 42468->42471 42470 40d423 ctype 6 API calls 42469->42470 42472 4189c0 42470->42472 42473 418a16 42471->42473 42491 42ef1d CreateFileW SetFileTime CloseHandle SetFileAttributesW 42472->42491 42473->42463 42475 40d423 ctype 6 API calls 42473->42475 42478 418a22 42475->42478 42477 4189de 42477->42463 42478->42463 42479 40d423 ctype 6 API calls 42478->42479 42480 418a79 42479->42480 42482 42f20d 42480->42482 42483 42f22d 42482->42483 42490 42f233 42482->42490 42484 42f2ec SetFileTime 42483->42484 42486 42f32c 42483->42486 42483->42490 42485 42f31d GetLastError 42484->42485 42484->42486 42485->42490 42486->42490 42492 42fb14 SetFilePointer 42486->42492 42488 42f346 42488->42485 42489 42f350 SetEndOfFile 42488->42489 42489->42485 42489->42490 42490->42463 42491->42477 42492->42488 42493 440412 42530 44396c 42493->42530 42495 44041e GetStartupInfoW 42497 440441 42495->42497 42531 44827d HeapCreate 42497->42531 42502 440491 42533 4431a0 GetModuleHandleW 42502->42533 42503 4404a2 __RTC_Initialize 42567 447ff7 42503->42567 42506 4404b0 42507 4404bc GetCommandLineW 42506->42507 42622 443663 67 API calls 3 library calls 42506->42622 42582 449cc4 GetEnvironmentStringsW 42507->42582 42510 4404bb 42510->42507 42511 4404cb 42589 449c16 GetModuleFileNameW 42511->42589 42514 4404e0 42595 4499e7 42514->42595 42518 4404f1 42608 443722 42518->42608 42521 4404f8 42523 440503 __wwincmdln 42521->42523 42625 443663 67 API calls 3 library calls 42521->42625 42614 404ee8 42523->42614 42526 440532 42626 4438ff 67 API calls _doexit 42526->42626 42530->42495 42532 440485 42531->42532 42532->42502 42620 4403e9 67 API calls 3 library calls 42532->42620 42534 4431b4 42533->42534 42535 4431bb 42533->42535 42627 443633 Sleep GetModuleHandleW 42534->42627 42537 4431c5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 42535->42537 42538 443323 42535->42538 42540 44320e TlsAlloc 42537->42540 42630 442e4c 70 API calls 2 library calls 42538->42630 42539 4431ba 42539->42535 42543 440497 42540->42543 42544 44325c TlsSetValue 42540->42544 42543->42503 42621 4403e9 67 API calls 3 library calls 42543->42621 42544->42543 42545 44326d 42544->42545 42628 44391d 6 API calls 4 library calls 42545->42628 42547 443272 42548 442ce5 __encode_pointer 6 API calls 42547->42548 42549 44327d 42548->42549 42550 442ce5 __encode_pointer 6 API calls 42549->42550 42551 44328d 42550->42551 42552 442ce5 __encode_pointer 6 API calls 42551->42552 42553 44329d 42552->42553 42554 442ce5 __encode_pointer 6 API calls 42553->42554 42555 4432ad 42554->42555 42629 446800 InitializeCriticalSectionAndSpinCount __ioinit 42555->42629 42557 4432ba 42557->42538 42558 442d60 __decode_pointer 6 API calls 42557->42558 42559 4432ce 42558->42559 42559->42538 42560 4434a4 __calloc_crt 67 API calls 42559->42560 42561 4432e7 42560->42561 42561->42538 42562 442d60 __decode_pointer 6 API calls 42561->42562 42563 443301 42562->42563 42563->42538 42564 443308 42563->42564 42565 442e89 __mtinit 67 API calls 42564->42565 42566 443310 GetCurrentThreadId 42565->42566 42566->42543 42631 44396c 42567->42631 42569 448003 GetStartupInfoA 42570 4434a4 __calloc_crt 67 API calls 42569->42570 42578 448024 42570->42578 42571 448242 ___BuildCatchObjectHelper 42571->42506 42572 4481bf GetStdHandle 42577 448189 42572->42577 42573 44810c 42573->42571 42573->42577 42579 448135 GetFileType 42573->42579 42632 44b811 InitializeCriticalSectionAndSpinCount ___BuildCatchObjectHelper 42573->42632 42574 448224 SetHandleCount 42574->42571 42575 4434a4 __calloc_crt 67 API calls 42575->42578 42576 4481d1 GetFileType 42576->42577 42577->42571 42577->42572 42577->42574 42577->42576 42633 44b811 InitializeCriticalSectionAndSpinCount ___BuildCatchObjectHelper 42577->42633 42578->42571 42578->42573 42578->42575 42578->42577 42579->42573 42583 449cd5 42582->42583 42584 449cd9 42582->42584 42583->42511 42634 44345f 67 API calls _malloc 42584->42634 42587 449d01 FreeEnvironmentStringsW 42587->42511 42588 449cfa _realloc 42588->42587 42590 449c4b _wparse_cmdline 42589->42590 42591 4404d5 42590->42591 42592 449c88 42590->42592 42591->42514 42623 443663 67 API calls 3 library calls 42591->42623 42635 44345f 67 API calls _malloc 42592->42635 42594 449c8e _wparse_cmdline 42594->42591 42596 4499ff _wcslen 42595->42596 42600 4404e6 42595->42600 42597 4434a4 __calloc_crt 67 API calls 42596->42597 42603 449a23 _wcslen 42597->42603 42598 449a88 42599 43fe35 __crtCompareStringA_stat 67 API calls 42598->42599 42599->42600 42600->42518 42624 443663 67 API calls 3 library calls 42600->42624 42601 4434a4 __calloc_crt 67 API calls 42601->42603 42602 449aae 42604 43fe35 __crtCompareStringA_stat 67 API calls 42602->42604 42603->42598 42603->42600 42603->42601 42603->42602 42606 449a6d 42603->42606 42636 43f650 67 API calls 2 library calls 42603->42636 42604->42600 42606->42603 42637 43e025 10 API calls 3 library calls 42606->42637 42610 443730 __IsNonwritableInCurrentImage 42608->42610 42638 44b5c0 42610->42638 42611 44374e __initterm_e 42612 43e492 __cinit 74 API calls 42611->42612 42613 44376d __IsNonwritableInCurrentImage __initterm 42611->42613 42612->42613 42613->42521 42642 404efc RtlEnterCriticalSection RtlLeaveCriticalSection 42614->42642 42617 4438d3 42706 4437a7 42617->42706 42620->42502 42621->42503 42622->42510 42623->42514 42624->42518 42625->42523 42627->42539 42628->42547 42629->42557 42630->42543 42631->42569 42632->42573 42633->42577 42634->42588 42635->42594 42636->42603 42637->42606 42639 44b5c6 42638->42639 42640 442ce5 __encode_pointer 6 API calls 42639->42640 42641 44b5de 42639->42641 42640->42639 42641->42611 42656 402199 42642->42656 42646 404f3a 42647 404f42 42646->42647 42648 404f83 DialogBoxParamW 42646->42648 42650 402a2e 76 API calls 42647->42650 42649 404f7f 42648->42649 42652 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 42649->42652 42651 404f4d MessageBoxW 42650->42651 42655 40146e ctype 67 API calls 42651->42655 42654 404ef2 42652->42654 42654->42526 42654->42617 42655->42649 42657 4021c9 _memset 42656->42657 42658 401e56 76 API calls 42657->42658 42659 4021ef CreateFileW 42658->42659 42661 402241 ReadFile 42659->42661 42662 40221f 42659->42662 42664 402278 SetFilePointer ReadFile 42661->42664 42665 40226e CloseHandle 42661->42665 42663 40146e ctype 67 API calls 42662->42663 42674 402230 42663->42674 42666 4022a7 CloseHandle 42664->42666 42667 4022c9 42664->42667 42665->42662 42668 4022b0 42666->42668 42669 4022da 42667->42669 42670 40231d FindCloseChangeNotification 42667->42670 42671 40146e ctype 67 API calls 42668->42671 42672 4022e0 ReadFile 42669->42672 42670->42668 42671->42674 42672->42670 42672->42672 42673 43de6e __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 42675 40223f 42673->42675 42674->42673 42675->42646 42676 401f09 42675->42676 42677 401f15 __EH_prolog3_GS 42676->42677 42678 401e56 76 API calls 42677->42678 42679 401f1d CreateFileW 42678->42679 42681 402180 42679->42681 42682 401f53 SetFilePointer ReadFile 42679->42682 42685 40146e ctype 67 API calls 42681->42685 42683 401f81 CloseHandle 42682->42683 42684 401fa5 42682->42684 42688 40146e ctype 67 API calls 42683->42688 42684->42683 42689 401fc2 ReadFile 42684->42689 42687 402168 42685->42687 42689->42683 42729 408399 42732 4083b5 42729->42732 42731 4083a1 moneypunct 42733 4083c5 FindCloseChangeNotification 42732->42733 42734 4083cc RtlDeleteCriticalSection 42732->42734 42733->42734 42734->42731 42735 42f758 42736 42f769 WriteFile 42735->42736 42738 42f791 42735->42738 42737 42f784 GetLastError 42736->42737 42736->42738 42737->42738 42739 40979d 42740 4097c0 42739->42740 42741 4097ac 42739->42741 42745 40a6ae 42740->42745 42743 4097b1 42741->42743 42767 40a5fe 81 API calls 42741->42767 42746 40a6e5 42745->42746 42747 40a6d1 42745->42747 42749 41ad54 6 API calls 42746->42749 42752 40a724 42746->42752 42766 40a81a 42746->42766 42748 41ae8f SetFilePointer 42747->42748 42748->42746 42749->42752 42750 40a84e 42824 40b250 42750->42824 42752->42750 42758 41ae8f SetFilePointer 42752->42758 42763 40a7aa 42752->42763 42752->42766 42753 40a7e3 42754 40a828 42753->42754 42755 40a7e9 42753->42755 42771 40a8fd 42754->42771 42768 41ae8f 42755->42768 42758->42763 42760 40a831 42760->42766 42814 416cfc 42760->42814 42761 41addb SetFilePointer 42761->42766 42763->42750 42763->42753 42766->42743 42767->42743 42769 41addb SetFilePointer 42768->42769 42770 40a7fd 42769->42770 42770->42761 42772 40a909 __EH_prolog3 42771->42772 42870 40bae9 42772->42870 42775 41ad54 6 API calls 42776 40a947 42775->42776 42777 416ca1 78 API calls 42776->42777 42806 40aad6 ~_Task_impl 42776->42806 42778 40a971 42777->42778 42779 40aa02 42778->42779 42780 40a97a 42778->42780 42781 417b6f 78 API calls 42779->42781 42782 416941 78 API calls 42780->42782 42784 40aa0d 42781->42784 42783 40a985 42782->42783 42785 416f48 6 API calls 42783->42785 42892 417b45 78 API calls 42784->42892 42789 40a996 ctype ~_Task_impl 42785->42789 42787 40aa17 42788 416941 78 API calls 42787->42788 42812 40a9f4 ~_Task_impl 42788->42812 42887 417b6f 42789->42887 42790 416cfc 6 API calls 42799 40aa41 42790->42799 42793 40aa6a ~_Task_impl 42795 40aaa9 42793->42795 42896 417b53 42793->42896 42875 40a24d 42795->42875 42796 40a9d2 42800 4174cf 78 API calls 42796->42800 42799->42793 42893 41ab2a 42799->42893 42804 40a9dd 42800->42804 42891 41b12c 68 API calls ctype 42804->42891 42806->42760 42808 416941 78 API calls 42811 40aaca 42808->42811 42809 4174cf 78 API calls 42809->42793 42900 40936d 68 API calls 42811->42900 42812->42790 42815 416439 6 API calls 42814->42815 42816 40a840 42815->42816 42816->42766 42817 40b59a 42816->42817 42822 40b5ad 42817->42822 42818 40b71a 42818->42766 42819 41ad54 6 API calls 42819->42822 42820 40b250 79 API calls 42820->42822 42821 41ae8f SetFilePointer 42821->42822 42822->42818 42822->42819 42822->42820 42822->42821 42823 41addb SetFilePointer 42822->42823 42823->42822 42825 40bae9 7 API calls 42824->42825 42826 40b2af 42825->42826 42827 41ad54 6 API calls 42826->42827 42865 40b536 ~_Task_impl 42826->42865 42828 40b2d3 42827->42828 42829 40a57b 79 API calls 42828->42829 42828->42865 42830 40b2f2 42829->42830 42831 41ae8f SetFilePointer 42830->42831 42830->42865 42832 40b353 42831->42832 43099 41ab16 42832->43099 42835 41ab2a 78 API calls 42836 40b377 42835->42836 43102 41ab60 42836->43102 42843 40b411 42845 416941 78 API calls 42843->42845 42844 40b3bd 43111 416e2c 78 API calls 42844->43111 42847 40b41e 42845->42847 42849 416f48 6 API calls 42847->42849 42848 40b3c9 43112 416e3a 78 API calls 42848->43112 42852 40b431 ~_Task_impl 42849->42852 42851 40b3d4 43113 416dfc 78 API calls 42851->43113 43115 417bed 78 API calls 42852->43115 42855 40b44c 43116 417bfb 78 API calls 42855->43116 42856 40b3e3 43114 4169a4 78 API calls 4 library calls 42856->43114 42859 40b457 42860 417b53 78 API calls 42859->42860 42861 40b466 42860->42861 42862 4174cf 78 API calls 42861->42862 42864 40b3ef ~_Task_impl 42862->42864 42863 40ba92 SetFilePointer 42863->42864 42864->42863 42864->42865 42866 40b4fc 42864->42866 42865->42766 42866->42865 42867 41ae8f SetFilePointer 42866->42867 42868 40b51b 42867->42868 42869 41addb SetFilePointer 42868->42869 42869->42865 42901 40ba92 42870->42901 42873 40a926 42873->42775 42873->42806 42876 40a281 42875->42876 42877 40a256 42875->42877 42878 40a28d 79 API calls 42876->42878 42879 40a276 42877->42879 42880 40a259 42877->42880 42886 40a25f 42878->42886 42906 40a46f 42879->42906 42882 40a25c 42880->42882 42883 40a26e 42880->42883 42882->42886 42918 40a5fe 81 API calls 42882->42918 42919 40a57b 42883->42919 42886->42806 42886->42808 42888 4165e7 78 API calls 42887->42888 42889 40a9c8 42888->42889 42890 417b45 78 API calls 42889->42890 42890->42796 42891->42812 42892->42787 43088 416698 42893->43088 42895 40aa5e 42895->42809 42897 416719 78 API calls 42896->42897 42898 40aaa2 42897->42898 42899 417bed 78 API calls 42898->42899 42899->42795 42900->42806 42902 40babc 42901->42902 42903 40baa8 42901->42903 42902->42873 42905 40cc76 6 API calls 2 library calls 42902->42905 42904 41ae8f SetFilePointer 42903->42904 42904->42902 42905->42873 42913 40a484 42906->42913 42907 40a571 42907->42886 42908 40bae9 7 API calls 42908->42913 42909 41ad54 6 API calls 42909->42913 42913->42907 42913->42908 42913->42909 42926 40ac75 42913->42926 42944 40a3da 7 API calls 42913->42944 42945 416e48 78 API calls 42913->42945 42946 40ad89 79 API calls 2 library calls 42913->42946 42947 40ab17 80 API calls 4 library calls 42913->42947 42948 40b08d 78 API calls 2 library calls 42913->42948 42949 40af33 80 API calls 4 library calls 42913->42949 42918->42886 42921 40a591 42919->42921 42920 40a5f4 42920->42886 42921->42920 42922 40bae9 7 API calls 42921->42922 42923 41ad54 6 API calls 42921->42923 43086 40a3da 7 API calls 42921->43086 43087 416e48 78 API calls 42921->43087 42922->42921 42923->42921 42927 40ac81 __EH_prolog3 42926->42927 42928 40bb47 6 API calls 42927->42928 42929 40aca2 42928->42929 42930 40ad6a ~_Task_impl 42929->42930 42931 41ad54 6 API calls 42929->42931 42930->42913 42932 40acc6 42931->42932 42932->42930 42950 40bc79 FileTimeToSystemTime 42932->42950 42935 41ad54 6 API calls 42936 40acfe 42935->42936 42936->42930 42937 416941 78 API calls 42936->42937 42938 40ad39 42937->42938 42939 416f48 6 API calls 42938->42939 42940 40ad4a ~_Task_impl 42939->42940 42954 417b33 78 API calls 42940->42954 42942 40ad64 42955 417b61 78 API calls 42942->42955 42944->42913 42945->42913 42946->42913 42947->42913 42948->42913 42949->42913 42951 40bca3 42950->42951 42952 40ace6 42950->42952 42956 43f9fe 42951->42956 42952->42935 42954->42942 42955->42930 42959 43f749 42956->42959 42960 43f761 42959->42960 42966 43f783 __gmtime64_s __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 42959->42966 42996 4402ad 67 API calls __getptd_noexit 42960->42996 42963 43f766 42997 43e14d 6 API calls 2 library calls 42963->42997 42965 43f776 42965->42952 42967 43f947 42966->42967 42968 43f9c6 42966->42968 42972 43f9c4 42966->42972 42988 44604b 42967->42988 43014 4460db 67 API calls 5 library calls 42968->43014 42971 43f94c 42998 446357 42971->42998 42972->42965 43015 4402ad 67 API calls __getptd_noexit 42972->43015 42975 43f967 43005 446390 42975->43005 42976 43f95a 43004 43e025 10 API calls 3 library calls 42976->43004 42980 43f964 42980->42975 42981 43f982 43012 43eab2 124 API calls 9 library calls 42981->43012 42982 43f975 43011 43e025 10 API calls 3 library calls 42982->43011 42985 43f97f 42985->42981 42986 43f999 42986->42965 42986->42972 42989 446057 ___BuildCatchObjectHelper 42988->42989 42990 44608b ___BuildCatchObjectHelper 42989->42990 42991 44697c __lock 67 API calls 42989->42991 42990->42971 42992 446068 42991->42992 42993 446079 42992->42993 43016 445936 42992->43016 43081 446091 RtlLeaveCriticalSection _doexit 42993->43081 42996->42963 42999 446366 42998->42999 43003 43f955 42998->43003 43082 4402ad 67 API calls __getptd_noexit 42999->43082 43001 44636b 43083 43e14d 6 API calls 2 library calls 43001->43083 43003->42975 43003->42976 43004->42980 43006 44639f 43005->43006 43008 43f970 43005->43008 43084 4402ad 67 API calls __getptd_noexit 43006->43084 43008->42981 43008->42982 43009 4463a4 43085 43e14d 6 API calls 2 library calls 43009->43085 43011->42985 43012->42986 43014->42972 43015->42965 43017 445942 ___BuildCatchObjectHelper 43016->43017 43018 44697c __lock 67 API calls 43017->43018 43019 44595d __tzset_nolock 43018->43019 43020 446390 __get_daylight 67 API calls 43019->43020 43021 445972 43020->43021 43022 445984 43021->43022 43023 445977 43021->43023 43025 44631e __get_daylight 67 API calls 43022->43025 43024 43e025 __invoke_watson 10 API calls 43023->43024 43081->42990 43082->43001 43084->43009 43086->42921 43087->42921 43089 4166a4 __EH_prolog3 43088->43089 43090 409270 78 API calls 43089->43090 43091 4166b4 43089->43091 43090->43091 43092 4166d4 43091->43092 43093 409270 78 API calls 43091->43093 43097 416701 Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 43091->43097 43098 41dc1c 77 API calls 43092->43098 43093->43092 43095 4166ed 43096 4163aa 78 API calls 43095->43096 43095->43097 43096->43097 43097->42895 43098->43095 43100 416698 78 API calls 43099->43100 43101 40b36c 43100->43101 43101->42835 43103 416536 78 API calls 43102->43103 43104 40b380 43103->43104 43105 41ab3e 43104->43105 43106 416698 78 API calls 43105->43106 43107 40b38a 43106->43107 43108 41ab52 43107->43108 43109 4165e7 78 API calls 43108->43109 43110 40b394 43109->43110 43110->42843 43110->42844 43111->42848 43112->42851 43113->42856 43114->42864 43115->42855 43116->42859 43117 4149df 43118 4149e8 43117->43118 43119 4149ef 43117->43119 43121 41a106 43119->43121 43122 41a10c 43121->43122 43123 41a11a 43121->43123 43126 4094f1 43122->43126 43215 41a3cd 43122->43215 43123->43118 43127 41b510 78 API calls 43126->43127 43128 409527 43127->43128 43218 41a7a2 43128->43218 43156 40956d 43157 409270 78 API calls 43156->43157 43158 409582 43157->43158 43159 41b3fe 78 API calls 43158->43159 43160 40958b 43159->43160 43161 41b4f4 78 API calls 43160->43161 43216 416536 78 API calls 43215->43216 43217 41a3d8 43216->43217 43217->43123 43219 416536 78 API calls 43218->43219 43220 40952c 43219->43220 43221 41a771 43220->43221 43222 416536 78 API calls 43221->43222 43223 409531 43222->43223 43224 41b4ea 43223->43224 43225 4165e7 78 API calls 43224->43225 43226 409536 43225->43226 43227 41a7d7 43226->43227 43228 416536 78 API calls 43227->43228 43229 40953b 43228->43229 43230 41a7b9 43229->43230 43231 416536 78 API calls 43230->43231 43232 409540 43231->43232 43233 41a7c3 43232->43233 43234 416536 78 API calls 43233->43234 43235 409545 43234->43235 43236 41a795 43235->43236 43237 416536 78 API calls 43236->43237 43238 40954a 43237->43238 43239 41a7e1 43238->43239 43240 4165e7 78 API calls 43239->43240 43241 40954f 43240->43241 43242 41a7ee 43241->43242 43243 416698 78 API calls 43242->43243 43244 409554 43243->43244 43245 41a77b 43244->43245 43246 416719 78 API calls 43245->43246 43247 409559 43246->43247 43248 41a788 43247->43248 43249 416719 78 API calls 43248->43249 43250 40955e 43249->43250 43251 41a764 43250->43251 43252 416719 78 API calls 43251->43252 43253 409563 43252->43253 43254 41a7ac 43253->43254 43255 416719 78 API calls 43254->43255 43256 409568 43255->43256 43257 41a7cd 43256->43257 43328 41a600 43257->43328 43259 41a7d5 43259->43156 43329 41a60c __EH_prolog3 43328->43329 43330 409270 78 API calls 43329->43330 43331 41a61c 43329->43331 43330->43331 43332 41a63c 43331->43332 43333 409270 78 API calls 43331->43333 43337 41a665 Concurrency::details::ExternalContextBase::~ExternalContextBase ~_Task_impl 43331->43337 43338 41dbdd 77 API calls 43332->43338 43333->43332 43335 41a652 43336 4163aa 78 API calls 43335->43336 43335->43337 43336->43337 43337->43259 43338->43335

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 142 405e69-405e90 call 442764 145 406111-406149 GetDlgItem SendMessageW GetDlgItem call 402781 142->145 146 405e96-405ea2 GetVersion 142->146 152 40614b-40615c call 402a2e 145->152 153 40617c-40619e call 401225 145->153 146->145 147 405ea8-405ebc call 402a2e 146->147 155 405ec1-405ed8 MessageBoxW 147->155 156 405ebe 147->156 166 406161-40617a SetWindowTextW 152->166 167 40615e 152->167 162 4061a0-4061ab call 402a2e 153->162 163 4061ad-4061b3 call 40280f 153->163 159 4060e7-4060e9 155->159 160 405ede-405efa call 401e56 call 401285 155->160 156->155 164 4060ea-40610c PostMessageW call 40146e 159->164 185 405f54-406066 call 401225 * 3 call 402ddb call 4012fd call 401040 call 4011e0 call 40146e * 2 call 4012fd call 401040 call 4011e0 call 40146e * 2 160->185 186 405efc-405f4f call 4012fd call 401040 call 4011e0 call 40146e * 2 160->186 179 4061b7-4061db call 4011e0 call 40146e 162->179 163->179 180 406590-406595 call 4427e7 164->180 168 4061f9-40625a call 40146e GetDlgItem ShowWindow GetDlgItem ShowWindow GetDlgItem call 402a2e 166->168 167->166 192 406262-406297 SetWindowTextW SetFocus 168->192 193 40625c 168->193 203 4061e0-4061f6 SetWindowTextW 179->203 204 4061dd 179->204 291 406068 185->291 292 40606b-406078 185->292 186->185 206 406299-4062b8 call 4023f4 192->206 207 4062ba 192->207 193->192 203->168 204->203 206->207 211 4062c1-4062c8 206->211 207->211 215 4062e0-4062e7 211->215 216 4062ca-4062de call 40146e 211->216 218 406486-4064a3 GetDlgItem SendMessageW 215->218 219 4062ed-40632c call 4023f4 call 40102d * 2 215->219 216->215 227 4064a5-4064ab 218->227 228 4064fb-406501 218->228 261 406331-4063c7 call 4010df call 4011fb call 401210 call 4044fa call 4048a0 * 2 ShowWindow KiUserCallbackDispatcher call 402337 219->261 262 40632e 219->262 227->228 229 4064ad-4064b3 227->229 232 406503-406514 call 402a2e 228->232 233 406558-40655e 228->233 229->228 234 4064b5-4064c5 call 402337 229->234 249 406516 232->249 250 406519-406556 SetWindowTextW EnableWindow SetTimer call 40146e 232->250 236 406560-40656e PostMessageW 233->236 237 406574 call 4027c1 233->237 251 4064c7-4064ca 234->251 252 4064cc 234->252 236->237 247 406579-40658f call 40146e 237->247 247->180 249->250 250->247 258 4064cf-4064f9 ShellExecuteW call 40146e 251->258 252->258 258->228 296 4063c9 261->296 297 4063cc-4063db 261->297 262->261 291->292 294 406080-40608a 292->294 295 40607a 292->295 298 406092-4060e5 call 408e7f call 40146e * 4 294->298 299 40608c 294->299 295->294 296->297 300 4063e3-4063e6 297->300 301 4063dd 297->301 298->164 299->298 303 4063e8-4063eb 300->303 304 4063ed 300->304 301->300 306 4063f0-40643a call 408e7f call 40146e EnableWindow ShowWindow call 404860 303->306 304->306 318 40643f-406484 call 40146e * 2 call 4010c5 call 40146e 306->318 318->218
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00405E73
                                  • GetVersion.KERNEL32(0000022C,0040507D,?,?), ref: 00405E96
                                  • MessageBoxW.USER32(00000000,?,ALZip Self-Extractor,00000014), ref: 00405ECA
                                  • PostMessageW.USER32(?,00000111,00000001,00000000), ref: 004060F7
                                  • GetDlgItem.USER32(?,000003E9), ref: 0040611D
                                  • SendMessageW.USER32(00000000,00000402,00000064,00000000), ref: 00406128
                                  • GetDlgItem.USER32(?,000003F0), ref: 00406134
                                  • SetWindowTextW.USER32(?,?), ref: 00406168
                                  • SetWindowTextW.USER32(?,?), ref: 004061E7
                                  • GetDlgItem.USER32(?,000003F1), ref: 0040620B
                                  • ShowWindow.USER32(00000000,00000000), ref: 00406211
                                  • GetDlgItem.USER32(?,00000066), ref: 0040621F
                                  • ShowWindow.USER32(00000000,00000000), ref: 00406223
                                  • GetDlgItem.USER32(?,00000002), ref: 00406231
                                  • SetWindowTextW.USER32(?,?), ref: 00406269
                                  • SetFocus.USER32(?), ref: 00406285
                                  • ShowWindow.USER32(?,00000006,?,?,?,?,?, pE,?), ref: 004063A0
                                  • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 004063AF
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • EnableWindow.USER32(?,00000001), ref: 00406420
                                  • ShowWindow.USER32(?,00000009), ref: 0040642E
                                  • GetDlgItem.USER32(?,000003EB), ref: 00406491
                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0040649B
                                  • ShellExecuteW.SHELL32(?,open,00000000,00000000,-00000008,0000000A), ref: 004064DF
                                  • SetWindowTextW.USER32(?,?), ref: 00406520
                                  • EnableWindow.USER32(?,00000000), ref: 0040652D
                                  • SetTimer.USER32(?,00000000,000000C8,00000000), ref: 00406540
                                  • PostMessageW.USER32(?,00000111,00000001,00000000), ref: 0040656E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Window$Item$Message$ShowText$EnableH_prolog3_PostSend$CallbackDispatcherExecuteFocusLoadShellStringTimerUserVersion_memset
                                  • String ID: pE$ALZip Self-Extractor$\$open
                                  • API String ID: 268777293-2346426086
                                  • Opcode ID: 9d441dc41f803611898e77d6aad1cbc59ddd49c8217cf285c92eb2eadffc418c
                                  • Instruction ID: cc1059a92505a80de70d0d8f4cb0fe5d80e5bc79c66f50ec544396aea2430fb7
                                  • Opcode Fuzzy Hash: 9d441dc41f803611898e77d6aad1cbc59ddd49c8217cf285c92eb2eadffc418c
                                  • Instruction Fuzzy Hash: D1225C71D40228AADB21EBA1CD45BDEBB74AF04304F1141AAF509771E2CB786F85CF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 853 408e7f-408e91 call 43dffc 856 408e93-408e95 853->856 857 408e9a-408ec5 call 43e4b0 853->857 858 408f4d-408f4f 856->858 861 408ec7 857->861 862 408ece-408eef ShellExecuteExW 857->862 861->862 863 408f40-408f4c CloseHandle 862->863 864 408ef1-408f04 WaitForSingleObject 862->864 863->858 865 408f06-408f0c 864->865 866 408f3f 864->866 867 408f22-408f2f PeekMessageW 865->867 866->863 868 408f31-408f3d WaitForSingleObject 867->868 869 408f0e-408f1c TranslateMessage DispatchMessageW 867->869 868->866 868->867 869->867
                                  APIs
                                  • _wcslen.LIBCMT ref: 00408E89
                                  • _memset.LIBCMT ref: 00408EA4
                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00408EE3
                                  • WaitForSingleObject.KERNEL32(?,00000046,00000001,?,00457018,00000000), ref: 00408EFD
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00408F2B
                                  • WaitForSingleObject.KERNEL32(?,00000046,?,00457018,00000000), ref: 00408F36
                                  • CloseHandle.KERNEL32(?,?,00457018,00000000), ref: 00408F43
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ObjectSingleWait$CloseExecuteHandleMessagePeekShell_memset_wcslen
                                  • String ID: <$@$runas
                                  • API String ID: 3525750456-2740324054
                                  • Opcode ID: c7e777b371a3860a1e3f1ffb60f4cb73ce8a7a8985138eb1abd09fb8c70c4fce
                                  • Instruction ID: d0eeba9bcc0888e005bffe79d6b1be73ace81fbf82a055ef6d242c2e9cf3c5c2
                                  • Opcode Fuzzy Hash: c7e777b371a3860a1e3f1ffb60f4cb73ce8a7a8985138eb1abd09fb8c70c4fce
                                  • Instruction Fuzzy Hash: E8215CB1C01259AFDB10DFE4CD85ADEBBBDAF08344F10043AE541BB291EB799E458B58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: invalid bit length repeat$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                  • API String ID: 0-3031085480
                                  • Opcode ID: a0a833dce37de94e80a67d70c1c8cd461ad68bf1221746715794e4e39db057ed
                                  • Instruction ID: 26a27df49111651915cd508ad4975524c52be54301a2cbdef2cd151357077bbf
                                  • Opcode Fuzzy Hash: a0a833dce37de94e80a67d70c1c8cd461ad68bf1221746715794e4e39db057ed
                                  • Instruction Fuzzy Hash: 0E529A71A006099FCB28CF68C8906EEBBF1FF88305F14456ED49297781D7B8AAC1DB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryW.KERNELBASE(Normaliz.dll), ref: 004136DA
                                  • GetProcAddress.KERNEL32(00000000,IsNormalizedString), ref: 004136F5
                                  • GetProcAddress.KERNEL32(NormalizeString), ref: 00413707
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: IsNormalizedString$Normaliz.dll$NormalizeString
                                  • API String ID: 2238633743-2967334653
                                  • Opcode ID: 05a5eb30bf108b26600be0f495ddc2e17491d709c6336940d47c8fafe258bcc9
                                  • Instruction ID: e84024ac8a126c7ab34af55295ff9b7b7eb96dd235dd708817b1fedef6d6b7f1
                                  • Opcode Fuzzy Hash: 05a5eb30bf108b26600be0f495ddc2e17491d709c6336940d47c8fafe258bcc9
                                  • Instruction Fuzzy Hash: 00E0C2B5E12360AB8B215FA4AE4455A3AA4A208B11311453BEC01933A1F3F898808B9F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: header crc mismatch$incorrect header check$invalid window size$unknown compression method$unknown header flags set
                                  • API String ID: 0-3633268661
                                  • Opcode ID: 9a341add5ceaa01a9590b016c24e716d4c66623b53e3b8af38635e7ff3e94308
                                  • Instruction ID: d863c9de8348281ca3f2c46aec38538ee334362c2d0949941e1f87975930f5d0
                                  • Opcode Fuzzy Hash: 9a341add5ceaa01a9590b016c24e716d4c66623b53e3b8af38635e7ff3e94308
                                  • Instruction Fuzzy Hash: B5326B70A00305DFDB24CF69C4846AABBF1BF48300F24866ED99597791D7B8EAC5CB48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4055b5-405602 call 442764 RtlEnterCriticalSection RtlLeaveCriticalSection call 4023dd 5 405604-405611 0->5 6 40562d-40566b call 402337 call 4011e0 call 40146e 0->6 7 405613 5->7 8 405619-405628 SetWindowTextW call 402b38 5->8 16 405671-4056a4 call 401059 call 408482 call 407ab5 6->16 17 4057b5-40583b call 43e4b0 SHGetSpecialFolderPathW call 401238 call 4011e0 call 40146e call 402d5e 6->17 7->8 8->6 31 405768 16->31 32 4056aa-4056bb call 401dbe 16->32 40 405840-40587b call 401059 call 40237f GetDlgItem 17->40 33 40576a-405771 call 4044fa 31->33 41 4056c2 32->41 42 4056bd-4056c0 32->42 39 405776-4057b0 call 4048a0 call 404860 call 40146e 33->39 39->40 57 405883-40592f SetWindowTextW call 402b38 call 401cea LoadIconW SendMessageW GetDlgItem SendMessageW * 2 ShowWindow GetDlgItem call 402a2e 40->57 58 40587d 40->58 43 4056c4-405766 call 43dffc call 4012fd call 40369b call 401040 call 4011e0 call 40146e * 4 41->43 42->43 43->33 72 405931 57->72 73 405937-4059ab SetWindowTextW GetDlgItem ShowWindow GetDlgItem call 402a2e call 4011e0 call 40146e 57->73 58->57 72->73 88 4059b3-405a15 SetWindowTextW GetDlgItem call 402a2e call 4011e0 call 40146e 73->88 89 4059ad 73->89 96 405a17 88->96 97 405a1d-405a7c SetWindowTextW GetDlgItem call 402a2e call 4011e0 call 40146e 88->97 89->88 96->97 104 405a84-405ae6 SetWindowTextW GetDlgItem call 402a2e call 4011e0 call 40146e 97->104 105 405a7e 97->105 112 405ae8 104->112 113 405aee-405b66 SetWindowTextW SendMessageW GetDlgItem call 402a2e call 4011e0 call 40146e 104->113 105->104 112->113 120 405b68 113->120 121 405b6e-405b89 SetWindowTextW call 4023f4 113->121 120->121 124 405b9a 121->124 125 405b8b-405b98 121->125 126 405ba1-405bbd call 40146e 124->126 125->124 125->126 129 405bc2 126->129 130 405bbf-405bc0 126->130 131 405bc4-405c07 SendMessageW SetFocus 129->131 130->131 134 405c20-405c4f call 40146e * 2 call 4427e7 131->134 135 405c09-405c1a PostMessageW 131->135 135->134
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 004055BF
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 004055DB
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 004055E8
                                  • SetWindowTextW.USER32(?,?), ref: 0040561B
                                  • _wcslen.LIBCMT ref: 004056CB
                                  • _memset.LIBCMT ref: 004057CB
                                  • SHGetSpecialFolderPathW.SHELL32(?,?,00000005,00000001), ref: 004057E4
                                  • GetDlgItem.USER32(?,000003E8), ref: 0040586C
                                  • SetWindowTextW.USER32(00000000,?), ref: 00405885
                                  • LoadIconW.USER32(00000000,00000065), ref: 0040589F
                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004058B9
                                  • GetDlgItem.USER32(?,000003E9), ref: 004058C6
                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 004058DB
                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004058EC
                                  • ShowWindow.USER32(?,00000000), ref: 004058FC
                                  • GetDlgItem.USER32(?,000003F0), ref: 00405909
                                  • SetWindowTextW.USER32(?,?), ref: 0040593E
                                  • GetDlgItem.USER32(?,000003F1), ref: 0040594F
                                  • ShowWindow.USER32(00000000,00000000), ref: 00405954
                                  • GetDlgItem.USER32(?,000003EC), ref: 00405961
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • SetWindowTextW.USER32(?,?), ref: 004059BA
                                  • GetDlgItem.USER32(?,000003ED), ref: 004059CB
                                  • SetWindowTextW.USER32(?,?), ref: 00405A24
                                  • GetDlgItem.USER32(?,00000001), ref: 00405A32
                                  • SetWindowTextW.USER32(?,?), ref: 00405A8B
                                  • GetDlgItem.USER32(?,000003EA), ref: 00405A9C
                                  • SetWindowTextW.USER32(?,?), ref: 00405AF5
                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00405B0A
                                  • GetDlgItem.USER32(?,000003EB), ref: 00405B1B
                                  • SetWindowTextW.USER32(?,?), ref: 00405B75
                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00405BCF
                                  • SetFocus.USER32(?), ref: 00405BFB
                                  • PostMessageW.USER32(?,00000111,000003ED,00000000), ref: 00405C1A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Window$Item$Text$Message$Send$CriticalH_prolog3_LoadSectionShow_memset$EnterFocusFolderIconLeavePathPostSpecialString_wcslen
                                  • String ID: %DESTDIR%$%DESTDIR%\
                                  • API String ID: 4261140470-3507764503
                                  • Opcode ID: 4fba22ee684a5f5929baaaf7a6a334e100aa1e28078a7d2bfdd56a9f7f74f4e5
                                  • Instruction ID: fcb14e1ca9d3133d1e6d217415730d45d0a2b9df504bd0eb91512e69d19bb724
                                  • Opcode Fuzzy Hash: 4fba22ee684a5f5929baaaf7a6a334e100aa1e28078a7d2bfdd56a9f7f74f4e5
                                  • Instruction Fuzzy Hash: 64025D70D00A68AADF20EB65CD55BDEBB74AB44306F4040EAF608771D2DA786F84CF59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 329 40748d-407575 call 442764 GetDlgItem * 8 call 43e4b0 GetWindowTextW call 401238 336 407577-407591 call 402a2e 329->336 337 4075d9-407602 call 401225 call 407ab5 329->337 343 407593 336->343 344 407599-4075d8 MessageBoxW call 40146e * 2 call 4427e7 336->344 347 407718-407725 337->347 348 407608-407673 call 4012fd call 401040 call 4011e0 call 40146e * 2 337->348 343->344 350 407727 347->350 351 40772d-407736 call 408e5f 347->351 387 407675 348->387 388 40767b-407685 GetDriveTypeW 348->388 350->351 360 4077b3-4077c9 call 401285 351->360 361 407738-407755 call 402a2e 351->361 370 4077cb-4077d7 call 402d5e 360->370 371 4077dc-407818 call 401059 call 40237f call 402a2e 360->371 372 407757 361->372 373 40775d-4077ac MessageBoxW call 40146e * 3 361->373 370->371 397 407820-407871 SetWindowTextW call 402a2e call 4011e0 call 40146e 371->397 398 40781a 371->398 372->373 373->360 387->388 388->360 389 40768b-407698 388->389 392 4076a0-4076a9 call 408e5f 389->392 393 40769a 389->393 392->360 401 4076af-4076cc call 402a2e 392->401 393->392 412 407873 397->412 413 407879-4078c4 SetWindowTextW call 402a2e call 4011e0 call 40146e 397->413 398->397 408 4076d4-407712 MessageBoxW call 40146e * 2 401->408 409 4076ce 401->409 408->347 409->408 412->413 423 4078c6 413->423 424 4078cc-407923 SetWindowTextW call 402a2e call 4011e0 call 40146e 413->424 423->424 432 407925 424->432 433 40792b-407a3c SetWindowTextW SendMessageW ShowWindow * 4 call 40274d call 40102d * 2 call 4011e0 call 401e56 call 4011e0 call 40146e 424->433 432->433 449 407a48 433->449 450 407a3e-407a46 433->450 451 407a4a-407a8f call 43e889 ResumeThread call 401078 449->451 450->451 456 407a94-407aaa call 401078 451->456
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00407497
                                  • GetDlgItem.USER32(?,000003E8), ref: 004074B0
                                  • GetDlgItem.USER32(?,000003EC), ref: 004074BE
                                  • GetDlgItem.USER32(?,000003F0), ref: 004074CC
                                  • GetDlgItem.USER32(?,000003F1), ref: 004074DA
                                  • GetDlgItem.USER32(?,000003E9), ref: 004074E8
                                  • GetDlgItem.USER32(?,000003EA), ref: 004074F6
                                  • GetDlgItem.USER32(?,000003ED), ref: 00407504
                                  • GetDlgItem.USER32(?,00000001), ref: 0040750F
                                  • _memset.LIBCMT ref: 0040752F
                                  • GetWindowTextW.USER32(?,?,00000208), ref: 00407549
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000040), ref: 004075A2
                                  • GetDriveTypeW.KERNELBASE(?), ref: 0040767C
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000040), ref: 00407766
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000040), ref: 004076E2
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • SetWindowTextW.USER32(?,?), ref: 0040782D
                                  • SetWindowTextW.USER32(?,?), ref: 00407880
                                  • SetWindowTextW.USER32(?,?), ref: 004078D3
                                  • SetWindowTextW.USER32(?,?), ref: 00407932
                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00407953
                                  • ShowWindow.USER32(?,00000000), ref: 0040796C
                                  • ShowWindow.USER32(?,00000000), ref: 00407975
                                  • ShowWindow.USER32(?,00000005), ref: 0040797F
                                    • Part of subcall function 00402D5E: _wcslen.LIBCMT ref: 00402D62
                                  • ShowWindow.USER32(?,00000005), ref: 00407989
                                    • Part of subcall function 0040274D: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00402754
                                    • Part of subcall function 0040274D: ResetEvent.KERNEL32(?,00406579), ref: 0040276A
                                    • Part of subcall function 0040274D: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00402779
                                    • Part of subcall function 00401E56: __EH_prolog3_GS.LIBCMT ref: 00401E60
                                    • Part of subcall function 00401E56: _memset.LIBCMT ref: 00401E9E
                                    • Part of subcall function 00401E56: GetModuleFileNameW.KERNEL32(?,00000104,?,00000234,004021EF), ref: 00401EB8
                                  • ResumeThread.KERNELBASE(00000000,?,?,?,?,?,00000085,?,?,?,?,?,?,?,0045702C,?), ref: 00407A83
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Window$Item$Text$MessageShow$H_prolog3__memset$CriticalSection$DriveEnterEventFileLeaveLoadModuleNameResetResumeSendStringThreadType_wcslen
                                  • String ID: ALZip Self-Extractor
                                  • API String ID: 1713260999-1641417939
                                  • Opcode ID: 5c57500ac0e20abf3e8649519d610568579ad055f0b1b49c70d5012d5bb13cd5
                                  • Instruction ID: 5a6b336e374d7c983e5d455a7660ff125c038b7151c9c2b3ecf8c06a6090e45c
                                  • Opcode Fuzzy Hash: 5c57500ac0e20abf3e8649519d610568579ad055f0b1b49c70d5012d5bb13cd5
                                  • Instruction Fuzzy Hash: 17F14D31D402289BDB21EB65CD49BDDBBB8AF44704F4000EAE508771A1CBB86F85CF5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0041A3E9: __EH_prolog3.LIBCMT ref: 0041A3F0
                                    • Part of subcall function 0041A3E9: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A463
                                    • Part of subcall function 0041A3E9: ~_Task_impl.LIBCPMT ref: 0041A46E
                                    • Part of subcall function 0041A8ED: __EH_prolog3.LIBCMT ref: 0041A8F4
                                    • Part of subcall function 0041A8ED: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A933
                                    • Part of subcall function 0041A8ED: ~_Task_impl.LIBCPMT ref: 0041A93F
                                    • Part of subcall function 0041A94E: __EH_prolog3.LIBCMT ref: 0041A955
                                    • Part of subcall function 0041A94E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A9CF
                                    • Part of subcall function 0041A94E: ~_Task_impl.LIBCPMT ref: 0041A9DA
                                    • Part of subcall function 0041A9F7: __EH_prolog3.LIBCMT ref: 0041A9FE
                                    • Part of subcall function 0041A9F7: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AA48
                                    • Part of subcall function 0041A9F7: ~_Task_impl.LIBCPMT ref: 0041AA53
                                  • ~_Task_impl.LIBCPMT ref: 00409739
                                    • Part of subcall function 0041A356: __EH_prolog3.LIBCMT ref: 0041A35D
                                    • Part of subcall function 0041A356: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A37C
                                  • ~_Task_impl.LIBCPMT ref: 00409747
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$BaseBase::~Concurrency::details::H_prolog3
                                  • String ID: .alz, .arc, .arj, .bz, .bz2, .cab, .egg, .ice, .ear, .war, .gz, .ha, .jar, .lha, .lzh, .pak, .rar, .tbz, .tbz2, .tgz, .7z, .z, .zi$.h, .c, .java, .cpp, .txt, .pas, .xml, .html, .htm, .bat, .1st, .ans, .asc, .ascii, .bbs, .charset, .dbt, .err, .faq, .hs, .klg, .$.ppt, .xls, .doc, .ani, .ico, .cur, .pcx, .emf, $.sys, .com, $AES-128 bit$AES-256 bit$AZO$BZ2$CS_PRIORITY$Deflate$LEA-128 bit$LEA-256 bit$LZMA$Maximum$Nocomp$Normal$OPTIMUM$Store$Zip 2.0 Compatible
                                  • API String ID: 3832468939-677804057
                                  • Opcode ID: 2d07940f9139a36b08c5ee2b796759531e76b633ae26cf90965b5aaaa70d99c1
                                  • Instruction ID: ef5c949d7569f891b1ad2d16873632070f51d1dc7eda7def5af14398d19d1f3f
                                  • Opcode Fuzzy Hash: 2d07940f9139a36b08c5ee2b796759531e76b633ae26cf90965b5aaaa70d99c1
                                  • Instruction Fuzzy Hash: 43514AB07D534476D110B7738C47F9F69588B40F18F10091F7A65B61C3EAAC99A441AF
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 560 401f09-401f29 call 442764 call 401e56 565 401f2b 560->565 566 401f2e-401f4d CreateFileW 560->566 565->566 567 402180-402191 call 40146e 566->567 568 401f53-401f7f SetFilePointer ReadFile 566->568 578 402193-402198 call 4427e7 567->578 569 401f81 568->569 570 401fa5-401fac 568->570 572 401f83-401fa0 CloseHandle call 40146e 569->572 573 401fb9-401fc0 570->573 574 401fae-401fb7 570->574 572->578 573->569 577 401fc2-401fd7 ReadFile 573->577 574->572 577->569 580 401fd9-401fee ReadFile 577->580 580->569 582 401ff0-402002 ReadFile 580->582 582->569 584 402008 582->584 585 40200d-402012 584->585 586 402144-402163 FindCloseChangeNotification call 40146e 585->586 587 402018-402033 call 43de63 585->587 591 402168-40216b 586->591 587->569 592 402039-40205a call 43e4b0 ReadFile 587->592 591->578 595 402060-402069 592->595 596 40216d-40217f call 43e52a CloseHandle 592->596 597 402071-402078 595->597 598 40206b 595->598 596->567 601 402080-402087 597->601 602 40207a 597->602 598->597 603 4020b4-4020bb 601->603 604 402089-4020af call 402ae6 call 4084d8 call 402d13 601->604 602->601 605 4020e8-4020ef 603->605 606 4020bd-4020e3 call 402ae6 call 4084d8 call 402d13 603->606 604->603 609 4020f1-402117 call 402ae6 call 4084d8 call 402d13 605->609 610 40211c-402139 call 43e52a ReadFile 605->610 606->605 609->610 621 40200a 610->621 622 40213f 610->622 621->585 622->569
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00401F10
                                    • Part of subcall function 00401E56: __EH_prolog3_GS.LIBCMT ref: 00401E60
                                    • Part of subcall function 00401E56: _memset.LIBCMT ref: 00401E9E
                                    • Part of subcall function 00401E56: GetModuleFileNameW.KERNEL32(?,00000104,?,00000234,004021EF), ref: 00401EB8
                                  • CreateFileW.KERNELBASE(:O@,80000000,00000001,00000000,00000003,00000080,00000000,00000064,00404F3A), ref: 00401F3F
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000), ref: 00401F61
                                  • ReadFile.KERNELBASE(00000000,?,00000004,?,00000000), ref: 00401F79
                                  • CloseHandle.KERNEL32(?), ref: 00401F86
                                  • ReadFile.KERNELBASE(00000000,?,00000004,00000004,00000000), ref: 00401FD1
                                  • ReadFile.KERNEL32(00000000,?,00000002,00000004,00000000), ref: 00401FE8
                                  • ReadFile.KERNEL32(00000000,?,00000004,00000002,00000000), ref: 00401FFC
                                  • _memset.LIBCMT ref: 00402041
                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00402055
                                    • Part of subcall function 004084D8: __EH_prolog3_GS.LIBCMT ref: 004084DF
                                    • Part of subcall function 004084D8: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000058,004020A6,?,?), ref: 0040852A
                                    • Part of subcall function 004084D8: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?), ref: 00408568
                                    • Part of subcall function 00402D13: char_traits.LIBCPMT ref: 00402D38
                                  • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 00402133
                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00402150
                                  • CloseHandle.KERNEL32(?), ref: 00402179
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$Read$CloseH_prolog3_$ByteCharHandleMultiWide_memset$ChangeCreateFindModuleNameNotificationPointerchar_traits
                                  • String ID: :O@$EGGA
                                  • API String ID: 1485617443-2676591978
                                  • Opcode ID: 4c3cb92852db6974c16d4e83deafbbc2021d6ba3a5e95525f8b02e855bf9d488
                                  • Instruction ID: 315b6d5a364f6f68c0df25ec470265eeea3d68fb759409c8e58ad8c34a1c3c2b
                                  • Opcode Fuzzy Hash: 4c3cb92852db6974c16d4e83deafbbc2021d6ba3a5e95525f8b02e855bf9d488
                                  • Instruction Fuzzy Hash: C4815A71D00208AEDF11EBD4CD89AEEB7B8EB44704F10403AE601BB1E5D7B85E49CB29
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00404504
                                  • _memset.LIBCMT ref: 0040456E
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000024,00000001), ref: 00404583
                                    • Part of subcall function 00402D5E: _wcslen.LIBCMT ref: 00402D62
                                  • _memset.LIBCMT ref: 004045EA
                                  • GetTempPathW.KERNEL32(00000104,?,00000001,00000000,?), ref: 004045FE
                                  • _memset.LIBCMT ref: 00404655
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000028,00000001,?,?,?,00000001,00000000,?), ref: 0040466A
                                  • _memset.LIBCMT ref: 004046CF
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000001,00000001,00000000,?,?,?,?,00000001,00000000,?), ref: 004046E4
                                  • _memset.LIBCMT ref: 00404749
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000026,00000001,?,?,0045702C,00000001,00000000,?,?,?,?,00000001,00000000,?), ref: 0040475E
                                  • _memset.LIBCMT ref: 004047CA
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000001,00000001,00000000,?,?,?,0045702C,00000001,00000000,?), ref: 004047DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Path_memset$FolderSpecial$H_prolog3_Temp_wcslen
                                  • String ID: DH@
                                  • API String ID: 1153633231-3333322899
                                  • Opcode ID: 7d132de6c2798901d98bbcbea4a9c7bf4dfefcf696c47455a75442a19b3741d4
                                  • Instruction ID: 4932e0c127ac1e4e43860afbc6adc43b9c35df062d3fe2721c120fc9494f3624
                                  • Opcode Fuzzy Hash: 7d132de6c2798901d98bbcbea4a9c7bf4dfefcf696c47455a75442a19b3741d4
                                  • Instruction Fuzzy Hash: 429116B1900218AADB10EB51DD46BDD77B8AF04708F4441E6F708BB1D2D7B89B49CF5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 703 403925-403963 WaitForSingleObject 704 403969-40396a 703->704 705 403caa-403cb1 call 401cca 703->705 706 403970-403975 704->706 707 403b9a-403ba1 call 401cca 704->707 715 403cd0-403cd2 705->715 718 403cb3-403cca RtlEnterCriticalSection RtlLeaveCriticalSection 705->718 709 40397b-40397d 706->709 710 403a6e-403a76 706->710 707->715 722 403ba7-403bb3 call 43e277 707->722 713 4039a4-4039ab call 402781 709->713 714 40397f-403980 709->714 710->715 716 403a7c-403a82 710->716 735 4039b1-4039b8 call 401cca 713->735 736 403b1f-403b24 713->736 714->715 719 403986-40399f call 4141cd call 4140eb 714->719 724 403cd3-403ce5 715->724 720 403a84-403a89 716->720 721 403a8e-403a90 716->721 718->715 719->715 720->724 726 403a96-403b18 call 4209b1 call 416941 call 416f48 call 416f12 call 416910 call 417541 call 401d0a SendMessageW 721->726 727 403b2e-403b35 721->727 740 403bb5-403bc6 call 40102d 722->740 741 403bc8 722->741 797 403b29 call 41749e 726->797 798 403b1a call 41749e 726->798 733 403b37-403b5c call 401225 call 43e492 727->733 734 403b5d-403b8b RtlEnterCriticalSection call 4011e0 RtlLeaveCriticalSection 727->734 733->734 752 403b92-403b95 734->752 753 403b8d 734->753 757 403a22-403a2e call 43e277 735->757 758 4039ba-4039c3 735->758 736->724 750 403bca-403ca3 call 4209b1 call 416ca1 call 416910 call 4209b1 call 416941 call 416f48 call 416f12 call 416910 call 417541 call 401238 call 4011e0 call 40146e PostMessageW call 41749e 740->750 741->750 815 403ca8 750->815 752->715 753->752 774 403a30-403a3b 757->774 775 403a3d 757->775 759 4039e1-4039e4 758->759 760 4039c5-4039df call 43e277 758->760 759->715 767 4039ea-4039f4 call 43e277 759->767 776 403a60-403a69 PostMessageW 760->776 783 403a03 767->783 784 4039f6-403a01 767->784 780 403a3f-403a58 774->780 775->780 776->715 781 403a5d 780->781 781->776 788 403a05-403a20 783->788 784->788 788->781 797->727 798->736 815->715
                                  APIs
                                  • WaitForSingleObject.KERNEL32(000000FF,F14CC7D6), ref: 00403959
                                  • PostMessageW.USER32(?,000004CE,00000000,00000000), ref: 00403A63
                                  • ~_Task_impl.LIBCPMT ref: 00403BF0
                                  • ~_Task_impl.LIBCPMT ref: 00403C38
                                  • ~_Task_impl.LIBCPMT ref: 00403C46
                                  • PostMessageW.USER32(?,000004CB,00000000,00000000), ref: 00403C94
                                  • ~_Task_impl.LIBCPMT ref: 00403CA3
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00403CB9
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00403CCA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl$CriticalMessagePostSection$EnterLeaveObjectSingleWait
                                  • String ID:
                                  • API String ID: 2498937983-0
                                  • Opcode ID: 19ad5cd396bb67095a7883a4f5caa5f134ebf47b8cab245b9b587e16d3d37764
                                  • Instruction ID: 9b926f8f2c56e41596d8b9d682cf831b512f0bc593295f264a8243cf9ef7ab9e
                                  • Opcode Fuzzy Hash: 19ad5cd396bb67095a7883a4f5caa5f134ebf47b8cab245b9b587e16d3d37764
                                  • Instruction Fuzzy Hash: 22B125716087009FD710DF25D841A2ABBE8EF48319F10892EF556A73E2DB78E944CF5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 004052E0
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 004052FD
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00405316
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00405319
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 0040532C
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 0040539F
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 004053B3
                                  • GetDlgItem.USER32(?,000003E9), ref: 004053C3
                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00405439
                                  • GetDlgItem.USER32(?,000003F0), ref: 004054A7
                                  • SetWindowTextW.USER32(00000000,?), ref: 004054B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$Item$H_prolog3_MessageSendTextWindow
                                  • String ID: ~}3$~}3
                                  • API String ID: 867313336-611890143
                                  • Opcode ID: 21ee13c3576bda6a716c4e560b5126dbcdaa066405d0849d8954a1ec7af3fb2a
                                  • Instruction ID: 5de49d1e40048030222d03945dc8526da010badb395f68391567fa4b1f6c8789
                                  • Opcode Fuzzy Hash: 21ee13c3576bda6a716c4e560b5126dbcdaa066405d0849d8954a1ec7af3fb2a
                                  • Instruction Fuzzy Hash: EC71F575E002089FCB04DFA9D981ADCBBF5BB48315F20802AE909BB395DB786945CF49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 870 402199-4021f6 call 43e4b0 * 2 call 401e56 877 4021f8 870->877 878 4021fb-40221d CreateFileW 870->878 877->878 879 402241-40226c ReadFile 878->879 880 40221f-402230 call 40146e 878->880 882 402278-4022a5 SetFilePointer ReadFile 879->882 883 40226e-402276 CloseHandle 879->883 890 402232-402240 call 43de6e 880->890 884 4022a7-4022ae CloseHandle 882->884 885 4022c9-4022d8 882->885 883->880 887 4022b0-4022c4 call 40146e 884->887 888 4022da 885->888 889 40231d-402332 FindCloseChangeNotification 885->889 887->890 892 4022e0-40231b ReadFile 888->892 889->887 892->889 892->892
                                  APIs
                                  • _memset.LIBCMT ref: 004021C4
                                  • _memset.LIBCMT ref: 004021DF
                                    • Part of subcall function 00401E56: __EH_prolog3_GS.LIBCMT ref: 00401E60
                                    • Part of subcall function 00401E56: _memset.LIBCMT ref: 00401E9E
                                    • Part of subcall function 00401E56: GetModuleFileNameW.KERNEL32(?,00000104,?,00000234,004021EF), ref: 00401EB8
                                  • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040220C
                                  • ReadFile.KERNELBASE(00000000,?,00000040,?,00000000), ref: 0040225E
                                  • CloseHandle.KERNEL32(00000000), ref: 0040226F
                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,00000000), ref: 0040227E
                                  • ReadFile.KERNELBASE(00000000,?,000000F8,?,00000000), ref: 00402299
                                  • CloseHandle.KERNEL32(00000000), ref: 004022A8
                                  • ReadFile.KERNEL32(?,?,00000028,?,00000000), ref: 0040230A
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00402323
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$CloseRead_memset$Handle$ChangeCreateFindH_prolog3_ModuleNameNotificationPointer
                                  • String ID: PE
                                  • API String ID: 694830476-4258593460
                                  • Opcode ID: 074204a7431df1bf5982fb50f107c6f4bbe5868e4d3e5ddafc409ddf3a238516
                                  • Instruction ID: 35fc2df4358ee18656b6035cd1d6dedb407a42ec0ce3f276ddcaa0e2af90c602
                                  • Opcode Fuzzy Hash: 074204a7431df1bf5982fb50f107c6f4bbe5868e4d3e5ddafc409ddf3a238516
                                  • Instruction Fuzzy Hash: 92417171900218AFEB10DBA4DC85FFEB7B8EB48704F1044AAE609B71D2D7745E898F65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040A904
                                    • Part of subcall function 00416CA1: ~_Task_impl.LIBCPMT ref: 00416CBA
                                  • ~_Task_impl.LIBCPMT ref: 0040A9FB
                                  • ~_Task_impl.LIBCPMT ref: 0040A9B8
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0040A9AC
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 0040AA35
                                  • ~_Task_impl.LIBCPMT ref: 0040AA7D
                                  • ~_Task_impl.LIBCPMT ref: 0040AA88
                                  • ~_Task_impl.LIBCPMT ref: 0040AADD
                                  • ~_Task_impl.LIBCPMT ref: 0040AAE9
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$H_prolog3$BaseBase::~Concurrency::details::
                                  • String ID: Store
                                  • API String ID: 1430828601-1050048371
                                  • Opcode ID: b4ef5b7fa14370d02c226feaf57e1f71127470eec3434467e91cce022d4e2713
                                  • Instruction ID: 982f51e314e000b72ee753e09ae6319e261d1696898396379627665ef6ed30dd
                                  • Opcode Fuzzy Hash: b4ef5b7fa14370d02c226feaf57e1f71127470eec3434467e91cce022d4e2713
                                  • Instruction Fuzzy Hash: D1516070A04248EADF01EBA5C541BDDBBF5AF18308F14809EF405B72D2DB789E45DB6A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 980 403d69-403dd2 call 41ed5b call 41edf5 call 43e277 987 403dd4-403de8 call 418ac9 980->987 988 403dea 980->988 990 403dec-403e0f call 418b46 call 41d577 call 418df7 call 43e277 987->990 988->990 1000 403e11-403e25 call 4148e8 990->1000 1001 403e27 990->1001 1002 403e29-403e59 call 41495e call 41ee81 call 414f0b call 43e277 1000->1002 1001->1002 1013 403e6a 1002->1013 1014 403e5b-403e68 call 41ef66 1002->1014 1016 403e6c-403e90 call 420a40 call 420a4b call 41f354 1013->1016 1014->1016 1024 403ef0-403f2c call 414059 call 4140eb 1016->1024 1025 403e92-403e94 1016->1025 1035 403f33 1024->1035 1036 403f2e-403f31 1024->1036 1027 403e96-403e9a 1025->1027 1028 403e9e-403eb2 call 41ee5b PostMessageW 1025->1028 1027->1028 1034 403eb8-403ecb call 41edb4 1028->1034 1041 403ecc-403eef call 43de6e 1034->1041 1038 403f36-403f56 call 4141bb call 41f494 1035->1038 1036->1038 1047 403fa2-403fae call 41fbeb 1038->1047 1048 403f58-403f5a 1038->1048 1047->1048 1055 403fb0-403ff0 call 419688 call 40102d 1047->1055 1050 403f64-403f9d call 41ee5b PostMessageW call 4140b4 1048->1050 1051 403f5c-403f60 1048->1051 1050->1034 1051->1050 1062 403ff2-403ff5 1055->1062 1063 403ff7 1055->1063 1064 403ffa-40402d call 407b0a call 4140eb call 4204c6 1062->1064 1063->1064 1071 4040a3-4040c7 call 4209ea call 4038dd 1064->1071 1072 40402f-404031 1064->1072 1082 404182-40418c call 420630 1071->1082 1083 4040cd-40411d call 416f48 call 420560 call 43e4b0 1071->1083 1074 404033-404037 1072->1074 1075 40403b-40409e call 41ee5b PostMessageW call 407aee call 4140b4 call 41edb4 1072->1075 1074->1075 1075->1041 1093 404196-4041bd call 41ee5b PostMessageW call 416f12 1082->1093 1094 40418e-404192 1082->1094 1103 404124 1083->1103 1104 40411f-404122 1083->1104 1102 4041c2 1093->1102 1094->1093 1102->1102 1105 404127-40417c call 417541 call 403890 call 4196fa call 41749e call 4038dd 1103->1105 1104->1105 1105->1082 1105->1083
                                  APIs
                                    • Part of subcall function 0041ED5B: __EH_prolog3.LIBCMT ref: 0041ED62
                                    • Part of subcall function 0043E277: _malloc.LIBCMT ref: 0043E291
                                  • PostMessageW.USER32(?,000004CA,00000000,00000000), ref: 00403EB2
                                    • Part of subcall function 00414059: __EH_prolog3.LIBCMT ref: 00414060
                                  • PostMessageW.USER32(?,000004CA,00000000,00000F00), ref: 00403F78
                                  • PostMessageW.USER32(?,000004CA,00000000,00000000), ref: 0040404F
                                  • _memset.LIBCMT ref: 00404111
                                  • ~_Task_impl.LIBCPMT ref: 00404166
                                  • PostMessageW.USER32(?,000004CA,00000000,00000000), ref: 004041AB
                                  • ~_Task_impl.LIBCPMT ref: 004041BD
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                    • Part of subcall function 00420560: __EH_prolog3.LIBCMT ref: 00420567
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3MessagePost$ContextExternalTask_impl$BaseBase::~Concurrency::details::_malloc_memset
                                  • String ID: %s%s$n@
                                  • API String ID: 2250645164-844107356
                                  • Opcode ID: f4f1879035ad31aa8c12a3ab06fd703ce4d88256ecdc5c6c7af98fcd4b3c4fb2
                                  • Instruction ID: 3a8053de4e13f2430c6136818b0e10ea3438fd862935a6b896e6a850e0634f67
                                  • Opcode Fuzzy Hash: f4f1879035ad31aa8c12a3ab06fd703ce4d88256ecdc5c6c7af98fcd4b3c4fb2
                                  • Instruction Fuzzy Hash: B0B1E7711083419BC720EF21C845BDFB7E8AF84709F10492FF989A7182DB389A45CB9B
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1116 43e806-43e81e call 442dfb call 442df5 call 442ddb 1123 43e820-43e831 call 442df5 call 442e2f 1116->1123 1124 43e84a-43e85d 1116->1124 1137 43e833-43e83a GetLastError RtlExitUserThread 1123->1137 1138 43e840-43e848 GetCurrentThreadId 1123->1138 1125 43e865-43e86c 1124->1125 1126 43e860 call 443003 1124->1126 1128 43e883-43e888 call 43e7c5 1125->1128 1129 43e86e-43e87b call 444b80 1125->1129 1126->1125 1129->1128 1139 43e87d 1129->1139 1137->1138 1138->1125 1139->1128
                                  APIs
                                  • ___set_flsgetvalue.LIBCMT ref: 0043E80C
                                    • Part of subcall function 00442DFB: TlsGetValue.KERNEL32(?,0043E811), ref: 00442E04
                                    • Part of subcall function 00442DFB: __decode_pointer.LIBCMT ref: 00442E16
                                    • Part of subcall function 00442DFB: TlsSetValue.KERNEL32(00000000,0043E811), ref: 00442E25
                                  • ___fls_getvalue@4.LIBCMT ref: 0043E817
                                    • Part of subcall function 00442DDB: TlsGetValue.KERNEL32(?,?,0043E81C,00000000), ref: 00442DE9
                                  • ___fls_setvalue@8.LIBCMT ref: 0043E82A
                                    • Part of subcall function 00442E2F: __decode_pointer.LIBCMT ref: 00442E40
                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 0043E833
                                  • RtlExitUserThread.NTDLL(00000000), ref: 0043E83A
                                  • GetCurrentThreadId.KERNEL32 ref: 0043E840
                                  • __freefls@4.LIBCMT ref: 0043E860
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0043E873
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritableUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                  • String ID: =LD
                                  • API String ID: 2030478265-4270795345
                                  • Opcode ID: 484643e575f2a2552a8f44eda2843362626d50ab085e9ad267e53bfb11a86578
                                  • Instruction ID: 7a9d2c08523e5e4711fd2e611a56f3ebdfc96b8ae7f7f4723f6f93f03617c589
                                  • Opcode Fuzzy Hash: 484643e575f2a2552a8f44eda2843362626d50ab085e9ad267e53bfb11a86578
                                  • Instruction Fuzzy Hash: F001FC74D016019BD7087F73D909A0E3BA8EF48349F25802FF40487262EA7CD442CB9D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1140 43e7fa-43e81e call 4438e9 call 442dfb call 442df5 call 442ddb 1150 43e820-43e831 call 442df5 call 442e2f 1140->1150 1151 43e84a-43e85d 1140->1151 1164 43e833-43e83a GetLastError RtlExitUserThread 1150->1164 1165 43e840-43e848 GetCurrentThreadId 1150->1165 1152 43e865-43e86c 1151->1152 1153 43e860 call 443003 1151->1153 1155 43e883-43e888 call 43e7c5 1152->1155 1156 43e86e-43e87b call 444b80 1152->1156 1153->1152 1156->1155 1166 43e87d 1156->1166 1164->1165 1165->1152 1166->1155
                                  APIs
                                    • Part of subcall function 004438E9: _doexit.LIBCMT ref: 004438F5
                                  • ___set_flsgetvalue.LIBCMT ref: 0043E80C
                                    • Part of subcall function 00442DFB: TlsGetValue.KERNEL32(?,0043E811), ref: 00442E04
                                    • Part of subcall function 00442DFB: __decode_pointer.LIBCMT ref: 00442E16
                                    • Part of subcall function 00442DFB: TlsSetValue.KERNEL32(00000000,0043E811), ref: 00442E25
                                  • ___fls_getvalue@4.LIBCMT ref: 0043E817
                                    • Part of subcall function 00442DDB: TlsGetValue.KERNEL32(?,?,0043E81C,00000000), ref: 00442DE9
                                  • ___fls_setvalue@8.LIBCMT ref: 0043E82A
                                    • Part of subcall function 00442E2F: __decode_pointer.LIBCMT ref: 00442E40
                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 0043E833
                                  • RtlExitUserThread.NTDLL(00000000), ref: 0043E83A
                                  • GetCurrentThreadId.KERNEL32 ref: 0043E840
                                  • __freefls@4.LIBCMT ref: 0043E860
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0043E873
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritableUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                  • String ID: =LD
                                  • API String ID: 3333014375-4270795345
                                  • Opcode ID: f856b85c8f657d2e7845bcc27df93fcd2439d04ca8401a42b7141206c22e966d
                                  • Instruction ID: 0c51c26575e3b3e8418aa6a8ee2583dd6d910df242756727730537b96355cd23
                                  • Opcode Fuzzy Hash: f856b85c8f657d2e7845bcc27df93fcd2439d04ca8401a42b7141206c22e966d
                                  • Instruction Fuzzy Hash: 8DF09670C0160297EF143BB3DD1E65F3A68AF08399F65042BF90183161EEBCD4418AAE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1167 42f824-42f849 call 4426fb 1170 42f852-42f856 1167->1170 1171 42f84b 1167->1171 1172 42f858 1170->1172 1173 42f85c-42f860 1170->1173 1171->1170 1172->1173 1174 42f862 1173->1174 1175 42f866-42f86f 1173->1175 1174->1175 1176 42f871-42f87b 1175->1176 1177 42f87e-42f882 1175->1177 1176->1177 1178 42f887-42f8ab CreateFileW 1177->1178 1179 42f884 1177->1179 1180 42f8b1-42f8b5 1178->1180 1181 42f95c-42f986 call 401238 call 40132a call 40146e 1178->1181 1179->1178 1183 42f940-42f95a GetLastError 1180->1183 1184 42f8bb-42f8ee GetFileAttributesW SetFileAttributesW CreateFileW 1180->1184 1196 42f988-42f98d call 4427d3 1181->1196 1185 42f90c-42f911 call 42fc16 1183->1185 1187 42f913-42f93e call 401238 call 40132a call 40146e 1184->1187 1188 42f8f0-42f90a GetLastError SetFileAttributesW 1184->1188 1185->1196 1187->1196 1188->1185
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0042F82B
                                  • CreateFileW.KERNELBASE(?,?,00000004,00000000,00000003,08000000,00000000,?,?,?,?,?,?,00000044), ref: 0042F8A0
                                  • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,00000044), ref: 0042F8BE
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00000044), ref: 0042F8CF
                                  • CreateFileW.KERNEL32(?,?,00000004,00000000,00000002,00000000,00000000,?,?,?,?,?,?,00000044), ref: 0042F8E3
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000044), ref: 0042F8F0
                                  • SetFileAttributesW.KERNEL32(?,00000004,?,?,?,?,?,?,00000044), ref: 0042F8FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$Attributes$Create$ErrorH_prolog3Last
                                  • String ID:
                                  • API String ID: 3939419778-0
                                  • Opcode ID: 888e731de5a133f32a9c7b1441f2660f27fe32b165df3aeb2163d56e2a30b4a8
                                  • Instruction ID: c1b6d76b6e0bb7013e57c2c8afd5d12284e460d9a87751ff3c1ace5f9f9b4ae4
                                  • Opcode Fuzzy Hash: 888e731de5a133f32a9c7b1441f2660f27fe32b165df3aeb2163d56e2a30b4a8
                                  • Instruction Fuzzy Hash: B741CF70900319ABDF109FA0DC45BAEBFB4FF04318F90463AF925A62A1C7795A49DF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl
                                  • String ID:
                                  • API String ID: 3172761019-3916222277
                                  • Opcode ID: 9c6dea6744d61ff2b0a3c49b4d2ba2b511cc7a5450c3b3bb325e61df80de58b8
                                  • Instruction ID: 09548a517d716684e2d2dafdf42a77c6bc514044bea958211a1156aa3bccbe40
                                  • Opcode Fuzzy Hash: 9c6dea6744d61ff2b0a3c49b4d2ba2b511cc7a5450c3b3bb325e61df80de58b8
                                  • Instruction Fuzzy Hash: E1A15B715083819FC701EF69C880A9BBBE5FF84708F04096EF594A72A2C778D945CB9B
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00407B5D: __EH_prolog3_GS.LIBCMT ref: 00407B67
                                    • Part of subcall function 00407B5D: _wcslen.LIBCMT ref: 00407C7D
                                    • Part of subcall function 00417E3E: __EH_prolog3.LIBCMT ref: 00417E45
                                    • Part of subcall function 0040240B: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 0040241C
                                    • Part of subcall function 0040240B: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00402460
                                  • ~_Task_impl.LIBCPMT ref: 00407FD1
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00408029
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00408044
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00408047
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00408057
                                  • SendMessageW.USER32(?,000004C9,00000000,00000000), ref: 00408064
                                  • ~_Task_impl.LIBCPMT ref: 004080A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$Task_impl$H_prolog3H_prolog3_MessageSend_wcslen
                                  • String ID:
                                  • API String ID: 3193948153-0
                                  • Opcode ID: b0a17ff658505b79a4ac5721b8c3e356988d358ae1b346c2fff1d38b23e06b19
                                  • Instruction ID: b9cb9b3349322690746e1a5f23698649cfac5f62f64b40bcac7deec653fa0886
                                  • Opcode Fuzzy Hash: b0a17ff658505b79a4ac5721b8c3e356988d358ae1b346c2fff1d38b23e06b19
                                  • Instruction Fuzzy Hash: 27715C719083419FC710DF65C880A9FBBE4BF89314F40492FF998A3291DB78A945CB5B
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DialogBoxParamW.USER32(00000000,00000087,?,00406BF9,?), ref: 00405007
                                  • DialogBoxParamW.USER32(00000000,00000084,?,00406A0A,00000000), ref: 00405025
                                    • Part of subcall function 00401CEA: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00401CF2
                                    • Part of subcall function 00401CEA: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00401CFF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalDialogParamSection$EnterLeave
                                  • String ID: ~}3
                                  • API String ID: 3085697989-2221931237
                                  • Opcode ID: 5834d5ccdfd5c29c5cc749e8ff1f8b77c102712633d67aa52e6a1383110c5871
                                  • Instruction ID: 778a5befaa6801f058060ee06ca4568f2298abe523b53aac0ce12a7946536d5a
                                  • Opcode Fuzzy Hash: 5834d5ccdfd5c29c5cc749e8ff1f8b77c102712633d67aa52e6a1383110c5871
                                  • Instruction Fuzzy Hash: 5141BF31A14E16ABDB106F649C19E6F3658FF05394F14043BF852B62D2DA3CD8119EEE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00405D87
                                  • _memset.LIBCMT ref: 00405DC5
                                  • PathCompactPathExW.SHLWAPI(?,?,00000028,00000000), ref: 00405DE7
                                  • GetDlgItem.USER32(?,000003F1), ref: 00405E19
                                  • SetWindowTextW.USER32(00000000,?), ref: 00405E36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Path$CompactH_prolog3_ItemTextWindow_memset
                                  • String ID: %s (%d/%d)
                                  • API String ID: 3563190175-953352955
                                  • Opcode ID: a9324dcaebaec56a8f23a944ac7e61a506aad89c0d2bea48290006b36e0a9594
                                  • Instruction ID: ba876197449a85af9009405313cd9773537dc1ed11e522f3876f58b9ab43e9b8
                                  • Opcode Fuzzy Hash: a9324dcaebaec56a8f23a944ac7e61a506aad89c0d2bea48290006b36e0a9594
                                  • Instruction Fuzzy Hash: 2C217C31940219ABDB10EB61CD8DBE9B774FF04705F5045EAF508BA0A1DB78AB85CF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___set_flsgetvalue.LIBCMT ref: 0043E8BA
                                  • __calloc_crt.LIBCMT ref: 0043E8C6
                                  • __getptd.LIBCMT ref: 0043E8D3
                                  • CreateThread.KERNELBASE(?,?,0043E806,00000000,?,?), ref: 0043E90A
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 0043E914
                                  • __dosmaperr.LIBCMT ref: 0043E92C
                                    • Part of subcall function 004402AD: __getptd_noexit.LIBCMT ref: 004402AD
                                    • Part of subcall function 0043E14D: __decode_pointer.LIBCMT ref: 0043E158
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                  • String ID:
                                  • API String ID: 1803633139-0
                                  • Opcode ID: da391700652f45fe4b238581048e460af52c52fc0829828d1c31847ba6f09259
                                  • Instruction ID: 55a883f71d3ddd8d9b1422bad3292b9f188092b29ee0c436280b0da7c41105f6
                                  • Opcode Fuzzy Hash: da391700652f45fe4b238581048e460af52c52fc0829828d1c31847ba6f09259
                                  • Instruction Fuzzy Hash: 2111E272901206BFEB11BFA6DC4699F7BA5EF08324F20003FF50193291DA798D019B68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00404F17
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00404F24
                                    • Part of subcall function 00402199: _memset.LIBCMT ref: 004021C4
                                    • Part of subcall function 00402199: _memset.LIBCMT ref: 004021DF
                                    • Part of subcall function 00402199: CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040220C
                                  • MessageBoxW.USER32(00000000,?,ALZip Self-Extractor,00000010), ref: 00404F65
                                    • Part of subcall function 00401F09: __EH_prolog3_GS.LIBCMT ref: 00401F10
                                    • Part of subcall function 00401F09: CreateFileW.KERNELBASE(:O@,80000000,00000001,00000000,00000003,00000080,00000000,00000064,00404F3A), ref: 00401F3F
                                    • Part of subcall function 00401F09: SetFilePointer.KERNELBASE(00000000,00000000,00000000), ref: 00401F61
                                    • Part of subcall function 00401F09: ReadFile.KERNELBASE(00000000,?,00000004,?,00000000), ref: 00401F79
                                    • Part of subcall function 00401F09: CloseHandle.KERNEL32(?), ref: 00401F86
                                  • DialogBoxParamW.USER32(?,00000082,00000000,00404FA9,00000000), ref: 00404F90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$CreateCriticalSection_memset$CloseDialogEnterH_prolog3_HandleLeaveMessageParamPointerRead
                                  • String ID: ALZip Self-Extractor
                                  • API String ID: 1226183020-1641417939
                                  • Opcode ID: 4514babd72805a4f97f5efb0ccd39af64b43824979a197a7588e27fe42a08d13
                                  • Instruction ID: 5a040a90e192a037237e2f18c029d94b20d0c8f0b11ae0d6018b99f435ed9717
                                  • Opcode Fuzzy Hash: 4514babd72805a4f97f5efb0ccd39af64b43824979a197a7588e27fe42a08d13
                                  • Instruction Fuzzy Hash: 4D1129B0614310AFC210AB359C0996F3BD8AF49B25F00493AF949F61D1D7B8D9008BDF
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042BDEB
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042BE3C
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042BE6C
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                    • Part of subcall function 0041DCFD: __EH_prolog3.LIBCMT ref: 0041DD04
                                    • Part of subcall function 0041B485: __EH_prolog3.LIBCMT ref: 0041B48C
                                    • Part of subcall function 0041B485: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041B4AA
                                  • _memset.LIBCMT ref: 0042BEE8
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0042C024
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 1412648963-0
                                  • Opcode ID: 4383137fd3eb947852ce0fd49e27fa79be92c8c0bcaa500b87a97b6f0eae1af4
                                  • Instruction ID: c770509db2a3e84330de57b35a5ba658a8c3a8e8283314bdbbc15bf309ae2c3d
                                  • Opcode Fuzzy Hash: 4383137fd3eb947852ce0fd49e27fa79be92c8c0bcaa500b87a97b6f0eae1af4
                                  • Instruction Fuzzy Hash: 34718E715047019BD720EF66C882ADBB7E8FF84308F40491EF5A693291DB78A549CB66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __lock.LIBCMT ref: 0043FE53
                                    • Part of subcall function 0044697C: __mtinitlocknum.LIBCMT ref: 00446992
                                    • Part of subcall function 0044697C: __amsg_exit.LIBCMT ref: 0044699E
                                    • Part of subcall function 0044697C: RtlEnterCriticalSection.NTDLL(?), ref: 004469A6
                                  • ___sbh_find_block.LIBCMT ref: 0043FE5E
                                  • ___sbh_free_block.LIBCMT ref: 0043FE6D
                                  • RtlFreeHeap.NTDLL(00000000,?,00464908,0000000C,00442FDA,00000000,?,00443470,?,00000001,?,?,00446906,00000018,00464B88,0000000C), ref: 0043FE9D
                                  • GetLastError.KERNEL32(?,00443470,?,00000001,?,?,00446906,00000018,00464B88,0000000C,00446997,?,?,?,00443094,0000000D), ref: 0043FEAE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                  • String ID:
                                  • API String ID: 2714421763-0
                                  • Opcode ID: 5300c6c498e8fd61fbe9791e63c6718f99e74771db2cddb66bce504695a31399
                                  • Instruction ID: f8702364e22f2538d7e7c5ef3f1eb3872c6fde0dd602b4deca29473c6bb6485a
                                  • Opcode Fuzzy Hash: 5300c6c498e8fd61fbe9791e63c6718f99e74771db2cddb66bce504695a31399
                                  • Instruction Fuzzy Hash: F701A772D05711AAEB306FB29C0BB5F3A60AF04729F10506FF410661E2DBBC89448E5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID: ($PE
                                  • API String ID: 2102423945-3347799738
                                  • Opcode ID: d4858db9d3c4cf8fc99c67914f32ef8c37a03b2b01dd07a5bbdb9d8698bdc9dd
                                  • Instruction ID: 0b817e10a45c20061ec00f5ff7b141c3c80ff4d8b5b3e03367fbe163a56e4639
                                  • Opcode Fuzzy Hash: d4858db9d3c4cf8fc99c67914f32ef8c37a03b2b01dd07a5bbdb9d8698bdc9dd
                                  • Instruction Fuzzy Hash: 8C412CB1E10219AFDF20DF69CD80AEEB779AF08748F10807AE904B7282D7749E459F55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: IncrementInterlocked_malloc_strlen_wcslen
                                  • String ID:
                                  • API String ID: 3295947797-0
                                  • Opcode ID: 5e5a10eb52dc2cafeec062705e7fa25071dd29ce49bdf9c3cc7c2e9e663193f2
                                  • Instruction ID: bb8d8023a125aaba1ce75cb7bf0c76376d19025c2abd1ee5c70b97d419093309
                                  • Opcode Fuzzy Hash: 5e5a10eb52dc2cafeec062705e7fa25071dd29ce49bdf9c3cc7c2e9e663193f2
                                  • Instruction Fuzzy Hash: 0631D4B1A043049FDB14DF69C8849A6B7B4FF48354F09452AF91ACB3A2D778EC44C758
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _malloc.LIBCMT ref: 0043E291
                                    • Part of subcall function 0043FF12: __FF_MSGBANNER.LIBCMT ref: 0043FF35
                                    • Part of subcall function 0043FF12: __NMSG_WRITE.LIBCMT ref: 0043FF3C
                                    • Part of subcall function 0043FF12: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 0043FF89
                                  • std::bad_alloc::bad_alloc.LIBCMT ref: 0043E2B4
                                    • Part of subcall function 0043E25C: std::exception::exception.LIBCMT ref: 0043E268
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AllocateHeap_mallocstd::bad_alloc::bad_allocstd::exception::exception
                                  • String ID: P?
                                  • API String ID: 3447465555-1630831327
                                  • Opcode ID: 2e8f0e2e7b842902f5a4a4d17f8203f8a6ebc7ccb06e14216effbd829d1273f4
                                  • Instruction ID: 500d92e69a0a925c2ee20fc51a6e94889eea3773d246cff9ee612ebb79e76a98
                                  • Opcode Fuzzy Hash: 2e8f0e2e7b842902f5a4a4d17f8203f8a6ebc7ccb06e14216effbd829d1273f4
                                  • Instruction Fuzzy Hash: 15F0273190024926CF04B763EC1296B3B5C9F4571CF2090ABFC40660D2EFBDC906865E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0042EFF3
                                    • Part of subcall function 0041348C: __EH_prolog3.LIBCMT ref: 00413493
                                    • Part of subcall function 0042EDA9: __EH_prolog3_GS.LIBCMT ref: 0042EDB0
                                    • Part of subcall function 0042EDA9: GetFileAttributesW.KERNELBASE(?,?,00000040,0042F016,?,?,0000006C,004183CF,?), ref: 0042EDDA
                                  • CreateDirectoryW.KERNELBASE(?,00000000,?,00000001,?,?,0000006C,004183CF,?), ref: 0042F124
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_$AttributesCreateDirectoryFileH_prolog3
                                  • String ID:
                                  • API String ID: 85581025-0
                                  • Opcode ID: 74bff80c903f231255b67766380d3aed667114e9297976b9b998d1e8d7b7901c
                                  • Instruction ID: 3466b981ef3e8a8bc12ed6af27326b4593a66621a910f66cf8908a130ca03b5f
                                  • Opcode Fuzzy Hash: 74bff80c903f231255b67766380d3aed667114e9297976b9b998d1e8d7b7901c
                                  • Instruction Fuzzy Hash: 38519232E102289ADB20EBE5EC41BEDB374AF41714F91013BE515BB1D2DA785E49CB89
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetFileTime.KERNELBASE(?,00000000,00000000,00000000), ref: 0042F313
                                  • GetLastError.KERNEL32(?,00000005), ref: 0042F31D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastTime
                                  • String ID:
                                  • API String ID: 2212998366-0
                                  • Opcode ID: 8751583b0aeada1376308e8e2cbbe144cabe2406b73cbacb44bd52ca75714e8c
                                  • Instruction ID: 6d4b1f2d82df0ebcc6ced3fef968453a2ab799272f8240b3c1fabb743210c7d8
                                  • Opcode Fuzzy Hash: 8751583b0aeada1376308e8e2cbbe144cabe2406b73cbacb44bd52ca75714e8c
                                  • Instruction Fuzzy Hash: 84416B702047018FC314CF29D480A2BBBF4BF89708F948A7EE8D987261D735E949CB49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 004216B9
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 004216E7
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                  • ~_Task_impl.LIBCPMT ref: 00421733
                                    • Part of subcall function 00417C15: _wcslen.LIBCMT ref: 00417C2B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_wcslen
                                  • String ID:
                                  • API String ID: 601930181-0
                                  • Opcode ID: a2449a67e137c3be227996ee03b734568cb3d15cf956625ca39ae1bb628b28da
                                  • Instruction ID: 448332fe1b3a91efe93e9e50beb68e7839f626b797f7462d20a51cff3891e18a
                                  • Opcode Fuzzy Hash: a2449a67e137c3be227996ee03b734568cb3d15cf956625ca39ae1bb628b28da
                                  • Instruction Fuzzy Hash: CC41A5712047019BC714EF35D881BEBB7E9EF95314F400A2EF5A682191EF38A949CB5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetFileTime.KERNEL32(?), ref: 0042F3FC
                                  • GetLastError.KERNEL32 ref: 0042F406
                                  • GetFileAttributesW.KERNELBASE(00000000), ref: 0042F477
                                    • Part of subcall function 0042F568: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0042F426,?), ref: 0042F575
                                    • Part of subcall function 0042F568: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0042F426,?), ref: 0042F585
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Time$File$System$AttributesErrorLastLocalSpecific
                                  • String ID:
                                  • API String ID: 584764771-0
                                  • Opcode ID: c2a00f85819e7d1974a750cec90f94be2f95e16a643e75f53319443f8bf5e502
                                  • Instruction ID: ae1c6323d5a5710bd2bf010a2a7227c3f2ffc887556d35e21f887b3611091920
                                  • Opcode Fuzzy Hash: c2a00f85819e7d1974a750cec90f94be2f95e16a643e75f53319443f8bf5e502
                                  • Instruction Fuzzy Hash: 9831A2726147108FC724EF29E894A2BB7F5BB94310FC44A3EE49AC7251D778E50C8B49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040AC7C
                                    • Part of subcall function 0040BC79: FileTimeToSystemTime.KERNEL32(00000001,?,?,?), ref: 0040BC99
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040AD51
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                  • ~_Task_impl.LIBCPMT ref: 0040AD70
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$BaseBase::~Concurrency::details::$Task_implTime$FileSystem
                                  • String ID:
                                  • API String ID: 1286750186-0
                                  • Opcode ID: 99dc551492bed9c2fde4ccf3d61935ea1ed5dc272418cfdf51c8920fe4a4345c
                                  • Instruction ID: f7a1d5e0895f007203416a78b7c85d31d71b20594887372bb833d8c24e101999
                                  • Opcode Fuzzy Hash: 99dc551492bed9c2fde4ccf3d61935ea1ed5dc272418cfdf51c8920fe4a4345c
                                  • Instruction Fuzzy Hash: E5317E72D0060AABCF05DFE5C851AEEBBB6BF08304F04412FE501B7691DB389A59CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetDlgItem.USER32(?,00000066), ref: 00405C97
                                  • SetWindowTextW.USER32(00000000,?), ref: 00405CC9
                                  • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00405D03
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherItemTextUserWindow
                                  • String ID:
                                  • API String ID: 35929931-0
                                  • Opcode ID: 82475e1d517b2cde2044b77ce3db82b707dbb6ff0570620b32f36338606b4e54
                                  • Instruction ID: e114b1f69ac210912a751ea47597f0c7d50794b980523d0d9df8501aa343caa2
                                  • Opcode Fuzzy Hash: 82475e1d517b2cde2044b77ce3db82b707dbb6ff0570620b32f36338606b4e54
                                  • Instruction Fuzzy Hash: 91110634908B04A6EB206B759D4AABF36A4EB44745F04453BF802FB2C1DA7CD8058F6E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0042F99F
                                  • SetFileAttributesW.KERNELBASE(00000000,00000000), ref: 0042F9BE
                                  • _memset.LIBCMT ref: 0042F9C9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AttributesChangeCloseFileFindNotification_memset
                                  • String ID:
                                  • API String ID: 3845561022-0
                                  • Opcode ID: 5a1fd54bde73543954a3de141e289c02440edfa6e5cb1995d7f9f8bc267b546e
                                  • Instruction ID: c64057af0379c47fda521629e1972f1cdbadee487bf54a7318b410b3c17137ff
                                  • Opcode Fuzzy Hash: 5a1fd54bde73543954a3de141e289c02440edfa6e5cb1995d7f9f8bc267b546e
                                  • Instruction Fuzzy Hash: 6EE065717007116BD7606735FC15B6B37A87F54B0AF54043EF045D2191DBACA54D8698
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __getptd.LIBCMT ref: 0043E7D1
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __endthreadex.LIBCMT ref: 0043E7E1
                                    • Part of subcall function 0043E788: __IsNonwritableInCurrentImage.LIBCMT ref: 0043E79B
                                    • Part of subcall function 0043E788: __getptd_noexit.LIBCMT ref: 0043E7AB
                                    • Part of subcall function 0043E788: __freeptd.LIBCMT ref: 0043E7B5
                                    • Part of subcall function 0043E788: RtlExitUserThread.NTDLL(?,?,0043E7E6,00000000), ref: 0043E7BE
                                    • Part of subcall function 0043E788: __XcptFilter.LIBCMT ref: 0043E7F2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadUserXcpt__amsg_exit__endthreadex__freeptd__getptd
                                  • String ID:
                                  • API String ID: 1003287236-0
                                  • Opcode ID: 7be4a9c7324ae9200fd00cc69d826ab98f9e80954eaefff729343047ae19d26f
                                  • Instruction ID: 6c74d4a09294f5df4dac338277adc4b07625feddf76927be2362a60f10e67b80
                                  • Opcode Fuzzy Hash: 7be4a9c7324ae9200fd00cc69d826ab98f9e80954eaefff729343047ae19d26f
                                  • Instruction Fuzzy Hash: C6E08CB4901600DFFB08BBA1C906F2D3774EF44305F60004EF0016B2A2CABC99009B28
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ~_Task_impl.LIBCPMT ref: 00429AF1
                                    • Part of subcall function 00417618: __EH_prolog3.LIBCMT ref: 0041761F
                                    • Part of subcall function 00417618: ~_Task_impl.LIBCPMT ref: 00417667
                                    • Part of subcall function 00417618: ~_Task_impl.LIBCPMT ref: 00417680
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 00429BF4
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternalTask_impl$H_prolog3$BaseBase::~Concurrency::details::
                                  • String ID:
                                  • API String ID: 618964925-0
                                  • Opcode ID: 9a36d90bceeb4867dca77623a5b162a308f032225b0ea36e689f9a7a9dbfa1af
                                  • Instruction ID: 2d7dd54514b509819bfb1aace42535f953ea52162d952b85e566f85dd145bdd5
                                  • Opcode Fuzzy Hash: 9a36d90bceeb4867dca77623a5b162a308f032225b0ea36e689f9a7a9dbfa1af
                                  • Instruction Fuzzy Hash: 5FD17C712083518FCB15EF29D491AAEB7E5BF88314F50096EF885873A2DB38DC45CB4A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                  • ~_Task_impl.LIBCPMT ref: 00429639
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042967F
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175E0
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175FC
                                    • Part of subcall function 0042B3E4: __EH_prolog3_GS.LIBCMT ref: 0042B3EB
                                    • Part of subcall function 0042B3E4: ~_Task_impl.LIBCPMT ref: 0042B413
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$BaseBase::~Concurrency::details::H_prolog3$H_prolog3_
                                  • String ID:
                                  • API String ID: 2255126058-0
                                  • Opcode ID: defc0797acb51106c7d8388c2643408e16951e2bde693f3b3cf5866c36827529
                                  • Instruction ID: 72f787a01ac398bc64078770512d367c4a2e517a117656be2c43508d0f2625c1
                                  • Opcode Fuzzy Hash: defc0797acb51106c7d8388c2643408e16951e2bde693f3b3cf5866c36827529
                                  • Instruction Fuzzy Hash: 8F81B3713183119BD714EF25D992BAEB3E5AF84748F50082EF49287392DB3DEC45874A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004080E4: __EH_prolog3.LIBCMT ref: 004080EB
                                  • SendMessageW.USER32(?,000004CF,?,00000000), ref: 004082FC
                                  • SendMessageW.USER32(?,000004D0,?,00000000), ref: 0040831F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: MessageSend$H_prolog3
                                  • String ID:
                                  • API String ID: 1885053084-0
                                  • Opcode ID: 54174219d14bce4622d60aaef0d4cb8e948230924614d79314ac8b848e2a73ad
                                  • Instruction ID: eac633c72afa63e160585990f7fb398a7b4a59b5a5a3420984b5398372c2de86
                                  • Opcode Fuzzy Hash: 54174219d14bce4622d60aaef0d4cb8e948230924614d79314ac8b848e2a73ad
                                  • Instruction Fuzzy Hash: BB514E715083809FD711DF54C945B9EBBE4FF89714F00092EF984A72A1CB79A948CB97
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3Task_impl
                                  • String ID:
                                  • API String ID: 2182512335-0
                                  • Opcode ID: c9ecec08ad7f54fd8ae8c101d6c3b0d7c6df616b54cecb54ceac48625934396e
                                  • Instruction ID: 532d60a74afb7aa245790a02a113d00ae5d663f20852f97083de1d46b3fca001
                                  • Opcode Fuzzy Hash: c9ecec08ad7f54fd8ae8c101d6c3b0d7c6df616b54cecb54ceac48625934396e
                                  • Instruction Fuzzy Hash: EF217C30900219EBDF05EFA6C5816EDBB75AF18358F10402FF819A7252DB38DE81CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetDlgItem.USER32(?,000003E9), ref: 00405255
                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004052C3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ItemMessageSend
                                  • String ID:
                                  • API String ID: 3015471070-0
                                  • Opcode ID: b633ff00d9f31aebd8698c703da9ef50767492910171b58783858a5729267808
                                  • Instruction ID: cda8803e2fe27940c17ec1edc84914bc251466dd876e58acb39f43f2d8b70d1a
                                  • Opcode Fuzzy Hash: b633ff00d9f31aebd8698c703da9ef50767492910171b58783858a5729267808
                                  • Instruction Fuzzy Hash: 3A1182B1D00708EBCB04DFA1C9557AEBBF4FB08312F20C5A9E415F22A0DB345A008F94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0042F711
                                  • GetLastError.KERNEL32 ref: 0042F71B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID:
                                  • API String ID: 1948546556-0
                                  • Opcode ID: b25cf4c17adbee42b79aef3403e6afb843614b08f374dfa2c17fcd78c8e23c7a
                                  • Instruction ID: 252276086e0f8dfc2d97bc3a15982b309c1f0c83f1544aadecf1f50c65b26417
                                  • Opcode Fuzzy Hash: b25cf4c17adbee42b79aef3403e6afb843614b08f374dfa2c17fcd78c8e23c7a
                                  • Instruction Fuzzy Hash: 18014B71610314EFDB248F56E808BAAB7F8BB44344F90803EE94687240EB74E9089F55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0042F77A
                                  • GetLastError.KERNEL32 ref: 0042F784
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID:
                                  • API String ID: 442123175-0
                                  • Opcode ID: 2c708ce5b5e70e59b143e4ff66a5c71a7d5b1c7042f7dcfb01ec94f31b3e708d
                                  • Instruction ID: 6e47449235eedacd214a3a471bfe2f5452a02b41cf46c9a49daed485b3a2f794
                                  • Opcode Fuzzy Hash: 2c708ce5b5e70e59b143e4ff66a5c71a7d5b1c7042f7dcfb01ec94f31b3e708d
                                  • Instruction Fuzzy Hash: A7F04975610214EFDB10DF66E808B9EB7F8BB44318F80802EE546C7240EB74EA08DF68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0042EDB0
                                    • Part of subcall function 0041348C: __EH_prolog3.LIBCMT ref: 00413493
                                  • GetFileAttributesW.KERNELBASE(?,?,00000040,0042F016,?,?,0000006C,004183CF,?), ref: 0042EDDA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AttributesFileH_prolog3H_prolog3_
                                  • String ID:
                                  • API String ID: 3233049449-0
                                  • Opcode ID: 7678379ec79cc3203b9d4f039267d5ec3504841d33ed3fc65fa07d70581f64dd
                                  • Instruction ID: a359b7e994934261f3d9583c5d3d66b8d9b403035359139d6ae1fd65def14f1b
                                  • Opcode Fuzzy Hash: 7678379ec79cc3203b9d4f039267d5ec3504841d33ed3fc65fa07d70581f64dd
                                  • Instruction Fuzzy Hash: 23F0A031A0122497CF15EBAAD9050CDB778AF41715F944A1BF811B7292C77C9E46C78C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __lock.LIBCMT ref: 00446063
                                    • Part of subcall function 0044697C: __mtinitlocknum.LIBCMT ref: 00446992
                                    • Part of subcall function 0044697C: __amsg_exit.LIBCMT ref: 0044699E
                                    • Part of subcall function 0044697C: RtlEnterCriticalSection.NTDLL(?), ref: 004469A6
                                  • __tzset_nolock.LIBCMT ref: 00446074
                                    • Part of subcall function 00445936: __lock.LIBCMT ref: 00445958
                                    • Part of subcall function 00445936: __get_daylight.LIBCMT ref: 0044596D
                                    • Part of subcall function 00445936: __invoke_watson.LIBCMT ref: 0044597C
                                    • Part of subcall function 00445936: __get_daylight.LIBCMT ref: 00445988
                                    • Part of subcall function 00445936: __invoke_watson.LIBCMT ref: 00445997
                                    • Part of subcall function 00445936: __get_daylight.LIBCMT ref: 004459A3
                                    • Part of subcall function 00445936: __invoke_watson.LIBCMT ref: 004459B2
                                    • Part of subcall function 00445936: ____lc_codepage_func.LIBCMT ref: 004459BA
                                    • Part of subcall function 00445936: __getenv_helper_nolock.LIBCMT ref: 004459DC
                                    • Part of subcall function 00445936: _strlen.LIBCMT ref: 00445A1A
                                    • Part of subcall function 00445936: __malloc_crt.LIBCMT ref: 00445A21
                                    • Part of subcall function 00445936: _strlen.LIBCMT ref: 00445A37
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __get_daylight__invoke_watson$__lock_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__malloc_crt__mtinitlocknum__tzset_nolock
                                  • String ID:
                                  • API String ID: 4157481694-0
                                  • Opcode ID: 978a5017a68c6763a9c71a96d3e0fa616a6f2ce48f70801047cb5fcc30f8baea
                                  • Instruction ID: 763457f191a5cb7b50ccd8b4fe70ac468742e718c140abacae3e6826f0c558a1
                                  • Opcode Fuzzy Hash: 978a5017a68c6763a9c71a96d3e0fa616a6f2ce48f70801047cb5fcc30f8baea
                                  • Instruction Fuzzy Hash: 28E0C2B0984710DAEA32FFA6980221DB1316B45F66F11417FF090125E2DBB80642CF9F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?,?,00403CEE), ref: 004083C6
                                  • RtlDeleteCriticalSection.NTDLL ref: 004083D0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ChangeCloseCriticalDeleteFindNotificationSection
                                  • String ID:
                                  • API String ID: 1020450066-0
                                  • Opcode ID: 67ae502e9639def027de007c7b1b9bc8fc92893e483f96c190ea47854aa27bf3
                                  • Instruction ID: 3039fb6ac0943cb22633b9b77535959c7555116527a83c4463e43a7f43878add
                                  • Opcode Fuzzy Hash: 67ae502e9639def027de007c7b1b9bc8fc92893e483f96c190ea47854aa27bf3
                                  • Instruction Fuzzy Hash: 0FC0127141172197C7102B28BD1C59736E8AF04705305086AFC49E3283DB79DC5186DC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___crtCorExitProcess.LIBCMT ref: 004436BF
                                    • Part of subcall function 0044368C: GetModuleHandleW.KERNEL32(mscoree.dll,?,004436C4,?,?,0043FF4B,000000FF,0000001E,?,00443470,?,00000001,?,?,00446906,00000018), ref: 00443696
                                    • Part of subcall function 0044368C: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004436A6
                                  • ExitProcess.KERNEL32 ref: 004436C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ExitProcess$AddressHandleModuleProc___crt
                                  • String ID:
                                  • API String ID: 2427264223-0
                                  • Opcode ID: fe0157ce4a1c999b23b613b5cc26864a1e246030e00c095048ca47635eeb259b
                                  • Instruction ID: 3d4dd1f51e0b2292f50593640656caad3e4086ecf5e1640e34db10ecd1bc13bb
                                  • Opcode Fuzzy Hash: fe0157ce4a1c999b23b613b5cc26864a1e246030e00c095048ca47635eeb259b
                                  • Instruction Fuzzy Hash: 1EB09B310006487BDB152F26DC0985D7F15EB407527514025F40405131DF71ED52D988
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memcpy_s
                                  • String ID:
                                  • API String ID: 2001391462-0
                                  • Opcode ID: d42ed0c4723c42b8edcb0d0775795a3aaf9f2c47ad02ae1aa89149fcf804478a
                                  • Instruction ID: a5fe440fdfecc5fdedd484e355e2b02bcbfc5faee50d86bb0be5e4a291b78c62
                                  • Opcode Fuzzy Hash: d42ed0c4723c42b8edcb0d0775795a3aaf9f2c47ad02ae1aa89149fcf804478a
                                  • Instruction Fuzzy Hash: 63915774B00616EFCB19DF64D5C0AE9F7B1FF08340F10856AE86A97210DB35B9A0DB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID:
                                  • API String ID: 431132790-0
                                  • Opcode ID: b55c4783ec0ea997bb6914fe603c498d699c8c8706d983e09037d7c4e47ca5cf
                                  • Instruction ID: 897c38121aca742cf3af521dab2c3ad79063a8507ec4df7ef20bc097b7d8fcc7
                                  • Opcode Fuzzy Hash: b55c4783ec0ea997bb6914fe603c498d699c8c8706d983e09037d7c4e47ca5cf
                                  • Instruction Fuzzy Hash: C75113709002199BCF01EF65D485ACDBBB5BF48308F64417BEC05AF216DB78AA85CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: c502c9d70c1c0c8aacc2144b5314c625061e60ddda7ff032960cd82db6d9b852
                                  • Instruction ID: 6224ae7ed7a85da6bba7f7ea15086695645b61cb886cf75a9a5f2da62c8fc933
                                  • Opcode Fuzzy Hash: c502c9d70c1c0c8aacc2144b5314c625061e60ddda7ff032960cd82db6d9b852
                                  • Instruction Fuzzy Hash: 40313A715017009FCB10DF1AD884A8A7BF5FF88314F10496EF8589B256D734E959CB9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00409D9B
                                    • Part of subcall function 0041ABD9: _memset.LIBCMT ref: 0041ABE7
                                    • Part of subcall function 00409E50: _memset.LIBCMT ref: 00409E83
                                    • Part of subcall function 00409E50: _memset.LIBCMT ref: 00409E9E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset$H_prolog3
                                  • String ID:
                                  • API String ID: 2144794740-0
                                  • Opcode ID: db5be84a7fbb6e4ec7ead1a5107482d19e3c065368c7708e6b81a508e1c271df
                                  • Instruction ID: 7583fe7703b2d2283357dff9fc8f7e5c7c7ee17632d6b7ddd048583f29b4f886
                                  • Opcode Fuzzy Hash: db5be84a7fbb6e4ec7ead1a5107482d19e3c065368c7708e6b81a508e1c271df
                                  • Instruction Fuzzy Hash: 3D2109B0D0121A9BDF01DF95C9819EEB775FF14308F10442BE545B6282E3789E59CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetFilePointer.KERNELBASE(?,?,?,00000001), ref: 0042F6C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 48a9c4074d84e33faffbfab9ad2de0d77fb31d6555ca4d2ddd6d503845ea6183
                                  • Instruction ID: c381c1fee7fa8a298683391104b38129fb15e8aa7a2bc37115808c28b5200b9d
                                  • Opcode Fuzzy Hash: 48a9c4074d84e33faffbfab9ad2de0d77fb31d6555ca4d2ddd6d503845ea6183
                                  • Instruction Fuzzy Hash: C701617270412AAFE748CE69EC81AAB73E5FB84311BD4C13FB50AC7250DA70AC168764
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: cc280e2375be935d74c22372f687d926dbcb8d0d06842eebb1722bdcc73f66d2
                                  • Instruction ID: af8a0ce88d1bf22230ed5d440fdf4da950adfde4eff4fa3f55469bb5b87bd899
                                  • Opcode Fuzzy Hash: cc280e2375be935d74c22372f687d926dbcb8d0d06842eebb1722bdcc73f66d2
                                  • Instruction Fuzzy Hash: D301E975D00208FBCB21DF99C8449EEFBF8EF58700F50819BA552A2254E7749B55CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FileTimeToSystemTime.KERNEL32(00000001,?,?,?), ref: 0040BC99
                                    • Part of subcall function 0043F9FE: __make__time64_t.LIBCMT ref: 0043FA08
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Time$FileSystem__make__time64_t
                                  • String ID:
                                  • API String ID: 2393291594-0
                                  • Opcode ID: 945139dfa476c15d756834f6c8fc32a3973028623d225c212d42989f56c54cdf
                                  • Instruction ID: 69d4df0f326b466fe6c276e323e8cf52ee13aee39d166953f8ba67790cb1da1f
                                  • Opcode Fuzzy Hash: 945139dfa476c15d756834f6c8fc32a3973028623d225c212d42989f56c54cdf
                                  • Instruction Fuzzy Hash: CB11B7B6D0021DAACB10DFAAD4415FEFBF9EF48711F10412BF955E7280E6388945DBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416847: __EH_prolog3.LIBCMT ref: 0041684E
                                    • Part of subcall function 00416847: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041687E
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041B578
                                    • Part of subcall function 0041DD34: __EH_prolog3.LIBCMT ref: 0041DD3B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3
                                  • String ID:
                                  • API String ID: 1562071080-0
                                  • Opcode ID: fbc09292adbb313ce18c9a971a8e829743436da0b5b215ecd1429b1c1c7d7689
                                  • Instruction ID: 9cdaa2b2be47600022c6b5b02bfd8473c2fcddab0618c6d461ceac2c00d39ef4
                                  • Opcode Fuzzy Hash: fbc09292adbb313ce18c9a971a8e829743436da0b5b215ecd1429b1c1c7d7689
                                  • Instruction Fuzzy Hash: 13F0C8B26087405BC310EB29DC02B57B7D8F745B34F00072EF465936D1EB6C990486DA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00417D34
                                    • Part of subcall function 0043E277: _malloc.LIBCMT ref: 0043E291
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_malloc
                                  • String ID:
                                  • API String ID: 2346879263-0
                                  • Opcode ID: 70d88fcef7588bdffb26899be79893ccdbdfcd5114151dde123619913a05a549
                                  • Instruction ID: 258ce6b7d0f085ee873b372354d0712a6f586f45f5e2c87cd0e4e12c88f6ad4f
                                  • Opcode Fuzzy Hash: 70d88fcef7588bdffb26899be79893ccdbdfcd5114151dde123619913a05a549
                                  • Instruction Fuzzy Hash: ECF054716046199BDB50EF79958176A66F0AF08354F55C0BFF909CF382E97CC9408B29
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041E3C0
                                    • Part of subcall function 0043E277: _malloc.LIBCMT ref: 0043E291
                                    • Part of subcall function 0041AF74: __EH_prolog3.LIBCMT ref: 0041AF7B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$_malloc
                                  • String ID:
                                  • API String ID: 1683881009-0
                                  • Opcode ID: 20989d46390b7344befdede8679176f84c68f558e915de4ff925998c0bd30458
                                  • Instruction ID: 4b9063e7813039a7127407ae34af6a5b01f29605eaf4c884dfe734e29d180228
                                  • Opcode Fuzzy Hash: 20989d46390b7344befdede8679176f84c68f558e915de4ff925998c0bd30458
                                  • Instruction Fuzzy Hash: 7AE086756112058BDB00EBB68506B9AA2E4AB04319F10842B7D10CB282DBBCC441C61D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00448292
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CreateHeap
                                  • String ID:
                                  • API String ID: 10892065-0
                                  • Opcode ID: 65637b6ee6842692333b0e13ffe9075faae8792ec71070a186bda77f443aef37
                                  • Instruction ID: 5ff8e4a9eb7898b5525ea3130c7b313edf93c4a40d97aa87955787450e8aafd7
                                  • Opcode Fuzzy Hash: 65637b6ee6842692333b0e13ffe9075faae8792ec71070a186bda77f443aef37
                                  • Instruction Fuzzy Hash: 03D01772E547046AEB105B75AC097263A98A784399F004436E80DC6150FAB4C5409A49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __waccess_s
                                  • String ID:
                                  • API String ID: 4272103461-0
                                  • Opcode ID: 121c4f77d4c72d3789264fc0d0d617dc9724d87233f222cead199be475d85574
                                  • Instruction ID: 20f72f3fd7d8b9321cfec293169b33bfb5715925ea7c671c9b98f829f10e3b89
                                  • Opcode Fuzzy Hash: 121c4f77d4c72d3789264fc0d0d617dc9724d87233f222cead199be475d85574
                                  • Instruction Fuzzy Hash: 97C02B3300400C3F4F141DE3EC01C083F09C680330F105116F80C880D1CD32E8104284
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _doexit.LIBCMT ref: 004438DF
                                    • Part of subcall function 004437A7: __lock.LIBCMT ref: 004437B5
                                    • Part of subcall function 004437A7: __decode_pointer.LIBCMT ref: 004437EC
                                    • Part of subcall function 004437A7: __decode_pointer.LIBCMT ref: 00443801
                                    • Part of subcall function 004437A7: __decode_pointer.LIBCMT ref: 0044382B
                                    • Part of subcall function 004437A7: __decode_pointer.LIBCMT ref: 00443841
                                    • Part of subcall function 004437A7: __decode_pointer.LIBCMT ref: 0044384E
                                    • Part of subcall function 004437A7: __initterm.LIBCMT ref: 0044387D
                                    • Part of subcall function 004437A7: __initterm.LIBCMT ref: 0044388D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __decode_pointer$__initterm$__lock_doexit
                                  • String ID:
                                  • API String ID: 1597249276-0
                                  • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                  • Instruction ID: 8c597e9381f3e4681478f3a7e609c3c2dd390db9a537612fd936f7b197ce17f4
                                  • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                  • Instruction Fuzzy Hash: 9AB092B258024833EA202A82AC03F063A099BC0B64E244021BA0C191A1A9A3AA628089
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __make__time64_t
                                  • String ID:
                                  • API String ID: 1242165881-0
                                  • Opcode ID: 5f2446f3e75e43e2549ab1216d78344c9aed32879290253eb41c07f426e25a17
                                  • Instruction ID: efbcaa7826b508f521c1c106d03b44c379c6e901a1b4f6b5f4faef5199c7be49
                                  • Opcode Fuzzy Hash: 5f2446f3e75e43e2549ab1216d78344c9aed32879290253eb41c07f426e25a17
                                  • Instruction Fuzzy Hash: B4B0123315C30C2FD70065DBB447E8537EC87C8B24F200016B60C0B182DDA2F88041D9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _malloc.LIBCMT ref: 00412DA8
                                    • Part of subcall function 0043FF12: __FF_MSGBANNER.LIBCMT ref: 0043FF35
                                    • Part of subcall function 0043FF12: __NMSG_WRITE.LIBCMT ref: 0043FF3C
                                    • Part of subcall function 0043FF12: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 0043FF89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AllocateHeap_malloc
                                  • String ID:
                                  • API String ID: 501242067-0
                                  • Opcode ID: 3d0d7d1eaf54c32c0ebc4e3e3667cb3724648d5ccb301dde9a0e36464dddef47
                                  • Instruction ID: 1a581bbd53ef58e20bbefdeffcb45f31b34c61190c37555c0bf9c05164fdf762
                                  • Opcode Fuzzy Hash: 3d0d7d1eaf54c32c0ebc4e3e3667cb3724648d5ccb301dde9a0e36464dddef47
                                  • Instruction Fuzzy Hash: EDB012724082016A8504D694E28180AB7D89AD5310F10D80FF0558B450C634D0405601
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FreeLibrary.KERNELBASE(75750000), ref: 0041372D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID:
                                  • API String ID: 3664257935-0
                                  • Opcode ID: 31ce9b47fb0aa0890bdf1ef8aa290c7fe2bb6f0e41baec406883db4bd2b58e0a
                                  • Instruction ID: 01c4208cbd580f71e4534c40ca6320a4b20220a7ccb362821ef98604ad3037b9
                                  • Opcode Fuzzy Hash: 31ce9b47fb0aa0890bdf1ef8aa290c7fe2bb6f0e41baec406883db4bd2b58e0a
                                  • Instruction Fuzzy Hash: 16B012F0F003004B9E208F61EF48512329C5E447023000034A405C9290D668C540C51A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00406CC3
                                    • Part of subcall function 00401CEA: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00401CF2
                                    • Part of subcall function 00401CEA: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00401CFF
                                  • LoadIconW.USER32(00000000,00000065), ref: 00406CD3
                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406CE2
                                  • GetDlgItem.USER32(?,000003F3), ref: 00406CF4
                                  • GetDlgItem.USER32(?,000003F8), ref: 00406D02
                                  • GetDlgItem.USER32(?,000003F9), ref: 00406D10
                                  • GetDlgItem.USER32(?,000003F4), ref: 00406D1E
                                  • GetDlgItem.USER32(?,000003F7), ref: 00406D2C
                                  • GetDlgItem.USER32(?,000003F5), ref: 00406D3A
                                  • GetDlgItem.USER32(?,000003F6), ref: 00406D48
                                  • GetDlgItem.USER32(?,000003F0), ref: 00406D56
                                  • GetDlgItem.USER32(?,000003F1), ref: 00406D60
                                  • GetDlgItem.USER32(?,00000001), ref: 00406D6B
                                  • GetDlgItem.USER32(?,00000002), ref: 00406D76
                                  • GetDlgItem.USER32(?,000003EE), ref: 00406D84
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • SetWindowTextW.USER32(00000000,?), ref: 00406DBA
                                  • SetWindowTextW.USER32(?,?), ref: 00406E15
                                  • SetWindowTextW.USER32(?,?), ref: 00406E68
                                  • SetWindowTextW.USER32(?,?), ref: 00406EBE
                                  • SetWindowTextW.USER32(?,?), ref: 00406F14
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00406F40
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00406F57
                                  • _memset.LIBCMT ref: 00406FDB
                                  • FindFirstFileW.KERNEL32(?,?), ref: 00407000
                                  • FindClose.KERNEL32(00000000), ref: 00407010
                                  • _memset.LIBCMT ref: 0040702C
                                  • PathCompactPathExW.SHLWAPI(?,?,00000028,00000000), ref: 00407054
                                  • SetWindowTextW.USER32(?,?), ref: 0040706D
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040709F
                                  • SetWindowTextW.USER32(?,?), ref: 004070F9
                                  • SetWindowTextW.USER32(?,?), ref: 0040717F
                                    • Part of subcall function 00408774: __EH_prolog3.LIBCMT ref: 0040877B
                                  • SetWindowTextW.USER32(?,?), ref: 004071B5
                                  • SetWindowTextW.USER32(?,?), ref: 004071F8
                                  • _memset.LIBCMT ref: 0040720F
                                  • SHGetFileInfoW.SHELL32(?,00000080,?,000002B4,00000110), ref: 00407243
                                  • SendMessageW.USER32(?,00000170,?,00000000), ref: 00407262
                                  • SendMessageW.USER32(?,00000170,?,00000000), ref: 00407273
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Item$TextWindow$CriticalSection_memset$MessageSend$EnterFileFindH_prolog3_LeaveLoadPath$CloseCompactFirstH_prolog3IconInfoStringUnothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: Bytes
                                  • API String ID: 328566721-1326914
                                  • Opcode ID: 9235e05318675b7cea0da11fbe74813e13f04a300322290abfb859ff0bc44c09
                                  • Instruction ID: bf847a3ee0ce42f486f1f3a90aee798fd34bd8879b5813f3168fd9c1e0ec1f4b
                                  • Opcode Fuzzy Hash: 9235e05318675b7cea0da11fbe74813e13f04a300322290abfb859ff0bc44c09
                                  • Instruction Fuzzy Hash: 61023770D41229AADF21AB61CD49BDDBBB8EF04304F4041EAE50CB6191CB786F84CF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00406770
                                  • GetDlgItem.USER32(?,00000F03), ref: 00406783
                                  • _memset.LIBCMT ref: 004067A3
                                  • GetWindowTextW.USER32(00000000,?,00000104), ref: 004067B8
                                    • Part of subcall function 00408837: __EH_prolog3_GS.LIBCMT ref: 0040883E
                                    • Part of subcall function 004088F2: __EH_prolog3_GS.LIBCMT ref: 004088F9
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000010), ref: 0040682B
                                  • FindFirstFileW.KERNEL32(?,?,?,?), ref: 00406870
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000010), ref: 004068A9
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • FindClose.KERNEL32(00000000), ref: 004068ED
                                  • EndDialog.USER32(?,00000001), ref: 0040692F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_$FindMessage_memset$CloseDialogFileFirstItemLoadStringTextWindow
                                  • String ID: ALZip Self-Extractor
                                  • API String ID: 3135845946-1641417939
                                  • Opcode ID: a4c00ae34c456c4ed6b02c6a0a6ce953e3545696c82d9a7fcb5f90333d5686c8
                                  • Instruction ID: 7d57515e92b6c25296cbaaa10012aec84157dc421e88131edcf864bf4bf7d004
                                  • Opcode Fuzzy Hash: a4c00ae34c456c4ed6b02c6a0a6ce953e3545696c82d9a7fcb5f90333d5686c8
                                  • Instruction Fuzzy Hash: E0514B759422289EDB20EB608C89BEDB778AF04305F5040EAF609B7191DB785F89CF59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00404219
                                  • _memset.LIBCMT ref: 00404294
                                  • FindFirstFileW.KERNEL32(?,?), ref: 004042B0
                                  • RemoveDirectoryW.KERNEL32(?), ref: 004042CE
                                    • Part of subcall function 0040444A: std::_String_base::_Xlen.LIBCPMT ref: 00404459
                                    • Part of subcall function 00404493: _wcslen.LIBCMT ref: 00404498
                                  • GetFileAttributesW.KERNEL32(?,00000001,00000000,00000001,00000000,00000000,?,?,?,00000300,0040267D,?), ref: 004043AD
                                  • FindNextFileW.KERNEL32(?,?,00000001,00000000,?), ref: 00404408
                                  • FindClose.KERNEL32(?), ref: 0040441C
                                  • RemoveDirectoryW.KERNEL32(?), ref: 0040442F
                                    • Part of subcall function 0040369B: __EH_prolog3.LIBCMT ref: 004036A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: FileFind$DirectoryRemove$AttributesCloseFirstH_prolog3H_prolog3_NextString_base::_Xlen_memset_wcslenstd::_
                                  • String ID: *.*
                                  • API String ID: 832431637-438819550
                                  • Opcode ID: ce21df8e5576fd34ef4a36903495d80559331262bbf23cb017709f30d971612f
                                  • Instruction ID: 74036f60185010c92b8a47986787845e5613c85ad450f19c05f25c60527f7168
                                  • Opcode Fuzzy Hash: ce21df8e5576fd34ef4a36903495d80559331262bbf23cb017709f30d971612f
                                  • Instruction Fuzzy Hash: AE616C71E012189ADF10EBA5CC89BDEB7B8AF45305F1040AAFA05B72D1C7786A45CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,F14CC7D6), ref: 0042FCDA
                                  • GetLastError.KERNEL32 ref: 0042FCE5
                                  • FindClose.KERNEL32(00000000), ref: 0042FCF8
                                  • SHGetFileInfoW.SHELL32(?,?,?,000002B4,00004411), ref: 0042FD15
                                  • SHGetFileInfoW.SHELL32(?,?,?,000002B4,00004010), ref: 0042FE33
                                  • SHGetFileInfoW.SHELL32(?,?,?,000002B4,00004012), ref: 0042FE59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$Info$Find$CloseErrorFirstLast
                                  • String ID:
                                  • API String ID: 3972267499-3916222277
                                  • Opcode ID: 9cff7d4aa46710cd2c20694d721ff8b2f22585ab5a33c84ffd0904086f528063
                                  • Instruction ID: 24ceacf2916b62a918343cff41ad82f66889dc8a89366416d4a68181084d757b
                                  • Opcode Fuzzy Hash: 9cff7d4aa46710cd2c20694d721ff8b2f22585ab5a33c84ffd0904086f528063
                                  • Instruction Fuzzy Hash: 2A517E716043409FDB249F58D88565BBBF4BF85304F80453EEE459A2A2E739D844CB46
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsDebuggerPresent.KERNEL32 ref: 004428C0
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004428D5
                                  • UnhandledExceptionFilter.KERNEL32(004553D4), ref: 004428E0
                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 004428FC
                                  • TerminateProcess.KERNEL32(00000000), ref: 00442903
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                  • String ID:
                                  • API String ID: 2579439406-0
                                  • Opcode ID: 6aad4009946f0461cbd50b314a273999e87589421552d71372112305a5f450e8
                                  • Instruction ID: bce4df15b308b61989174c39faf604124cb5e7e66fcbf03aacbc4256ba133020
                                  • Opcode Fuzzy Hash: 6aad4009946f0461cbd50b314a273999e87589421552d71372112305a5f450e8
                                  • Instruction Fuzzy Hash: C621CDB58017049FD720EF6AE9856683BE0FB48346F50103AE48997262F7F498809F5E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: d1222ff7b05bd1d85a8e20612f39eab23f734433b10b25448e75119ba63599a8
                                  • Instruction ID: 8d8d46e8a4138d773720769f1d5324dcce76c05ccf3b04a1af37464759a6e130
                                  • Opcode Fuzzy Hash: d1222ff7b05bd1d85a8e20612f39eab23f734433b10b25448e75119ba63599a8
                                  • Instruction Fuzzy Hash: 69314531201A26AFC715CB39C981A96FBE8FF1D714B41162AE458CBA41D734F560CBD8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  • invalid distance code, xrefs: 0040FE74
                                  • invalid distance too far back, xrefs: 0040FE6B
                                  • invalid literal/length code, xrefs: 0040FE8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                                  • API String ID: 0-3255898291
                                  • Opcode ID: 81e57cecd3775283745c621f47db997db9ca0950d0e60b86b6622ca45e9364b2
                                  • Instruction ID: 85ab08be457f6e4083eebb1b14389514e9d4246d47f23fa867d33ba9ed698ce7
                                  • Opcode Fuzzy Hash: 81e57cecd3775283745c621f47db997db9ca0950d0e60b86b6622ca45e9364b2
                                  • Instruction Fuzzy Hash: 9AF15830908649DBCB1CCF59D0A05BDBBB2FF89314B24C1AED4566BB85C7386A49CF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: 4491824a45e4f2830902aea4bb3117d5ef3e502b8a73b53f24b6dd24d03efd05
                                  • Instruction ID: d832d85a6de6ff78fd26617c4231156f5e8d58e8e86471408de1ac2d32f41610
                                  • Opcode Fuzzy Hash: 4491824a45e4f2830902aea4bb3117d5ef3e502b8a73b53f24b6dd24d03efd05
                                  • Instruction Fuzzy Hash: AB715073A4A7829FC329CE6950800CAFFE2AF76111B54CA5EC4D693B43D170A61DCBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: 88eeb93891ae17a847663ab31721939bf60c68630b89fcb198b6b199ec170965
                                  • Instruction ID: 9a50006d6cad3f94e99b54735d9462dc4d335730d27e50b218e1d89611be95d3
                                  • Opcode Fuzzy Hash: 88eeb93891ae17a847663ab31721939bf60c68630b89fcb198b6b199ec170965
                                  • Instruction Fuzzy Hash: 41413075D09289AFCB05CBB988919FEFFB1AF6A200F4880D9D485B7352C2749604CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000800,00001004,?,0000007F), ref: 0041F124
                                    • Part of subcall function 0043F557: __wcstoi64.LIBCMT ref: 0043F54D
                                    • Part of subcall function 0041F168: _memset.LIBCMT ref: 0041F1C3
                                    • Part of subcall function 0041F168: _memset.LIBCMT ref: 0041F1D2
                                    • Part of subcall function 0041F168: _memset.LIBCMT ref: 0041F1E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset$InfoLocale__wcstoi64
                                  • String ID:
                                  • API String ID: 2822703429-0
                                  • Opcode ID: 158d38ff4b525a0fd99f45b2c0d7d5790e2f4b7cca7c2ecd90e5b10c85a88c8a
                                  • Instruction ID: 89e4e89a59ac48358f3d9c61824a73b98b8af0e17fe2c57a71af1809499820c5
                                  • Opcode Fuzzy Hash: 158d38ff4b525a0fd99f45b2c0d7d5790e2f4b7cca7c2ecd90e5b10c85a88c8a
                                  • Instruction Fuzzy Hash: 51F05E70945709AFE790DF759C06BEA77E8BB08704F50047EE58ADB181EAB4A9848F48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00049951), ref: 00449998
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 218f6063d97dc7998e4b0a3b0a53717a33ce01ae7fa99cfa9e5cebbb5e9a1d1b
                                  • Instruction ID: 7bf4760ad657c9bae1e3ab7c8bb625575873ab174034395021eca63b57dcc3aa
                                  • Opcode Fuzzy Hash: 218f6063d97dc7998e4b0a3b0a53717a33ce01ae7fa99cfa9e5cebbb5e9a1d1b
                                  • Instruction Fuzzy Hash: 0B9002B1655A01465A5027716D19B1B2DD05B5C61775204656041C8156DA94C4007559
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3916222277
                                  • Opcode ID: 8f1cc1eaa6e63c68907c6d623f3496c1ca375fa78b51d1c34e072803b69f63eb
                                  • Instruction ID: 83f626478f620c76d0d527450d17edf3268bf0a98e779e0e5228a00bb0fdc727
                                  • Opcode Fuzzy Hash: 8f1cc1eaa6e63c68907c6d623f3496c1ca375fa78b51d1c34e072803b69f63eb
                                  • Instruction Fuzzy Hash: 39711632A1465287D718CF6EFCC050773A3EBD9342758CA35EE44C7266D674EA62C68C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 555cc2260394dce53b1381149b840c2c64056a8de71af9d029991dd1bc17966d
                                  • Instruction ID: 0ea362550cb6ee687708f52164db9714a835fdeb3b388311c3284555319d6571
                                  • Opcode Fuzzy Hash: 555cc2260394dce53b1381149b840c2c64056a8de71af9d029991dd1bc17966d
                                  • Instruction Fuzzy Hash: 609264B5E00604AFDB58DBB5C896AAFB7F8EF4C304F41485EA566DB241DA74BA00CB14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35b0359ed3682bd85d1e95683f2e7bfd9f3bc482f4764e967dbccd6c2b94006c
                                  • Instruction ID: 1d39b6c76f43a9248b48d8eb5423483ed93aa2ddf0bd25e623fd483dad1dd039
                                  • Opcode Fuzzy Hash: 35b0359ed3682bd85d1e95683f2e7bfd9f3bc482f4764e967dbccd6c2b94006c
                                  • Instruction Fuzzy Hash: 22927335D102798BDB0CCF55E89046EB7B2EB8A342B9F456EC64137296CA34B911CFE4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de3963b79fd19f1430a32af9f1b6903dff41cbe1bbf30dc8d8e599cb1df13827
                                  • Instruction ID: 434bc25f6e20fef7ff6ec8ee8ee08d97e2bee786d6ef12fbe28f7397306eac13
                                  • Opcode Fuzzy Hash: de3963b79fd19f1430a32af9f1b6903dff41cbe1bbf30dc8d8e599cb1df13827
                                  • Instruction Fuzzy Hash: 6692F6B092025ACFDB48CF69D4A06AEFBF0FB49341B460A7ED145EB652D7349A50CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b2f6d459dc612497b8a5a027438922c0d3c36c343cd9962e5cd61e594cc1b75
                                  • Instruction ID: 6b22a096d91831ac95758970bb805bb30e1337e591af1fa201c878f9d89ddd16
                                  • Opcode Fuzzy Hash: 7b2f6d459dc612497b8a5a027438922c0d3c36c343cd9962e5cd61e594cc1b75
                                  • Instruction Fuzzy Hash: D682D875D00609EFDB18EFF5C999AAFBBB1FF48304F00895EA466A7251DB35A600DB04
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                  • Instruction ID: 9709679a9d7268e12eeb8792fe2fe3a6b10c17e863c2f671e39c5f2c97ebfbc4
                                  • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                  • Instruction Fuzzy Hash: 2DD19F73C0A9F30A9735812E44A823BEE626FC174132EC7E6CDD43F399D22A5D6195D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                  • Instruction ID: a78cc35cc9a4b6dad3d9da5fc7f0069d826abb50dc59cc9f2fad861cde678d33
                                  • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                  • Instruction Fuzzy Hash: 1FD1A173C0A9B30AA735812D50A823BEE626FD175132FC7E6CCD43F399D22A9D5185D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b43d5901d12017e2b3a7b99ebad0eac7f9da094789f82637c4a4d38607ac9f4
                                  • Instruction ID: ccb4b062690ac05c09b56ba7575a535ccef73d1156c9d8e97da8886fbdea227b
                                  • Opcode Fuzzy Hash: 0b43d5901d12017e2b3a7b99ebad0eac7f9da094789f82637c4a4d38607ac9f4
                                  • Instruction Fuzzy Hash: 5FE19D71900259CBCF19CF28C4906FE7BF2FF94304F14816AE9569B3A0E7389995CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                  • Instruction ID: 1aacb2c0926f30c9b83ed2bddc87643d69e49ed21b843a6c05a35531a867e18d
                                  • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                  • Instruction Fuzzy Hash: ACC1A073C0A9B30AA736812D409823BEE626FD174132FC7E6CCD43F399923A5D6185D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                  • Instruction ID: 3f263a61a8fce33d7e83803a541c148df2a421d6f33e9331a612a614fe3af307
                                  • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                  • Instruction Fuzzy Hash: 40C1B273D0A9B30A9735822D409823BEE626FD174032EC7E6CDE43F389D63A9C6595D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebfc32db5714170dcda5b8b766f0e9e89a9549f6ee237d10d0f28e70dca73033
                                  • Instruction ID: be11005d6e181980f37f9beddc807430705feb298e64d130538f987c6147088b
                                  • Opcode Fuzzy Hash: ebfc32db5714170dcda5b8b766f0e9e89a9549f6ee237d10d0f28e70dca73033
                                  • Instruction Fuzzy Hash: 28D10F36600B408FD334DF29C480AA6B3E1BF89704B64493ED9D697BA1D779F84ACB04
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f0b272695f3f9c5c7e5c0504678aa6f1356f260b6d75b4870e8fc24132dbc03
                                  • Instruction ID: 98a2b415a2812cbfc23a66633ec2d0e48ce371664962df747a949b53b067225a
                                  • Opcode Fuzzy Hash: 1f0b272695f3f9c5c7e5c0504678aa6f1356f260b6d75b4870e8fc24132dbc03
                                  • Instruction Fuzzy Hash: A2D1BC2940D7C1ADCB068F7840A44EBFFF06D6F200F4D65D9E8E44A707C214D616EBA6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef0ac9906b8a9d59372085cb4554bc23967648cf0504491a43c630b6657a5dbd
                                  • Instruction ID: aa5b0f6423530939324f38dd1bc89b3007b2455ed8155981c14bd54b9c52a788
                                  • Opcode Fuzzy Hash: ef0ac9906b8a9d59372085cb4554bc23967648cf0504491a43c630b6657a5dbd
                                  • Instruction Fuzzy Hash: 827138319012899BCF01DEB8C9805EFBBB5AF8D304F25266BE851E7242D739EE05C759
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38b062ce0ff60de56ce906bd5ebb968a2f8ec28e3a68abcccbb960ffebc893af
                                  • Instruction ID: 4b8d2d0da7266f6937df6c6be015438cb1d0304045ea5f48937bccb7911d6291
                                  • Opcode Fuzzy Hash: 38b062ce0ff60de56ce906bd5ebb968a2f8ec28e3a68abcccbb960ffebc893af
                                  • Instruction Fuzzy Hash: 4E71083290068AABCF11DEB8C9805EF7B75AF4D304F24196BEC51A7282D779CE05C75A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a65e7324bbbbfc0b52ed691ace2cc65dd49b54854b9e7afc48327dd70ec78139
                                  • Instruction ID: 5e7294333f477b804e9ec30b783f224519550215e6bf4c6c9c58aa1c8ea85f85
                                  • Opcode Fuzzy Hash: a65e7324bbbbfc0b52ed691ace2cc65dd49b54854b9e7afc48327dd70ec78139
                                  • Instruction Fuzzy Hash: 0671263190128D9BCF01EEB8C9815EFBBB5EF8D314F24156BE841E3242D639AE05C759
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64a577377ac23ca529bd620e6379afe292692ca16f49098dfdf3a39997da5159
                                  • Instruction ID: f49662a70ae25c1259590c5bb00ca8841102100187d5892ba42928d44c6f4cb8
                                  • Opcode Fuzzy Hash: 64a577377ac23ca529bd620e6379afe292692ca16f49098dfdf3a39997da5159
                                  • Instruction Fuzzy Hash: 5F71373190128D9BCF05DEB8C9815EFBBB5AF4D304F24156AE840E7242DBB9CE45CB56
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2410d9a9f52ec003b747a12593d9ea2cee68fdf4627e60d74de2653c326ec32f
                                  • Instruction ID: 02372268bce5262512ca4ae69c05a43378eefff299d530113c6cb3471bf619a4
                                  • Opcode Fuzzy Hash: 2410d9a9f52ec003b747a12593d9ea2cee68fdf4627e60d74de2653c326ec32f
                                  • Instruction Fuzzy Hash: 2E919CB59187429FCB50CF29C580A4AFBE0FF8D314F51892EF898DB601D734E9548B86
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 782b640763aecf61fdb28d26229673e903dfe332e084ba1cf879ba77e25c2265
                                  • Instruction ID: 71cf7b6caa16897f969470ec2b6dcf675b019a00bb0cef7ca218a68a4f6660b9
                                  • Opcode Fuzzy Hash: 782b640763aecf61fdb28d26229673e903dfe332e084ba1cf879ba77e25c2265
                                  • Instruction Fuzzy Hash: 7D617F66C2DBD24EC343DA3A94510A6FBE04DF7090F44D78BF8E472992F352D28A5722
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55bbab22f4817f380e48feb74b05980617678219eb44f21fa453d019c3b6e2e7
                                  • Instruction ID: f510a3c54e2bfe20a7beb0bbc5a6e903c4065d25837658b4ab61c926df4bd5e1
                                  • Opcode Fuzzy Hash: 55bbab22f4817f380e48feb74b05980617678219eb44f21fa453d019c3b6e2e7
                                  • Instruction Fuzzy Hash: 1F51B426D096899EDB01CB68C4D17DEBF729F6B208F5460C4C49817393D1B6620EEB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5592c564dba602920f734b6d66cdcd49e880bd8f20ca1b0d995223d6a7a6a749
                                  • Instruction ID: db09df9654c9aecaaac5eee5829dfaaf2d568e6c958dcfa07b2ea1ffb0708cb4
                                  • Opcode Fuzzy Hash: 5592c564dba602920f734b6d66cdcd49e880bd8f20ca1b0d995223d6a7a6a749
                                  • Instruction Fuzzy Hash: 7651F6B2D01618EFDB08CF89D88469DF7B2FF88315F6685AAC8157B351C770AA41CB84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44d32de274c38e4dd627e5d8a01ebd0d1377500f4655278076547727d296c24e
                                  • Instruction ID: 8c87d3f79eb901cd832319f2f6190220ac6bfa4eb4b4c645c4f475ed919c806e
                                  • Opcode Fuzzy Hash: 44d32de274c38e4dd627e5d8a01ebd0d1377500f4655278076547727d296c24e
                                  • Instruction Fuzzy Hash: C141DEB190021A9FDB14DFA8C5809AEFBF0FF0C314F14856AE815AB241D738EA51CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: ec9d0a18f84cad21bcc784ad98a91078f682d559ffa01dd8b15fa92ca04a6485
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: FA115BF724518243F604863EC9B46B7E796EBC632072C437BC3428B759C23AE9759908
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c1e56738578b916c3618c14c2a1d8ef0f7e358f729908a17fe76b9a0c2a5fd6
                                  • Instruction ID: 66b8a1276f8831be9867de1ed29f8991741a5ea0703c6a397c0c87422595cc58
                                  • Opcode Fuzzy Hash: 8c1e56738578b916c3618c14c2a1d8ef0f7e358f729908a17fe76b9a0c2a5fd6
                                  • Instruction Fuzzy Hash: 91F08C72C483499ACB149F6C84016DEBBE4AF09308F44809AC8DAE3341C236E507CB25
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetDlgItem.USER32(?,000003F2), ref: 00406A79
                                  • _memset.LIBCMT ref: 00406A93
                                  • GetWindowTextW.USER32(00000000,?,00000104), ref: 00406AA6
                                  • EndDialog.USER32(?,00000001), ref: 00406ABC
                                  • GetDlgItem.USER32(?,000003F0), ref: 00406AD5
                                  • GetDlgItem.USER32(?,000003FA), ref: 00406AE1
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00406B07
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00406B1C
                                  • _memset.LIBCMT ref: 00406B36
                                  • PathCompactPathExW.SHLWAPI(?,?,00000028,00000000), ref: 00406B56
                                  • SetWindowTextW.USER32(?,?), ref: 00406B6B
                                  • SetWindowTextW.USER32(?,?), ref: 00406B8F
                                  • LoadIconW.USER32(00000000,00000065), ref: 00406B99
                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406BAA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ItemTextWindow$CriticalPathSection_memset$CompactDialogEnterIconLeaveLoadMessageSend
                                  • String ID:
                                  • API String ID: 4128035061-0
                                  • Opcode ID: 85fae9f679e42022cc7b8c32624fbdd38ada88dc68eaa6955dcd9d2b6cb034ca
                                  • Instruction ID: f092478ec133c74487e4ca1871de8ee24f511d73ebb376b8360eb1aca4963b8b
                                  • Opcode Fuzzy Hash: 85fae9f679e42022cc7b8c32624fbdd38ada88dc68eaa6955dcd9d2b6cb034ca
                                  • Instruction Fuzzy Hash: D951B071908344AFC710DF64DC49A6FBBE8FB88715F00092EF545A72A1DB78E9048B9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040BDCB
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040BE0E
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                  • __aulldiv.LIBCMT ref: 0040BE18
                                  • ~_Task_impl.LIBCPMT ref: 0040BFDA
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0040BE99
                                  • ~_Task_impl.LIBCPMT ref: 0040BEBE
                                  • __aulldvrm.LIBCMT ref: 0040BED9
                                  • ~_Task_impl.LIBCPMT ref: 0040BEF3
                                  • ~_Task_impl.LIBCPMT ref: 0040BF2C
                                  • ~_Task_impl.LIBCPMT ref: 0040BF6D
                                  • ~_Task_impl.LIBCPMT ref: 0040BF78
                                  • ~_Task_impl.LIBCPMT ref: 0040BFC0
                                  • ~_Task_impl.LIBCPMT ref: 0040BFCE
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternalTask_impl$H_prolog3$BaseBase::~Concurrency::details::$__aulldiv__aulldvrm
                                  • String ID:
                                  • API String ID: 3645425728-0
                                  • Opcode ID: 461e82d39eb494737a39b010787dd2f6fe6b97edc756c7a2ccbf645fd06dabcb
                                  • Instruction ID: 6de5cf7d8f169f5145afff4ccc3840ea33d4ba513d7e0b6e486be0f03897002f
                                  • Opcode Fuzzy Hash: 461e82d39eb494737a39b010787dd2f6fe6b97edc756c7a2ccbf645fd06dabcb
                                  • Instruction Fuzzy Hash: 03716C70805248EACB11EBE5C981ADEFBB5AF14304F64816FF504B3281DB785A45CBAE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,004649B8,0000000C,00442FC4,00000000,00000000,?,00443470,?,00000001,?,?,00446906,00000018,00464B88,0000000C), ref: 00442E9B
                                  • __crt_waiting_on_module_handle.LIBCMT ref: 00442EA6
                                    • Part of subcall function 00443633: Sleep.KERNEL32(000003E8,?,?,00442DAF,KERNEL32.DLL,?,00442E1B,?,0043E811), ref: 0044363F
                                    • Part of subcall function 00443633: GetModuleHandleW.KERNEL32(?,?,?,00442DAF,KERNEL32.DLL,?,00442E1B,?,0043E811), ref: 00443648
                                  • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00442ECF
                                  • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00442EDF
                                  • __lock.LIBCMT ref: 00442F01
                                  • InterlockedIncrement.KERNEL32(0046A2B0), ref: 00442F0E
                                  • __lock.LIBCMT ref: 00442F22
                                  • ___addlocaleref.LIBCMT ref: 00442F40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                  • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                  • API String ID: 1028249917-2843748187
                                  • Opcode ID: 0ee181e5ec4e5ed518102d560495f94ee81f1bc0b3d93605128046e1148690b0
                                  • Instruction ID: d98a1fd25723ecff8a28b201bf586ab88bace2cf1470f18d9060b409fab193c1
                                  • Opcode Fuzzy Hash: 0ee181e5ec4e5ed518102d560495f94ee81f1bc0b3d93605128046e1148690b0
                                  • Instruction Fuzzy Hash: D0118470801B019FE710AF2AD90175BBBF0AF04715F50445FE499962A1CBB89645CF5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040514D
                                  • KillTimer.USER32(?,00000000,0000004C,00405042), ref: 00405156
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00405162
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00405171
                                  • SetWindowTextW.USER32(00000000,?), ref: 004051A3
                                  • EnableWindow.USER32(?,00000001), ref: 004051AC
                                  • GetDlgItem.USER32(?,000003F0), ref: 00405183
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                  • GetDlgItem.USER32(?,000003F0), ref: 004051CD
                                  • SetWindowTextW.USER32(00000000,?), ref: 004051F0
                                  • EnableWindow.USER32(?,00000001), ref: 004051F9
                                  • PostMessageW.USER32(?,00000111,00000001,00000000), ref: 00405210
                                  • SetTimer.USER32(?,00000000,0000012C,00000000), ref: 00405237
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Window$CriticalEnableH_prolog3_ItemSectionTextTimer$EnterKillLeaveLoadMessagePostString_memset
                                  • String ID:
                                  • API String ID: 2605397802-0
                                  • Opcode ID: b5b8b419dd4f3ee970db8cfb15c1bf262541a38d3a34cfd078c17e6e35712af9
                                  • Instruction ID: 16fea842b008bdfeee44fa9a073261e3484eaa77f7e59c747711c610d908faab
                                  • Opcode Fuzzy Hash: b5b8b419dd4f3ee970db8cfb15c1bf262541a38d3a34cfd078c17e6e35712af9
                                  • Instruction Fuzzy Hash: 44218735D40604AFDB00ABE0AD99ABE7778EF05706F404439F601BA1D2C7B85D458F6E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_
                                  • String ID: pE$%APPDATA%$%DESKTOP%$%DESTDIR%$%HOMEPATH%$%PROGRAMFILES%$%TEMP%$%WINDIR%
                                  • API String ID: 2427045233-3388569860
                                  • Opcode ID: 10d8dd5ba57f96f657827178c115a8450af75288e3ab89f1313012d3903199e1
                                  • Instruction ID: 89812509410923b3798fdaa3b04139db37778d273e4b341b02cc58df668162e3
                                  • Opcode Fuzzy Hash: 10d8dd5ba57f96f657827178c115a8450af75288e3ab89f1313012d3903199e1
                                  • Instruction Fuzzy Hash: AFF18D719012589ADF20DBA1CD45BDEB774AF05308F1441EAF608B72D2DAB86F84CF96
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040664F
                                  • _memset.LIBCMT ref: 0040666D
                                  • _memset.LIBCMT ref: 0040667F
                                    • Part of subcall function 004024CE: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 004024D8
                                    • Part of subcall function 004024CE: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 004024F1
                                  • _memset.LIBCMT ref: 004066BB
                                    • Part of subcall function 00401CEA: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00401CF2
                                    • Part of subcall function 00401CEA: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00401CFF
                                  • LoadStringW.USER32(00000000,000000A8,?,00000208), ref: 004066D6
                                  • 75FED0D0.COMDLG32 ref: 00406725
                                  • GetDlgItem.USER32(?,00000F03), ref: 00406736
                                  • SetWindowTextW.USER32(00000000,?), ref: 00406743
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalSection$_memset$EnterLeave$H_prolog3_ItemLoadStringTextWindow
                                  • String ID: X
                                  • API String ID: 3999395921-3081909835
                                  • Opcode ID: ce6e4a428c0df159699edc2dd0f99c0cd412995fb6a3aeab0a08714258333dbd
                                  • Instruction ID: c97d7f9073ee2c6895bed41939ac1db2a69f451b9010f98ed15bd42601f2c2e4
                                  • Opcode Fuzzy Hash: ce6e4a428c0df159699edc2dd0f99c0cd412995fb6a3aeab0a08714258333dbd
                                  • Instruction Fuzzy Hash: 92219EB1D002289FDB10AF60CC49BCEB7B9AB84309F4045EAB508B3181D7799B948F54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset
                                  • String ID:
                                  • API String ID: 2102423945-0
                                  • Opcode ID: e74f58f76886b05d90e4de47fdddef4d4ce7cb6818af22895a9ccaa3cc75b48b
                                  • Instruction ID: 2b35144b6b4bb8a75dba9fa44d05cbf8526f3da09ce7a91c1a8180991dcf3ab7
                                  • Opcode Fuzzy Hash: e74f58f76886b05d90e4de47fdddef4d4ce7cb6818af22895a9ccaa3cc75b48b
                                  • Instruction Fuzzy Hash: B951B171910649ABD720DEB58C81BEBB7ECAF1C348F04081EF5E697281D2B8BA408765
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  • |exe|com|scr|pif|pat|cmd|dll|, xrefs: 0041FDD0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _wcslen$_wcsrchr$H_prolog3__wcscpy
                                  • String ID: |exe|com|scr|pif|pat|cmd|dll|
                                  • API String ID: 1207094621-1584199541
                                  • Opcode ID: 5f9dad6d220327f0ff555e867992245958084ba1485de8b35e9d00cd3b8f9b85
                                  • Instruction ID: 868d4d8cd7acafc5a32821e89b1a2875270b5fa065d1683ef6b37312e2cb0964
                                  • Opcode Fuzzy Hash: 5f9dad6d220327f0ff555e867992245958084ba1485de8b35e9d00cd3b8f9b85
                                  • Instruction Fuzzy Hash: 74418332C00219ABDF14ABA5ED42ADEB7B8EF04318F24402BF511B71B1EB789945CB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0042E9E8
                                  • _memset.LIBCMT ref: 0042EA2B
                                    • Part of subcall function 004013B7: _wcslen.LIBCMT ref: 004013BE
                                  • swprintf.LIBCMT ref: 0042EA53
                                    • Part of subcall function 0044079E: __vswprintf_s_l.LIBCMT ref: 004407B2
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,0046027C), ref: 0042EA77
                                  • OpenEventW.KERNEL32(00100000,00000001,00000000,?,?,?,0046027C), ref: 0042EA88
                                  • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0046027C), ref: 0042EA97
                                  • OpenEventW.KERNEL32(00100000,00000001,00000000,?,?,?,0046027C), ref: 0042EAA8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Event$CreateOpen$H_prolog3___vswprintf_s_l_memset_wcslenswprintf
                                  • String ID: Anti_%s
                                  • API String ID: 3896401880-1099802867
                                  • Opcode ID: 35a71c8ed71cea3297d429245cedaeed057e36c69503f9a87de2d867024ed752
                                  • Instruction ID: 0cf8a383aeb7055d5f396e25c6cb79881359ae267809a1945403a7cdfd78cb12
                                  • Opcode Fuzzy Hash: 35a71c8ed71cea3297d429245cedaeed057e36c69503f9a87de2d867024ed752
                                  • Instruction Fuzzy Hash: 5C21D8B1940319BEEB00EF718CC5BDA7668BF18708F10846BF604B71D1E7B89D844B94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __wcsicoll
                                  • String ID: .bat$.lnk$.pif$.scr
                                  • API String ID: 3832890014-3858101065
                                  • Opcode ID: c23e03f286416fbad75b508e0ed0ccd60f084649aab64887b9fb8e1ceb0fe53c
                                  • Instruction ID: b5db54f6088c41b32f7b9a11ec371a4bcd0c7c97d380799355ade207b1382448
                                  • Opcode Fuzzy Hash: c23e03f286416fbad75b508e0ed0ccd60f084649aab64887b9fb8e1ceb0fe53c
                                  • Instruction Fuzzy Hash: 22019E3114A74A84F235613459AABEBAAC47B92718F24003FDCDB41291FB6C64AB604E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040C6E3
                                  • ~_Task_impl.LIBCPMT ref: 0040C75B
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 00416A64: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416AC4
                                    • Part of subcall function 00416A64: ~_Task_impl.LIBCPMT ref: 00416AE1
                                  • ~_Task_impl.LIBCPMT ref: 0040C7CD
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                  • ~_Task_impl.LIBCPMT ref: 0040C7C1
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • ~_Task_impl.LIBCPMT ref: 0040C961
                                  • ~_Task_impl.LIBCPMT ref: 0040C74F
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 0040C815
                                  • ~_Task_impl.LIBCPMT ref: 0040C821
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040C96D
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175E0
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175FC
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$BaseBase::~Concurrency::details::$H_prolog3$H_prolog3_
                                  • String ID:
                                  • API String ID: 1485957940-0
                                  • Opcode ID: 42a01046490967c14964673164fcbb36c39b4e5e7a7f6876bd072d9932d0f288
                                  • Instruction ID: eff41e0ae5b12a3ab500ca653aa4a7a0763c201d7cb7ede61860280d69d82ecd
                                  • Opcode Fuzzy Hash: 42a01046490967c14964673164fcbb36c39b4e5e7a7f6876bd072d9932d0f288
                                  • Instruction Fuzzy Hash: 02916F71801209EFCF01EF94C491BEDBBB5BF18304F14416AE9057B292DB78AA85DF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040C2CA
                                  • ~_Task_impl.LIBCPMT ref: 0040C342
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 00416A64: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416AC4
                                    • Part of subcall function 00416A64: ~_Task_impl.LIBCPMT ref: 00416AE1
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175E0
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175FC
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0040C3AB
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                  • ~_Task_impl.LIBCPMT ref: 0040C39F
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • ~_Task_impl.LIBCPMT ref: 0040C336
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 0040C402
                                  • ~_Task_impl.LIBCPMT ref: 0040C40E
                                  • ~_Task_impl.LIBCPMT ref: 0040C4F9
                                  • ~_Task_impl.LIBCPMT ref: 0040C505
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$BaseBase::~Concurrency::details::H_prolog3
                                  • String ID:
                                  • API String ID: 3832468939-0
                                  • Opcode ID: 3f181a0e94a657a32aefcc87af5c7c2d8eda59962f08b2d2a8a1af005701e768
                                  • Instruction ID: 04552d86dac3943a131ee1038ee3aad7a785cb4708231961ba9ebeaa31e15916
                                  • Opcode Fuzzy Hash: 3f181a0e94a657a32aefcc87af5c7c2d8eda59962f08b2d2a8a1af005701e768
                                  • Instruction Fuzzy Hash: 7671C370805248DECF10EFA4C1957EDBBB4AF18308F54806EE8457B282DB789F49DB69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040C0AB
                                    • Part of subcall function 00416A64: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416AC4
                                    • Part of subcall function 00416A64: ~_Task_impl.LIBCPMT ref: 00416AE1
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040C116
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175E0
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175FC
                                  • ~_Task_impl.LIBCPMT ref: 0040C2B3
                                    • Part of subcall function 00416CA1: ~_Task_impl.LIBCPMT ref: 00416CBA
                                  • __aulldiv.LIBCMT ref: 0040C173
                                  • __aulldvrm.LIBCMT ref: 0040C18F
                                  • ~_Task_impl.LIBCPMT ref: 0040C1F6
                                  • ~_Task_impl.LIBCPMT ref: 0040C201
                                  • ~_Task_impl.LIBCPMT ref: 0040C24E
                                  • ~_Task_impl.LIBCPMT ref: 0040C259
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl$ContextExternal$BaseBase::~Concurrency::details::H_prolog3$__aulldiv__aulldvrm
                                  • String ID:
                                  • API String ID: 785539728-0
                                  • Opcode ID: eee2511cf54b430e421d2a641b31d6f1601adf5062c95f7e85faf3ea996594e9
                                  • Instruction ID: f4426efc53ffe4305bf7800513cae526124559ee913c4b1df191f3fc7bfec984
                                  • Opcode Fuzzy Hash: eee2511cf54b430e421d2a641b31d6f1601adf5062c95f7e85faf3ea996594e9
                                  • Instruction Fuzzy Hash: 9D614C70D0111AEFCF04DBE5C881AEEBBB5BF48318F14412EE414B7281D7789A55DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040736B
                                  • SHGetMalloc.SHELL32(?), ref: 00407379
                                  • SHBrowseForFolderW.SHELL32 ref: 004073ED
                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00407405
                                  • GetDlgItem.USER32(?,000003E8), ref: 00407415
                                  • SetWindowTextW.USER32(00000000,?), ref: 00407423
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: BrowseFolderFromH_prolog3_ItemListMallocPathTextWindow
                                  • String ID: @
                                  • API String ID: 1883693206-2766056989
                                  • Opcode ID: c6e2f8b0e4c42a81da26c09d54589962973070651ebbedb6706efcca69c046bc
                                  • Instruction ID: fa59ab96ac5d1197279c403a8771da55510f0c260f3e7aa129da7c12dabf02e2
                                  • Opcode Fuzzy Hash: c6e2f8b0e4c42a81da26c09d54589962973070651ebbedb6706efcca69c046bc
                                  • Instruction Fuzzy Hash: F83154B0D006189FDB60DF65CD84B9DB7B8AB44305F4000FAAA09A7251DB789E85CF5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00401AF8
                                  • RtlInitializeCriticalSection.NTDLL(0046D37C), ref: 00401B1E
                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00401B45
                                    • Part of subcall function 00401AA6: __EH_prolog3.LIBCMT ref: 00401AAD
                                    • Part of subcall function 0041B1EF: __EH_prolog3.LIBCMT ref: 0041B1F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$CreateCriticalEventInitializeSection
                                  • String ID: HpE$d8@$~}3$~}3
                                  • API String ID: 4096329014-46719259
                                  • Opcode ID: 1fb5e4ffbf66790e775ef7bc1d37d0df9a6ee94a06c4f00fa2a22fe4547049eb
                                  • Instruction ID: 224e6281f1d8eb1d81f0cab5732f56c9ea292a43e7947ef120ba0b95a6336a39
                                  • Opcode Fuzzy Hash: 1fb5e4ffbf66790e775ef7bc1d37d0df9a6ee94a06c4f00fa2a22fe4547049eb
                                  • Instruction Fuzzy Hash: 2421CDF0F152609EC300AF6AAD411093AA8EB49B45715403FF90897361FBF858858F9F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040D1DB
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040D23E
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                  • _memcpy_s.LIBCMT ref: 0040D287
                                  • _memcpy_s.LIBCMT ref: 0040D2B9
                                  • _memcpy_s.LIBCMT ref: 0040D2F4
                                  • _memcpy_s.LIBCMT ref: 0040D307
                                  • ~_Task_impl.LIBCPMT ref: 0040D3E3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$_memcpy_s$BaseBase::~Concurrency::details::H_prolog3$Task_impl$H_prolog3_
                                  • String ID:
                                  • API String ID: 2867354398-0
                                  • Opcode ID: 5a7ae148b304c2ff6d5206eedb4da12cde4d923a61817e6225b55e7776d71b5a
                                  • Instruction ID: 644935d94622af2a1bb44ed62754b19383f141f992d414a1fd6b3b21b0ba617d
                                  • Opcode Fuzzy Hash: 5a7ae148b304c2ff6d5206eedb4da12cde4d923a61817e6225b55e7776d71b5a
                                  • Instruction Fuzzy Hash: 1A713C71D102189EDF21EFE9C885BDDBBB8BF08304F14005AE905BB292DB789949CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040659D
                                  • GetDlgItem.USER32(?,00000F03), ref: 004065AE
                                    • Part of subcall function 004024CE: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 004024D8
                                    • Part of subcall function 004024CE: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 004024F1
                                  • SetWindowTextW.USER32(?,?), ref: 004065E7
                                  • SendMessageW.USER32(?,00000007,00000000,00000000), ref: 004065FA
                                  • SendMessageW.USER32(?,00000437,00000000,?), ref: 00406612
                                  • LoadIconW.USER32(00000000,00000065), ref: 0040661C
                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040662C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: MessageSend$CriticalSection$EnterH_prolog3_IconItemLeaveLoadTextWindow
                                  • String ID:
                                  • API String ID: 1109778719-0
                                  • Opcode ID: cb5b31b88f434df52cecfe2312d03450dfd16ae1e43574abfc8bce4876b97835
                                  • Instruction ID: 9f3fef25f27dea73841c27482311e6ab953fd544b8be31692d42e3448e1b52f6
                                  • Opcode Fuzzy Hash: cb5b31b88f434df52cecfe2312d03450dfd16ae1e43574abfc8bce4876b97835
                                  • Instruction Fuzzy Hash: DE11B475D01208ABDF10EFA5ED49DAEBAB8FF44701F50442AF900B72A1CB789A05CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __CreateFrameInfo.LIBCMT ref: 0044A887
                                    • Part of subcall function 004425F6: __getptd.LIBCMT ref: 00442604
                                    • Part of subcall function 004425F6: __getptd.LIBCMT ref: 00442612
                                  • __getptd.LIBCMT ref: 0044A891
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __getptd.LIBCMT ref: 0044A89F
                                  • __getptd.LIBCMT ref: 0044A8AD
                                  • __getptd.LIBCMT ref: 0044A8B8
                                  • _CallCatchBlock2.LIBCMT ref: 0044A8DE
                                    • Part of subcall function 0044269B: __CallSettingFrame@12.LIBCMT ref: 004426E7
                                    • Part of subcall function 0044A985: __getptd.LIBCMT ref: 0044A994
                                    • Part of subcall function 0044A985: __getptd.LIBCMT ref: 0044A9A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                  • String ID:
                                  • API String ID: 1602911419-0
                                  • Opcode ID: 037325c11ed2f6c113bbb59e558177b44415e06d6e19bbefb16d21ce96c9778e
                                  • Instruction ID: 3740a0d705ae0ae49e4c21e1aea684132753d3fca633403e1697f9b9b249138b
                                  • Opcode Fuzzy Hash: 037325c11ed2f6c113bbb59e558177b44415e06d6e19bbefb16d21ce96c9778e
                                  • Instruction Fuzzy Hash: 691107B1C00209DFEB00EFA5D946AAD7BB0FF08315F51806AF814A7251DB789A159F69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0041307F
                                  • _wcslen.LIBCMT ref: 004130AA
                                  • _wcslen.LIBCMT ref: 004130C1
                                    • Part of subcall function 00413B95: _memmove_s.LIBCMT ref: 00413BD1
                                    • Part of subcall function 0043E277: _malloc.LIBCMT ref: 0043E291
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _wcslen$H_prolog3__malloc_memmove_s
                                  • String ID: ..\$__\
                                  • API String ID: 2376997039-3588609683
                                  • Opcode ID: db9acb81265b8c5b41a1122ea065f31843279db8baf119d52b68015c14ceb194
                                  • Instruction ID: 8b41afdeac141db5019ad30078342311178dee5fe37dfcacca31974cce8910ab
                                  • Opcode Fuzzy Hash: db9acb81265b8c5b41a1122ea065f31843279db8baf119d52b68015c14ceb194
                                  • Instruction Fuzzy Hash: 21B1F871D002199FCF10EFA5C981ADDB7B5BF08309F5040AAE919B7262DB34AE85CF59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::exception::exception.LIBCMT ref: 004170E4
                                  • __CxxThrowException@8.LIBCMT ref: 004170F9
                                  • std::_String_base::_Xlen.LIBCPMT ref: 00417146
                                    • Part of subcall function 0043E277: _malloc.LIBCMT ref: 0043E291
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Exception@8String_base::_ThrowXlen_mallocstd::_std::exception::exception
                                  • String ID: %YA
                                  • API String ID: 1448684856-2875574786
                                  • Opcode ID: 1c89118e8782c817023a245a5662ec6a726f0b008d27329da9e9135c38a9dabf
                                  • Instruction ID: 826aee14aba2dada2e0c0d6d914aec1c90e4a6fe3c02c31b16448a151633a2fd
                                  • Opcode Fuzzy Hash: 1c89118e8782c817023a245a5662ec6a726f0b008d27329da9e9135c38a9dabf
                                  • Instruction Fuzzy Hash: 4061AE71B04209AFCB08DFB8C5819AEB7B5FB48310B14866AF806D7345D774EE92CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl$H_prolog3
                                  • String ID: $@
                                  • API String ID: 1204490572-1077428164
                                  • Opcode ID: f938a21673830a58c09ec0d7948e57403bae038911eb82e195e49afc5d475ba6
                                  • Instruction ID: 373a1f9600140a49ee3458ea33e3d4ec4bb889b64512913e1dbc6d79c785f90a
                                  • Opcode Fuzzy Hash: f938a21673830a58c09ec0d7948e57403bae038911eb82e195e49afc5d475ba6
                                  • Instruction Fuzzy Hash: 77518571E0030A9FDF15DBA4C581BEEBBB5BF08308F10402AE205B72D1D7789A95CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00402590
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 0040259A
                                  • GetFileAttributesW.KERNEL32(?,00000001,00000000,00000000), ref: 0040266A
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 0040271E
                                    • Part of subcall function 004041EB: GetFileAttributesW.KERNEL32(?,00402684), ref: 004041EC
                                    • Part of subcall function 004041EB: SetFileAttributesW.KERNEL32(?,00000000), ref: 004041FB
                                    • Part of subcall function 004041EB: DeleteFileW.KERNEL32(?), ref: 00404202
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$Attributes$CriticalSection$DeleteEnterH_prolog3_Leave
                                  • String ID:
                                  • API String ID: 2863415744-3916222277
                                  • Opcode ID: 565cde79d5bf2fcdf3ec13553962e35467164625bf64d2f394189d5fd83d9e7e
                                  • Instruction ID: 4312e7856121fa19712d5fec8fb0b2f6e7f99b3189bca04f92570018e8eef9b4
                                  • Opcode Fuzzy Hash: 565cde79d5bf2fcdf3ec13553962e35467164625bf64d2f394189d5fd83d9e7e
                                  • Instruction Fuzzy Hash: A2415D71D00208EBDF11EBA5DE49ADDBB74AF54314F20042BF401B32E1DBB96A46CB5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044BC8D
                                  • __isleadbyte_l.LIBCMT ref: 0044BCC1
                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,00000001,00000000,?,?,?,?,?,00000001), ref: 0044BCF2
                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,00000001,00000000,?,?,?,?,?,00000001), ref: 0044BD60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                  • String ID: HA@
                                  • API String ID: 3058430110-511064766
                                  • Opcode ID: 875b578988ed47721630309d655be91a1d1c4720da4d2d6528e0cd90c0d70720
                                  • Instruction ID: ca627bc45d7ef0780ad45458da5c961b52dda9ff06ddcf591da8031d59a17a4a
                                  • Opcode Fuzzy Hash: 875b578988ed47721630309d655be91a1d1c4720da4d2d6528e0cd90c0d70720
                                  • Instruction Fuzzy Hash: C231AE31A00246EFFB20DFA4C8C0ABE7BA5EF05311B1445AEE4918B291DB34DD51DBD8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 0040552A
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00405537
                                  • EndDialog.USER32(?,00000001), ref: 004055A0
                                    • Part of subcall function 00402A2E: __EH_prolog3_GS.LIBCMT ref: 00402A38
                                    • Part of subcall function 00402A2E: _memset.LIBCMT ref: 00402A76
                                    • Part of subcall function 00402A2E: LoadStringW.USER32(?,?,00000208), ref: 00402A93
                                    • Part of subcall function 0040274D: RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00402754
                                    • Part of subcall function 0040274D: ResetEvent.KERNEL32(?,00406579), ref: 0040276A
                                    • Part of subcall function 0040274D: RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00402779
                                  • MessageBoxW.USER32(?,?,ALZip Self-Extractor,00000044), ref: 0040556B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$DialogEventH_prolog3_LoadMessageResetString_memset
                                  • String ID: ALZip Self-Extractor
                                  • API String ID: 3440476444-1641417939
                                  • Opcode ID: 3b98b675ac9ad2cfabaa79d9f81b076a09bbfee098f7cf1fe62e0f36a2991211
                                  • Instruction ID: 471963ea7f7e2ccfc45a4f44b60177944b494bddcf1d6ac204b8d3bcb8039de2
                                  • Opcode Fuzzy Hash: 3b98b675ac9ad2cfabaa79d9f81b076a09bbfee098f7cf1fe62e0f36a2991211
                                  • Instruction Fuzzy Hash: 30115475E00614ABCB10ABA5DC49EEEB7B4EF08715F00406AF506B31D1DBB899458FAE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___BuildCatchObject.LIBCMT ref: 0044AC1F
                                    • Part of subcall function 0044AB7A: ___BuildCatchObjectHelper.LIBCMT ref: 0044ABB0
                                  • _UnwindNestedFrames.LIBCMT ref: 0044AC36
                                  • ___FrameUnwindToState.LIBCMT ref: 0044AC44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                  • String ID: ,MF$csm
                                  • API String ID: 2163707966-3227229043
                                  • Opcode ID: 5c8f2af7e9ab93918b85453fa262e85abb9d9f7666176a4a2f4df9a01d61c6cb
                                  • Instruction ID: 4dd1093d2e8111e5b8b22beb7b08503d1f336e95291445bca5321acc57fa5882
                                  • Opcode Fuzzy Hash: 5c8f2af7e9ab93918b85453fa262e85abb9d9f7666176a4a2f4df9a01d61c6cb
                                  • Instruction Fuzzy Hash: 6F016D71040109BBEF226F51CE85EEB7F6AEF08344F00401AFD0815121D77AD9B1DBAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __getptd.LIBCMT ref: 0044A5C8
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __getptd.LIBCMT ref: 0044A5D9
                                  • __getptd.LIBCMT ref: 0044A5E7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __getptd$__amsg_exit__getptd_noexit
                                  • String ID: MOC$csm
                                  • API String ID: 803148776-1389381023
                                  • Opcode ID: 3df8ee8ec52dc9dc70640ef6389d78f4495cc6174d440821b0166b1fa47fe7ed
                                  • Instruction ID: e484c1bf3ea00cb790a951f8a026827c86af996de617958322c76dd2f60bd679
                                  • Opcode Fuzzy Hash: 3df8ee8ec52dc9dc70640ef6389d78f4495cc6174d440821b0166b1fa47fe7ed
                                  • Instruction Fuzzy Hash: 33E0DF310002049FF750ABA4C646B6D33A0FB48318F9500A7F00CC7722C7BCE890A65F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041EBAC
                                  • VirtualQuery.KERNEL32(?,?,0000001C,0000004C,0041EA9B,Kernel32.dll,?,0041E7D6,0041E7D6), ref: 0041ECE3
                                  • VirtualProtect.KERNEL32(?,?,00000004,?), ref: 0041ECF5
                                  • SetLastErrorEx.USER32(00000006,00000001), ref: 0041ECFF
                                  • VirtualProtect.KERNEL32(?,?,?,?), ref: 0041ED1B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Virtual$Protect$ErrorH_prolog3LastQuery
                                  • String ID:
                                  • API String ID: 570981605-0
                                  • Opcode ID: 65fdf69990a946e7919c5bdb395373328b77ecf30fedffd860835dd2c8197bc7
                                  • Instruction ID: 94a23f2daef97fc16d14d93dba0e8a61d25fdfc7a325e66e3fcf56ba6ca204e1
                                  • Opcode Fuzzy Hash: 65fdf69990a946e7919c5bdb395373328b77ecf30fedffd860835dd2c8197bc7
                                  • Instruction Fuzzy Hash: F9512A75D0021ADFDF10DF9AD880AEEB7B1BF08315F14402AE915B7291D778A981CF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416847: __EH_prolog3.LIBCMT ref: 0041684E
                                    • Part of subcall function 00416847: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041687E
                                    • Part of subcall function 0041688D: __EH_prolog3.LIBCMT ref: 00416894
                                    • Part of subcall function 0041688D: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004168C4
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416C43
                                    • Part of subcall function 0041DD34: __EH_prolog3.LIBCMT ref: 0041DD3B
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416C51
                                    • Part of subcall function 0041E38C: __EH_prolog3.LIBCMT ref: 0041E393
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416C5F
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416C6D
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416C7B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::$H_prolog3
                                  • String ID:
                                  • API String ID: 3591412279-0
                                  • Opcode ID: 15aace48c2e27e40484a496d2c03ca2b6d15d76e1c3a1ef29eab739b51e64e66
                                  • Instruction ID: 0cc3dd9330bc14031470f257f5de990838e950f7e3da5ab8940743d19acb8a32
                                  • Opcode Fuzzy Hash: 15aace48c2e27e40484a496d2c03ca2b6d15d76e1c3a1ef29eab739b51e64e66
                                  • Instruction Fuzzy Hash: C631A9711482805BD311F776D806B9FBBE89B96768F000A6FF995931C3DB6C9D04C267
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _memset$@x64tow_s@24H_prolog3___i64tow_s_wcslen
                                  • String ID:
                                  • API String ID: 291666582-0
                                  • Opcode ID: afe6c4f9a08a250915f8fde85b847d3df8819c973d92f74d55384bc27cbc58da
                                  • Instruction ID: cf9c3ecff213bbf401a964135294bd73bd750e54b7dcd1782100650e97086491
                                  • Opcode Fuzzy Hash: afe6c4f9a08a250915f8fde85b847d3df8819c973d92f74d55384bc27cbc58da
                                  • Instruction Fuzzy Hash: B031487591022C9ACB20AF95CC81BDEB2B4BF44B04F0095EBA988A7251DB745F80CFC8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __time64.LIBCMT ref: 0040BD05
                                    • Part of subcall function 0043FA7B: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0040BD0A,00000000,?,00000000,?,?,?,?,?,?,?,0040C06D), ref: 0043FA86
                                    • Part of subcall function 0043FA7B: __aulldiv.LIBCMT ref: 0043FAA6
                                    • Part of subcall function 0043FA10: __getptd.LIBCMT ref: 0043FA15
                                  • _rand.LIBCMT ref: 0040BD1E
                                    • Part of subcall function 0043FA22: __getptd.LIBCMT ref: 0043FA22
                                  • _rand.LIBCMT ref: 0040BD38
                                  • _rand.LIBCMT ref: 0040BD54
                                  • _rand.LIBCMT ref: 0040BD70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: _rand$Time__getptd$FileSystem__aulldiv__time64
                                  • String ID:
                                  • API String ID: 3177928082-0
                                  • Opcode ID: 91fa5f4bde76b24554e9b0fd7d97363898b49e32f75485ec14a3fc9de959230c
                                  • Instruction ID: ff1a745d962dd6234f389f5e685d826f83d79bfc4e9d0658b06f278ef20ffd06
                                  • Opcode Fuzzy Hash: 91fa5f4bde76b24554e9b0fd7d97363898b49e32f75485ec14a3fc9de959230c
                                  • Instruction Fuzzy Hash: 58115E33A2091616E310AAB99C0126672C5EFD5338F15173FFDACA72D2D63C484541ED
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __getptd.LIBCMT ref: 004452FB
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __amsg_exit.LIBCMT ref: 0044531B
                                  • __lock.LIBCMT ref: 0044532B
                                  • InterlockedDecrement.KERNEL32(?), ref: 00445348
                                  • InterlockedIncrement.KERNEL32(02302D00), ref: 00445373
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                  • String ID:
                                  • API String ID: 4271482742-0
                                  • Opcode ID: 78bc3618ddd09aef6fafce452ab13fd8b1d9a8cb56f934af84e023166b2a010d
                                  • Instruction ID: 84e7191920043a7197f39c3cbd69678d18c95e3365c759a52207c568fd34423d
                                  • Opcode Fuzzy Hash: 78bc3618ddd09aef6fafce452ab13fd8b1d9a8cb56f934af84e023166b2a010d
                                  • Instruction Fuzzy Hash: 7B018E32901F11ABEF21AF6AA40575E7360BF04BA5F04001BF810A7292C7AC9951DFDE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl$H_prolog3
                                  • String ID:
                                  • API String ID: 1204490572-0
                                  • Opcode ID: 2fd22a28cd6030e5622c5a3aa8e0d93c00883349e47ab552c5db457d174edc9b
                                  • Instruction ID: ed01e4c37a7b51d4d1214c879ed182fcf5116548b7ada4532143a61967068765
                                  • Opcode Fuzzy Hash: 2fd22a28cd6030e5622c5a3aa8e0d93c00883349e47ab552c5db457d174edc9b
                                  • Instruction Fuzzy Hash: CD01E130501744DAE711FBB2C5417CEB7A06F24308F90884EE49A13282EF786B48C76A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0042A8F5
                                  • ~_Task_impl.LIBCPMT ref: 0042A90F
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • ~_Task_impl.LIBCPMT ref: 0042A91B
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                  • ~_Task_impl.LIBCPMT ref: 0042A927
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 0042A933
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 0042081A: __EH_prolog3.LIBCMT ref: 00420821
                                    • Part of subcall function 0042081A: ~_Task_impl.LIBCPMT ref: 0042083B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$Task_impl$BaseBase::~Concurrency::details::
                                  • String ID:
                                  • API String ID: 955762131-0
                                  • Opcode ID: c1405ad1c235bfb1f82d49fc1e0c5ebc055ad1cc7e6c075182973ec2b700ae0c
                                  • Instruction ID: 0014742cf07b321e29da727027317060f420ee9bd4e854571a50f9ca543b6f64
                                  • Opcode Fuzzy Hash: c1405ad1c235bfb1f82d49fc1e0c5ebc055ad1cc7e6c075182973ec2b700ae0c
                                  • Instruction Fuzzy Hash: 1CF06770405694DED711FBA5C25178DFBE46F18308F90848EE58613682DBBC6A48972A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004219C2
                                  • ~_Task_impl.LIBCPMT ref: 004219D4
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • ~_Task_impl.LIBCPMT ref: 004219E0
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                  • ~_Task_impl.LIBCPMT ref: 004219EC
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 004219F7
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$BaseBase::~Concurrency::details::Task_impl
                                  • String ID:
                                  • API String ID: 2784628925-0
                                  • Opcode ID: bde16b9a8c0d2e2fa34034a6bafbdab424764ff328371657bf470a3c3a62037d
                                  • Instruction ID: 03b40bc48b9629c10e6e557975a55f1c597e197f10b28b8c9b675afc985e6e02
                                  • Opcode Fuzzy Hash: bde16b9a8c0d2e2fa34034a6bafbdab424764ff328371657bf470a3c3a62037d
                                  • Instruction Fuzzy Hash: 8EE09274501744DADB15FBA6C2027DDBB706F14318F50814EE452172C3DB785B88D76A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00407B67
                                    • Part of subcall function 004035F7: std::_String_base::_Xlen.LIBCPMT ref: 00403630
                                  • _wcslen.LIBCMT ref: 00407C7D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_String_base::_Xlen_wcslenstd::_
                                  • String ID: $/
                                  • API String ID: 781070004-2637513485
                                  • Opcode ID: f9cc981b204faada10a15d4e1e7f8bbfa6e427c0c64561c5d4e8847c52bcf933
                                  • Instruction ID: c03a2412b405caaf7ceb9b49ca34e629e8e88464053507a8947a4f4999880cc0
                                  • Opcode Fuzzy Hash: f9cc981b204faada10a15d4e1e7f8bbfa6e427c0c64561c5d4e8847c52bcf933
                                  • Instruction Fuzzy Hash: 40815D71D00218EADF21EBA5CD41BDDB7B9AF05308F1040AEE504B71D2CB786A89CF56
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00408FCC
                                  • _memset.LIBCMT ref: 00408FF4
                                    • Part of subcall function 0041B1EF: __EH_prolog3.LIBCMT ref: 0041B1F6
                                    • Part of subcall function 00408F50: __EH_prolog3.LIBCMT ref: 00408F57
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0040916D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$CreateDirectoryH_prolog3__memset
                                  • String ID:
                                  • API String ID: 1337434558-3916222277
                                  • Opcode ID: 99dc8ddd17d55bd83f03f83a8a0871248ebd7c9e23bce9817a0909e78cb56283
                                  • Instruction ID: 248712948781d7bee9fbe3fd8c0b5f5771086fdc1c603c29424be3ddbefa2347
                                  • Opcode Fuzzy Hash: 99dc8ddd17d55bd83f03f83a8a0871248ebd7c9e23bce9817a0909e78cb56283
                                  • Instruction Fuzzy Hash: F5511B71D052299ADF20EF65CD89BDEB7B8AB04304F1001EAE508B7291DB78AF84CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041F051
                                    • Part of subcall function 00420AC6: __EH_prolog3.LIBCMT ref: 00420ACD
                                    • Part of subcall function 0041D527: __EH_prolog3.LIBCMT ref: 0041D52E
                                  • ~_Task_impl.LIBCPMT ref: 0041F0E0
                                    • Part of subcall function 00416910: __EH_prolog3.LIBCMT ref: 00416917
                                    • Part of subcall function 00416910: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416936
                                  • ~_Task_impl.LIBCPMT ref: 0041F0EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ContextExternalTask_impl$BaseBase::~Concurrency::details::
                                  • String ID: EA
                                  • API String ID: 2350445212-1184852372
                                  • Opcode ID: 971a07678716803d42b4dddf1fa94e13d0632f07d9e6ed499db8f1853d33a3ca
                                  • Instruction ID: e063da5e1e934e61e0954e9a2f31bfc6a800ebdbda6208309bf7f98b30ae4770
                                  • Opcode Fuzzy Hash: 971a07678716803d42b4dddf1fa94e13d0632f07d9e6ed499db8f1853d33a3ca
                                  • Instruction Fuzzy Hash: A8115A70502744DAD710FBB5C2067CEBBE46F24308F90485EA09623282DFB8274CCB6A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleA.KERNEL32(KERNEL32,0044D970), ref: 0044E584
                                  • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0044E594
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: IsProcessorFeaturePresent$KERNEL32
                                  • API String ID: 1646373207-3105848591
                                  • Opcode ID: 01c8bc9742624e4265bbedcc6c3e9e909c83d08e290bfc3679eaa2c4e7004593
                                  • Instruction ID: 15ccf9716c4986a3b4df78ecb24a1f580b978f93c54c7f1f34a83364263a8082
                                  • Opcode Fuzzy Hash: 01c8bc9742624e4265bbedcc6c3e9e909c83d08e290bfc3679eaa2c4e7004593
                                  • Instruction Fuzzy Hash: 77F03030A01A09E2EF006BE1FD0A37F7A78BB8074AF950591D191E00D4EF749171D25A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416A07: __EH_prolog3.LIBCMT ref: 00416A0E
                                    • Part of subcall function 00416A07: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416A41
                                    • Part of subcall function 00416A07: ~_Task_impl.LIBCPMT ref: 00416A57
                                    • Part of subcall function 00416CA1: ~_Task_impl.LIBCPMT ref: 00416CBA
                                  • ~_Task_impl.LIBCPMT ref: 00423591
                                    • Part of subcall function 0042081A: __EH_prolog3.LIBCMT ref: 00420821
                                    • Part of subcall function 0042081A: ~_Task_impl.LIBCPMT ref: 0042083B
                                  • ~_Task_impl.LIBCPMT ref: 0042392F
                                    • Part of subcall function 0042CAD6: __EH_prolog3.LIBCMT ref: 0042CADD
                                  • ~_Task_impl.LIBCPMT ref: 00423998
                                  • ~_Task_impl.LIBCPMT ref: 00423A22
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: Task_impl$H_prolog3$ContextExternal$BaseBase::~Concurrency::details::
                                  • String ID:
                                  • API String ID: 2757123028-0
                                  • Opcode ID: 347e91457edb1d98d709e29b60b2b13c36e1b470990e1a9b9d49156d118002b4
                                  • Instruction ID: eb171a630df438c31a54dfca674e0afc03208e755016523bcd74ec3a0bb07778
                                  • Opcode Fuzzy Hash: 347e91457edb1d98d709e29b60b2b13c36e1b470990e1a9b9d49156d118002b4
                                  • Instruction Fuzzy Hash: 9102C0713083119FDB10DF15D881BEAB7F5AF89304F44086EF9889B252DB78EA45CB66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042D202
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042D24D
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042D27D
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • _memset.LIBCMT ref: 0042D2CA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 1412648963-0
                                  • Opcode ID: 434e6597fa5204e0b70385b1273d44b6ff13530a9a69567a7400b31a4a463602
                                  • Instruction ID: 4e8f2658d289cd15973fe97a757588807b6e1a0e1833324c8caa39398db08741
                                  • Opcode Fuzzy Hash: 434e6597fa5204e0b70385b1273d44b6ff13530a9a69567a7400b31a4a463602
                                  • Instruction Fuzzy Hash: 04617E71104B059FD710EF66C881BABB7E9BF44308F40491EF5A693291DB78E949CB26
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042D6B6
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042D701
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042D731
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • _memset.LIBCMT ref: 0042D77E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 1412648963-0
                                  • Opcode ID: ec2a1dd0f1128a860a66848109bea1e6b745af1d396443739ff2beb97782ece2
                                  • Instruction ID: a42144a2cd15f0d34e4a2f3c9d0ecd2d63c3274e7433e25c8d5c91002d51ea7b
                                  • Opcode Fuzzy Hash: ec2a1dd0f1128a860a66848109bea1e6b745af1d396443739ff2beb97782ece2
                                  • Instruction Fuzzy Hash: 5251A1711047019BD720EF26C881BABB7E9BF44318F40491EF5A693291DB78F949CB26
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0040C51C
                                    • Part of subcall function 00416A64: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416AC4
                                    • Part of subcall function 00416A64: ~_Task_impl.LIBCPMT ref: 00416AE1
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0040C573
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                  • _memcpy_s.LIBCMT ref: 0040C641
                                  • ~_Task_impl.LIBCPMT ref: 0040C6CC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::$H_prolog3Task_impl$H_prolog3__memcpy_s
                                  • String ID:
                                  • API String ID: 2470942776-0
                                  • Opcode ID: eff0c919955eaa5fafd51dffa1b569ac8385b31748cd2154fd5801c508f07d01
                                  • Instruction ID: a0c16ac441c4c1ba74e774e1068f28e38114783427b07da58fef628b9fdbc33d
                                  • Opcode Fuzzy Hash: eff0c919955eaa5fafd51dffa1b569ac8385b31748cd2154fd5801c508f07d01
                                  • Instruction Fuzzy Hash: CD513F71901208EFCF12EF98C991BEDBBB5AF09304F54055AF901BB2A1C73A9D41DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042DE4F
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042DE7A
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042DEAD
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • _memset.LIBCMT ref: 0042DEE7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 1412648963-0
                                  • Opcode ID: f080c335822530d4f6bf3ee587310af39b35c4a696f1a429b4128999daaba94a
                                  • Instruction ID: fe9c80fb6022518badf757a1505c7fe0a1341e33b3352536d46a2951d5d510bc
                                  • Opcode Fuzzy Hash: f080c335822530d4f6bf3ee587310af39b35c4a696f1a429b4128999daaba94a
                                  • Instruction Fuzzy Hash: 59413F71504B449FC320DF26D885FDBB7E8FF48314F404A2EB1AA82591EB78A549CB16
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042DB5C
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042DB87
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042DBBA
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • _memset.LIBCMT ref: 0042DBD5
                                    • Part of subcall function 0041769A: __EH_prolog3.LIBCMT ref: 004176A1
                                    • Part of subcall function 0041769A: ~_Task_impl.LIBCPMT ref: 00417715
                                    • Part of subcall function 0041769A: ~_Task_impl.LIBCPMT ref: 0041772E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$BaseBase::~Concurrency::details::$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 760866448-0
                                  • Opcode ID: 5a8012005e51d16ca309acf720660f10145b1a8cce68c463ce1721608d457ab8
                                  • Instruction ID: a146cb0471d9870b59ce287e6573bc2584331ef9736e8ce9ce73ad801e60ebed
                                  • Opcode Fuzzy Hash: 5a8012005e51d16ca309acf720660f10145b1a8cce68c463ce1721608d457ab8
                                  • Instruction Fuzzy Hash: 7B415371404B449FC350DF26C881F9BB7E8FF88314F404A2EF1AAC2591EB74A549CB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00412E5A
                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000054,0040B007,?,?,?,?,0000FFFF,00000000,?,?), ref: 00412E90
                                  • _memset.LIBCMT ref: 00412EBA
                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,?,?), ref: 00412ED4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$H_prolog3__memset
                                  • String ID:
                                  • API String ID: 2885787191-0
                                  • Opcode ID: 38a92ef5ca66ef2072cf86a245b43029b36038a98e5eac0b35b80e5cb29a93d7
                                  • Instruction ID: 3863c83fe06225a5ae4148ddb5033e45959a7b30eb5cf4067f07400f02761122
                                  • Opcode Fuzzy Hash: 38a92ef5ca66ef2072cf86a245b43029b36038a98e5eac0b35b80e5cb29a93d7
                                  • Instruction Fuzzy Hash: 5F316D71900219EBDF14EFA9CD85D9EBBB8FF45314F10411AF414BB2A1D774A941CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 00420050
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                  • ~_Task_impl.LIBCPMT ref: 004201BB
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                    • Part of subcall function 00413579: __EH_prolog3.LIBCMT ref: 00413580
                                  • _wcsrchr.LIBCMT ref: 004200F8
                                  • ~_Task_impl.LIBCPMT ref: 00420188
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$BaseBase::~Concurrency::details::Task_impl$H_prolog3__wcsrchr
                                  • String ID:
                                  • API String ID: 1620322408-0
                                  • Opcode ID: b02d712a3b3850647fc3cb75c3c18bc5e33693b6778954b05c17ffb8c911a652
                                  • Instruction ID: 0e4d00dfc81e2d5a56882bd4262890027d82d1b365ea70eb22062f189641df61
                                  • Opcode Fuzzy Hash: b02d712a3b3850647fc3cb75c3c18bc5e33693b6778954b05c17ffb8c911a652
                                  • Instruction Fuzzy Hash: 22415071900228CBDB24EF65D985BDDB7B4AF04304F5444AEE849A7283DB786E89CF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0042E121
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                    • Part of subcall function 004174CF: __EH_prolog3.LIBCMT ref: 004174D6
                                    • Part of subcall function 004174CF: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00417522
                                  • ~_Task_impl.LIBCPMT ref: 0042E14C
                                    • Part of subcall function 0041A53E: __EH_prolog3.LIBCMT ref: 0041A545
                                    • Part of subcall function 0041A53E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A564
                                    • Part of subcall function 0041A5BC: __EH_prolog3.LIBCMT ref: 0041A5C3
                                    • Part of subcall function 0041A5BC: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041A5F1
                                  • ~_Task_impl.LIBCPMT ref: 0042E17C
                                    • Part of subcall function 0041AA9F: __EH_prolog3.LIBCMT ref: 0041AAA6
                                    • Part of subcall function 0041AA9F: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 0041AAC5
                                  • _memset.LIBCMT ref: 0042E1B4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::H_prolog3$Task_impl$_memset
                                  • String ID:
                                  • API String ID: 1412648963-0
                                  • Opcode ID: 4273077c6009c0006c0eef0902f281482b018d229e40169b7648069e443d1861
                                  • Instruction ID: d163ef56d4875cd5245e04434ae19b865a1411fd67e8b0c7c2476eac826f71ba
                                  • Opcode Fuzzy Hash: 4273077c6009c0006c0eef0902f281482b018d229e40169b7648069e443d1861
                                  • Instruction Fuzzy Hash: 3131C9721047019BC310DF25C886FEBB7E8FF84328F004A2EF5A6921D1EB78A549CB56
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,004189DE), ref: 0042EF5B
                                  • SetFileTime.KERNEL32(?,01000000,?,?,?,?,?,?,?,004189DE,?,?), ref: 0042EFC2
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,004189DE,?,?), ref: 0042EFCB
                                  • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,004189DE,?,?), ref: 0042EFD7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: File$AttributesCloseCreateHandleTime
                                  • String ID:
                                  • API String ID: 1550419386-0
                                  • Opcode ID: b790b8bafb1fb66787ca377f85770b015e8ef0bce398cfc088fb048ebc76be7f
                                  • Instruction ID: 73e65076f2c62163f4d40997ece2b127e1876d17bd723a2e176288497e8f3f9b
                                  • Opcode Fuzzy Hash: b790b8bafb1fb66787ca377f85770b015e8ef0bce398cfc088fb048ebc76be7f
                                  • Instruction Fuzzy Hash: 25218E36A00224FBCF10DFA6DD809AEFBB5FF08700F554456F915A7261C334AA01DB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetDlgItem.USER32(?,000003EE), ref: 00406C34
                                  • DestroyCursor.USER32(?), ref: 00406C5F
                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00406C75
                                  • EndDialog.USER32(?,00000000), ref: 00406C9C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CursorDestroyDialogItemMessageSend
                                  • String ID:
                                  • API String ID: 3563011593-0
                                  • Opcode ID: 27536f49ddd20f3162466020e6142a748eed79968cedf931ff367879e25cebf3
                                  • Instruction ID: 5d3838eb0507e8e9d3164063cd292666b4a99632ae5be181a3c13b31fe4b5700
                                  • Opcode Fuzzy Hash: 27536f49ddd20f3162466020e6142a748eed79968cedf931ff367879e25cebf3
                                  • Instruction Fuzzy Hash: DA1100715083029FD710DF24D8085AB7EE8EB48750F01093AF886E2291C775D9548BAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0042090A
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                  • ~_Task_impl.LIBCPMT ref: 0042095F
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  • ~_Task_impl.LIBCPMT ref: 0042099A
                                  • ~_Task_impl.LIBCPMT ref: 004209A6
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$H_prolog3$BaseBase::~Concurrency::details::Task_impl
                                  • String ID:
                                  • API String ID: 2784628925-0
                                  • Opcode ID: 4688d8976d0199470a2c22c3aea01d257cc4f1acdd1df93fbb1ad33c3b7d6526
                                  • Instruction ID: c3f4f06405c183e8c27bd4e5bcf57809b16d994df9e88f987db75c0ae41620ab
                                  • Opcode Fuzzy Hash: 4688d8976d0199470a2c22c3aea01d257cc4f1acdd1df93fbb1ad33c3b7d6526
                                  • Instruction Fuzzy Hash: 86118EB2A002298ADF10E7F1D942ADDB7F86F08318F54015BE411B3293DB7CDA859B69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041F983
                                    • Part of subcall function 00416941: __EH_prolog3.LIBCMT ref: 00416948
                                    • Part of subcall function 00416941: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416994
                                  • ~_Task_impl.LIBCPMT ref: 0041F9A2
                                    • Part of subcall function 00416F12: __EH_prolog3.LIBCMT ref: 00416F19
                                    • Part of subcall function 00416F12: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F38
                                    • Part of subcall function 00416F48: __EH_prolog3.LIBCMT ref: 00416F4F
                                    • Part of subcall function 00416F48: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 00416F7D
                                  • ~_Task_impl.LIBCPMT ref: 0041F9DB
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175E0
                                    • Part of subcall function 00417569: ~_Task_impl.LIBCPMT ref: 004175FC
                                    • Part of subcall function 00417618: __EH_prolog3.LIBCMT ref: 0041761F
                                    • Part of subcall function 00417618: ~_Task_impl.LIBCPMT ref: 00417667
                                    • Part of subcall function 00417618: ~_Task_impl.LIBCPMT ref: 00417680
                                  • ~_Task_impl.LIBCPMT ref: 0041FA03
                                    • Part of subcall function 0041749E: __EH_prolog3.LIBCMT ref: 004174A5
                                    • Part of subcall function 0041749E: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCMT ref: 004174C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ContextExternal$Task_impl$H_prolog3$BaseBase::~Concurrency::details::
                                  • String ID:
                                  • API String ID: 1430828601-0
                                  • Opcode ID: e7d970a8a11411c6f75e2e8b6c24b35890bb732824f4e27c69ba6e00aa44f227
                                  • Instruction ID: 44e1f0b927bd7b2ed043e242114dbff5f7653ab3c8518303acf1562966ee053b
                                  • Opcode Fuzzy Hash: e7d970a8a11411c6f75e2e8b6c24b35890bb732824f4e27c69ba6e00aa44f227
                                  • Instruction Fuzzy Hash: C9114C72D102199BCF05EBE5C9429EEBAB5BF48318F15011FF501B2142DB7C4A86DBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                  • String ID:
                                  • API String ID: 3016257755-0
                                  • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                  • Instruction ID: 61eb281aa5bafdc78bc62c604ad03b1a9d2af5580579acb69e26090bfddcdc64
                                  • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                  • Instruction Fuzzy Hash: 20114E3240014EBBDF125E86CC05CEE3F66BB58354B598516FE1859531D33ACAB1AB85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __getptd.LIBCMT ref: 0043F025
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __getptd.LIBCMT ref: 0043F03C
                                  • __amsg_exit.LIBCMT ref: 0043F04A
                                  • __lock.LIBCMT ref: 0043F05A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                  • String ID:
                                  • API String ID: 3521780317-0
                                  • Opcode ID: b1e0c0a5448efabfee26ab4210d0a83be094dc2be716cf0cf69538b834d69297
                                  • Instruction ID: 0bf5fddf3d16609b7de356d7c8dcce46c38ec617913d4588fd3e3759b8cc80ba
                                  • Opcode Fuzzy Hash: b1e0c0a5448efabfee26ab4210d0a83be094dc2be716cf0cf69538b834d69297
                                  • Instruction Fuzzy Hash: B1F09631D00704DAE724BB6E8402B4D33B0AB04715F51516FF445672D2CBBCA909DE5F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(0046D37C), ref: 00402754
                                  • ResetEvent.KERNEL32(?,00406579), ref: 0040276A
                                  • SetEvent.KERNEL32(?,00406579), ref: 00402772
                                  • RtlLeaveCriticalSection.NTDLL(0046D37C), ref: 00402779
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: CriticalEventSection$EnterLeaveReset
                                  • String ID:
                                  • API String ID: 3553466030-0
                                  • Opcode ID: e4502d0c1e152c0b3c27294801e285d9a5189cc38259356d85abcddf4bf7b6e2
                                  • Instruction ID: 90a81c630b5993b01a57911b88393e436c102d869a29737ede06170e9b4f18d3
                                  • Opcode Fuzzy Hash: e4502d0c1e152c0b3c27294801e285d9a5189cc38259356d85abcddf4bf7b6e2
                                  • Instruction Fuzzy Hash: A5D09E35E01B10DB82012B65FD1C83E7B74BB89F233044036F905522E6D77884829BEF
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: %dd
                                  • API String ID: 431132790-2324256507
                                  • Opcode ID: adc50be12d1e0659531fa70ad0377a2fe02ae832fdc62dcf9b1123fb7942022f
                                  • Instruction ID: edbc95063cb021f958530c54f012c0488dae2d00e476d249a18a9024959327ad
                                  • Opcode Fuzzy Hash: adc50be12d1e0659531fa70ad0377a2fe02ae832fdc62dcf9b1123fb7942022f
                                  • Instruction Fuzzy Hash: F1B1D6715083419FD710DF25CC85BDB77E4EF84304F00492EF899AB291D778AA49CB9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004143A2
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 004143DD
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  • invalid map/set<T> iterator, xrefs: 004143B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: invalid map/set<T> iterator
                                  • API String ID: 1412866469-152884079
                                  • Opcode ID: 214a1360eddc4774590fc6b75ba5467869ee86e2c87a56b4d94164092fecbfaf
                                  • Instruction ID: 16de6d5d629a44f6fbca0d7ce61b069652a3f9bde28aa7acaf850db990017336
                                  • Opcode Fuzzy Hash: 214a1360eddc4774590fc6b75ba5467869ee86e2c87a56b4d94164092fecbfaf
                                  • Instruction Fuzzy Hash: FFA15270604281DFDB25DF18C094B95BBA2AF95308F28809ED5894F353D7BAECC6CB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00420C28
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 00420C63
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  • invalid map/set<T> iterator, xrefs: 00420C36
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: invalid map/set<T> iterator
                                  • API String ID: 1412866469-152884079
                                  • Opcode ID: cb780e3be1d7be823bbbf1e97537612ff57dea44c5e85d2240daeca51fd3b885
                                  • Instruction ID: 3a6f6e1a03239d223cc07eb7ec3fea3e38dd0092dbddc62d643263e70a71959f
                                  • Opcode Fuzzy Hash: cb780e3be1d7be823bbbf1e97537612ff57dea44c5e85d2240daeca51fd3b885
                                  • Instruction Fuzzy Hash: 4BA1B1706052909FDB25CF24D184B65BFE1AF15308F99848ED5894F393D3BAEC86CB85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00424198
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 004241D3
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  • invalid map/set<T> iterator, xrefs: 004241A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: invalid map/set<T> iterator
                                  • API String ID: 1412866469-152884079
                                  • Opcode ID: 42bf58be54c9fc93da7b6695bd18622cc62b0bb11f2f874cab27a9c32e0929e3
                                  • Instruction ID: 379843a0f5437a073df0b8eb69b895f7c5728a9a23eb36e04a4533f08b177c9f
                                  • Opcode Fuzzy Hash: 42bf58be54c9fc93da7b6695bd18622cc62b0bb11f2f874cab27a9c32e0929e3
                                  • Instruction Fuzzy Hash: 81A15C70604290DFDB15CF54E184B667FA1AF95308F6880CEE4854F352C7B9E986CBA6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040D96F
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 0040D9AA
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  • invalid map/set<T> iterator, xrefs: 0040D97D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: invalid map/set<T> iterator
                                  • API String ID: 1412866469-152884079
                                  • Opcode ID: a134fa279731a07bba47809a80be17e54c93768cb7984c1d3060e38066cbe671
                                  • Instruction ID: e9fb153646d4762d7cf73799b29417873e21ef137326348b1c72c23985268895
                                  • Opcode Fuzzy Hash: a134fa279731a07bba47809a80be17e54c93768cb7984c1d3060e38066cbe671
                                  • Instruction Fuzzy Hash: 41A19F70A083809FDB15CF64C040B55BBA1BF15318F2885AED4955F393C3B9ED8ACB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3_
                                  • String ID: %s%d%s$%s%s%s
                                  • API String ID: 2427045233-97145105
                                  • Opcode ID: dbda8c242151a0df21242d553e366543a58a81e17dab7c54e489c98345878b95
                                  • Instruction ID: 8a9e883ce63fa29b2cfbfdc24499e9f073fb1c5884e4e25b93c55b4d0fce00d4
                                  • Opcode Fuzzy Hash: dbda8c242151a0df21242d553e366543a58a81e17dab7c54e489c98345878b95
                                  • Instruction Fuzzy Hash: 89711771840218DADF10DB94CD85BDDB775BF01318F1481EAE508BB291DB786E89CFA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00423F97
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 00423FD2
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: map/set<T> too long
                                  • API String ID: 1412866469-1285458680
                                  • Opcode ID: 6a8fbc9ecea2529da978ed008fcd6a038cea14e749bc11c7aecb5f4abab9a594
                                  • Instruction ID: f41dcfb23a4905105fc1bcf4e592f8bac34df4de5b6a2ab7774db59615d49e1b
                                  • Opcode Fuzzy Hash: 6a8fbc9ecea2529da978ed008fcd6a038cea14e749bc11c7aecb5f4abab9a594
                                  • Instruction Fuzzy Hash: F45146306006509FC715DF15D184A66BBF0FF99308F95808EE5058B792C77AFC85CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041CFC7
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 0041D004
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: map/set<T> too long
                                  • API String ID: 1412866469-1285458680
                                  • Opcode ID: 062fcfdadbe01c73dc747cc358ff25a76ec12af13d39133b13d35e70ea7a4608
                                  • Instruction ID: 23b61b0b5f182b0df7f42a9a9e94429a2d2252c9675ade3db4ef36030ba9e486
                                  • Opcode Fuzzy Hash: 062fcfdadbe01c73dc747cc358ff25a76ec12af13d39133b13d35e70ea7a4608
                                  • Instruction Fuzzy Hash: 274158B46006009FC321DF19C184A96BBF1BF5A308F25808AE4494B362DB7AFCC6CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0040D5C5
                                    • Part of subcall function 004019AB: __EH_prolog3.LIBCMT ref: 004019B2
                                  • __CxxThrowException@8.LIBCMT ref: 0040D602
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$ExceptionException@8RaiseThrow
                                  • String ID: map/set<T> too long
                                  • API String ID: 1412866469-1285458680
                                  • Opcode ID: 464edc89ceb0ffeffbf29ced83f15c1e715f4b901d4848669bb529743c4c434d
                                  • Instruction ID: 0094c7c31f0751cbb5434dbe1ea07c1798ca11a8ecc98640f047b7b968928e3f
                                  • Opcode Fuzzy Hash: 464edc89ceb0ffeffbf29ced83f15c1e715f4b901d4848669bb529743c4c434d
                                  • Instruction Fuzzy Hash: 3C419D70A002408FC715DF59C084B59BBF1BF55304F1589AAE4195B3A2C7BAFD89CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  • %04d-%02d-%02d %s %02d:%02d:%02d, xrefs: 00408820
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3__localtime64_s
                                  • String ID: %04d-%02d-%02d %s %02d:%02d:%02d
                                  • API String ID: 3113134143-1150477626
                                  • Opcode ID: 3913c395875e1899ec829d0c1e3fce896a492bdad78b392709eaf548878e537e
                                  • Instruction ID: f249b1a570f42d39f6b46b8d72a234804d25a22ea53615f546526d0f23278411
                                  • Opcode Fuzzy Hash: 3913c395875e1899ec829d0c1e3fce896a492bdad78b392709eaf548878e537e
                                  • Instruction Fuzzy Hash: 5E018FB2900008AFEB01EB94D985BFEB7B9EF08304F50001BF411F7281DBB9AD408B69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00442649: __getptd.LIBCMT ref: 0044264F
                                    • Part of subcall function 00442649: __getptd.LIBCMT ref: 0044265F
                                  • __getptd.LIBCMT ref: 0044A994
                                    • Part of subcall function 00442FE9: __getptd_noexit.LIBCMT ref: 00442FEC
                                    • Part of subcall function 00442FE9: __amsg_exit.LIBCMT ref: 00442FF9
                                  • __getptd.LIBCMT ref: 0044A9A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: __getptd$__amsg_exit__getptd_noexit
                                  • String ID: csm
                                  • API String ID: 803148776-1018135373
                                  • Opcode ID: f7050e1094d989b87afb2f9e212be214adf7153d1d3e55897fc14462d0a26091
                                  • Instruction ID: 6b0435e546b89cbfa20674766c1ef675ca6ae67648e4dfcc16742ac24b5e2e7b
                                  • Opcode Fuzzy Hash: f7050e1094d989b87afb2f9e212be214adf7153d1d3e55897fc14462d0a26091
                                  • Instruction Fuzzy Hash: 7C017875840201CAEF349F66D440AAEB3B4BF14312F95892FF04656A51CB7889E0DB1A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: %A$~A
                                  • API String ID: 431132790-2827363916
                                  • Opcode ID: 30bb60def41bcf94dcb17b850634c21843be50c53bf145715324b0fdcf41de75
                                  • Instruction ID: 888ba7b1cb7feebe1e2c7f41cec86b384d09dea8d71917b1456e6523c4981875
                                  • Opcode Fuzzy Hash: 30bb60def41bcf94dcb17b850634c21843be50c53bf145715324b0fdcf41de75
                                  • Instruction Fuzzy Hash: 91E04FB460021597DB04BFA7C54239CB2A17F90308F84451FB9125B752DFBC59C58B4D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0041E040
                                    • Part of subcall function 0041B1EF: __EH_prolog3.LIBCMT ref: 0041B1F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: %A$~A
                                  • API String ID: 431132790-2827363916
                                  • Opcode ID: f5ed4c646193485d1dd2008d993af9d4c6a1ce1e7687ff9c9f3a8e5f5f60ebbf
                                  • Instruction ID: 10a58805637716ac61d804a260a7508249e6e2175bc9b845257ea1c02becb991
                                  • Opcode Fuzzy Hash: f5ed4c646193485d1dd2008d993af9d4c6a1ce1e7687ff9c9f3a8e5f5f60ebbf
                                  • Instruction Fuzzy Hash: E8E026306002048BE301FF5AC90178D73A8AF10308F84805FFC808B312EBBD9A84876E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00427C67
                                  • ~_Task_impl.LIBCPMT ref: 00427C84
                                    • Part of subcall function 0042E2C7: __EH_prolog3.LIBCMT ref: 0042E2CE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Task_impl
                                  • String ID: D|B
                                  • API String ID: 2843614703-2475354696
                                  • Opcode ID: fe7e188ea20f57aa2c6aafbce954ac993b7a621d97178a2e5972d442c36ed211
                                  • Instruction ID: f57faa44e8ec9089065f47dc187146ca79ba285728b7f695b537b288c20ddf65
                                  • Opcode Fuzzy Hash: fe7e188ea20f57aa2c6aafbce954ac993b7a621d97178a2e5972d442c36ed211
                                  • Instruction Fuzzy Hash: 1DE04F70600765CADB14FBA6D1453DCB6A0AF04318F91464EF0A6172D2DFBC1A04DA5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0043DE32
                                  • __CxxThrowException@8.LIBCMT ref: 0043DE5D
                                    • Part of subcall function 004422C9: RaiseException.KERNEL32(?,?,0043E2DB,?,?,?,?,?,0043E2DB,?,00464E88,0046C764,?,00401891,004012E3), ref: 0044230B
                                  Strings
                                  • invalid string position, xrefs: 0043DE37
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1196845795.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1196825254.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1196845795.0000000000486000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1197126488.0000000000495000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_S34C65xU.jbxd
                                  Similarity
                                  • API ID: ExceptionException@8H_prolog3RaiseThrow
                                  • String ID: invalid string position
                                  • API String ID: 1961742612-1799206989
                                  • Opcode ID: 561bb807eb2e6e16e906c1e3865466abc582dbc4d6a012a35fba0ef5bd63708c
                                  • Instruction ID: 05e7ea5aeabadc39b0013a968410e8434d3c405e35a505f529f85587c4203e22
                                  • Opcode Fuzzy Hash: 561bb807eb2e6e16e906c1e3865466abc582dbc4d6a012a35fba0ef5bd63708c
                                  • Instruction Fuzzy Hash: 9FD0EC7294010896DF04E6D1C956BED733C6B14715F50046FB10076086DFF856088A6D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: h1v0
                                  • API String ID: 0-2781045131
                                  • Opcode ID: f67309d156c21e98c94554fac1507cce1ddd40bad643cc23f7592c0935870fb3
                                  • Instruction ID: 62a39029ec8bb2c0961dfed288be80988afab180048cc1edf27c6e35c3462a76
                                  • Opcode Fuzzy Hash: f67309d156c21e98c94554fac1507cce1ddd40bad643cc23f7592c0935870fb3
                                  • Instruction Fuzzy Hash: EE52BD7061CB888FD7B6EB18C494BDAB7E5FF99300F544969E08DC7252DB70A981CB42
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0fb696ba087784006dbce477a3e9d607b9ee917e5fb6883c1674acb1b2a325f
                                  • Instruction ID: 1e585d4a836386724897aa2f03f4c40f04e07afdacf56724702e49b415fbe49a
                                  • Opcode Fuzzy Hash: f0fb696ba087784006dbce477a3e9d607b9ee917e5fb6883c1674acb1b2a325f
                                  • Instruction Fuzzy Hash: 54E2AD71609A8D8FEFA5DF28C898BD93BE0FF19300F544166D84DCB252DB74AA84CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /$h1v0$h1v0
                                  • API String ID: 0-2911751399
                                  • Opcode ID: 7437e8998ffb8284476cd896d3aacb842c231f0940ded5c24992b5dc62e8596f
                                  • Instruction ID: 028c99644c58d91f3b7c9de3f28eb6a4eb24588e6ebf88cd2b348d5343c70e44
                                  • Opcode Fuzzy Hash: 7437e8998ffb8284476cd896d3aacb842c231f0940ded5c24992b5dc62e8596f
                                  • Instruction Fuzzy Hash: 7AF1FD3061DB888FE7A5EB1CC4D8F9AB7E0FF9A300F154569E08DC7252CA75A981CB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `Yv0
                                  • API String ID: 0-649319420
                                  • Opcode ID: 71935fc91c4e3b0070588d7d3d0c0b0ba89489cc8bb2ba14dfa8a55ec37d6048
                                  • Instruction ID: 5b4189a4afcae683c9cf78ecb6a2f9e6122a7053733ef743d1f0885e511f32dd
                                  • Opcode Fuzzy Hash: 71935fc91c4e3b0070588d7d3d0c0b0ba89489cc8bb2ba14dfa8a55ec37d6048
                                  • Instruction Fuzzy Hash: AE2177A140D7C55FE782DB2894587597FF0EF56340F5805EBE0C9CB2A3D668A9888712
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88201f0986da24207378a7c9f4ff021fcdcc0638370abf5b4f095d8b0dbc82f0
                                  • Instruction ID: 29326f3f7a55b679160658841bff5d81b3078d1d408a955c9896a4d7f74d1c1d
                                  • Opcode Fuzzy Hash: 88201f0986da24207378a7c9f4ff021fcdcc0638370abf5b4f095d8b0dbc82f0
                                  • Instruction Fuzzy Hash: DBD1A122A1C9474FFB55EB2894597BC77D1EF59300F6401BAE08EC7293DFA8A8858385
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff89199819540c9300501253bfe58c38aee7b162d6b53945a4d715a2a13886ac
                                  • Instruction ID: 6c84a52cdbdc20f50060dcc8c1d48bc89daca25c34f4d9ae153d0173b6008fe4
                                  • Opcode Fuzzy Hash: ff89199819540c9300501253bfe58c38aee7b162d6b53945a4d715a2a13886ac
                                  • Instruction Fuzzy Hash: EBA18431A18A4A4FEB54EF1C98457E977E1FF59300F10457AE48EC7282DF78A9898782
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f9597172ec980eae02c1645709d20094a7bdb4873d438da6103d50d8c5a8217
                                  • Instruction ID: d55e9628457c49fd0a85112073a927cd47069e2c9a1173a44ad60ba987a0aeac
                                  • Opcode Fuzzy Hash: 6f9597172ec980eae02c1645709d20094a7bdb4873d438da6103d50d8c5a8217
                                  • Instruction Fuzzy Hash: 0DA1B170A1CA8D4EE765EF2898467F977D1FF4A300F5441AAD48DCB293CF78A9468381
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 729d47727f2eb011589a671025fb29d1f83be646d64ef92a8a1188068cf10401
                                  • Instruction ID: e82a2716c84589d44270733254d72179c583460c18763f6634b112de122654fb
                                  • Opcode Fuzzy Hash: 729d47727f2eb011589a671025fb29d1f83be646d64ef92a8a1188068cf10401
                                  • Instruction Fuzzy Hash: 6991E47160C68D4FEB65DF288846BE97BE1FF4A300F14457EE48ECB182DB74A5498782
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b74b3153f8179675f9b02c5b0710180c9b4975881ef6d49eefedeef9f26611ae
                                  • Instruction ID: 664595b5e1b02014f29fd7c18e3ab827aebc2485c52a684057ead3e4c84e5359
                                  • Opcode Fuzzy Hash: b74b3153f8179675f9b02c5b0710180c9b4975881ef6d49eefedeef9f26611ae
                                  • Instruction Fuzzy Hash: 8CB13C71908A8D9FEB91DF28C844BD93FE0FF1A344F5540A6E88DCB292DB74A984C751
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44857be78ff9199d3be78542acd04fd6e6adcda98c02fac995ad1fdefc77bdc2
                                  • Instruction ID: ab5b6e0b92735ae074a5a662c710e52b0f39f5b4235850be1c1d3d5a345e236a
                                  • Opcode Fuzzy Hash: 44857be78ff9199d3be78542acd04fd6e6adcda98c02fac995ad1fdefc77bdc2
                                  • Instruction Fuzzy Hash: 48A16E70918A8D8FEBA5EF28C849BE93BE0FF49305F40416AE84DC7152DF79A885C741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33cce73f3180155b482bd9e8d5cb791e93f28e30941aa42bdb9fc62db3623c8f
                                  • Instruction ID: 504553e0f2bf5133f8f9c73e86e2f99e3a42ab43cfeae4214ca78c8f79915e47
                                  • Opcode Fuzzy Hash: 33cce73f3180155b482bd9e8d5cb791e93f28e30941aa42bdb9fc62db3623c8f
                                  • Instruction Fuzzy Hash: 1D71F952B0CA8A0FF785EB2C585A7797BD1EF9A250F1440BBD48EC72D3DD686C868341
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fedea7791c8d4bb7d73c7746af2716c6a90a36b930be3978a6f15093dd0dd4a1
                                  • Instruction ID: 6c57fc030d21b772944c014d0d5c388f0bc14ca6141c366c7ec012558d61391f
                                  • Opcode Fuzzy Hash: fedea7791c8d4bb7d73c7746af2716c6a90a36b930be3978a6f15093dd0dd4a1
                                  • Instruction Fuzzy Hash: A291A462A1C5864FF745DB288859BA87BE1FF55300F6441BAD08ECB293DBA8BCC5C741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f7e8ee7428cb68960863db53b17d1b1234af562ac2b3f9b46a7fa04058d9c0b
                                  • Instruction ID: 014074234544259b6311cfd0ed5185e3ca867d2713223bcf564c1efe9fb60175
                                  • Opcode Fuzzy Hash: 3f7e8ee7428cb68960863db53b17d1b1234af562ac2b3f9b46a7fa04058d9c0b
                                  • Instruction Fuzzy Hash: AD915C7051898D9FEB95EF28C888BE93BE0FF59355F50416AF84EC7192DB74A8848740
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7522444826b223cab81dfe5053ae671eb4f530914c9e8e353e00288809ecefe
                                  • Instruction ID: 39ea120524ed4838d00d4c3203820eefbfb6c6a50042ecc70e4725bbc020b45c
                                  • Opcode Fuzzy Hash: c7522444826b223cab81dfe5053ae671eb4f530914c9e8e353e00288809ecefe
                                  • Instruction Fuzzy Hash: 2751FD22A0C64A5FEB55EF2894557B93BE1FF4A311F5400BBE48ECB283CE69F8458741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38abf7808e6891ef93f942de849985658e9032b8c763a92575beaf988d26c060
                                  • Instruction ID: c18b4be3344b5b23cdde8b568e0c31033514b405916dc57b4760c6d126155339
                                  • Opcode Fuzzy Hash: 38abf7808e6891ef93f942de849985658e9032b8c763a92575beaf988d26c060
                                  • Instruction Fuzzy Hash: C351A171508B8C8FEBA5DF18C889BE93BE0FB09310F50416AE48DCB252DF74A549C741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 15d189f1eeb04c2cd2b91fc834850b0260e1eac213c16afbed85978022ac0812
                                  • Instruction ID: 8daa43fb86968de2eec9cc8985ca7a1c542d4ed393c48edc3640f9f24a2d8f14
                                  • Opcode Fuzzy Hash: 15d189f1eeb04c2cd2b91fc834850b0260e1eac213c16afbed85978022ac0812
                                  • Instruction Fuzzy Hash: 09411D2270CA4A0FE785E76C489D77837D2EF9D210F5944B6D44DCB193CE689C898340
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 254f4fe8e418f0364cc9054692bdb1f1e3bf37255e72fdc863720b4b57488001
                                  • Instruction ID: 87dee251d51ebcae53eb98fd83716fc0fcd12da62ce890f00011970499ef67ce
                                  • Opcode Fuzzy Hash: 254f4fe8e418f0364cc9054692bdb1f1e3bf37255e72fdc863720b4b57488001
                                  • Instruction Fuzzy Hash: 5651B371618A4D8FEBB4DF18DC4A7E937E1FB59300F54406AD84DC7282DE74A9898781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75e61ec006c794a5146205d19414da6ceb2f366276f22edb70530f3481092f73
                                  • Instruction ID: 900f4d4613b573fbd29b2616cb88b14929bb1f24e3abd5e5d294e8fa53c8a3da
                                  • Opcode Fuzzy Hash: 75e61ec006c794a5146205d19414da6ceb2f366276f22edb70530f3481092f73
                                  • Instruction Fuzzy Hash: EA41EB22A0DB865FE741DB5844497697BE0FF4D204F5401BAD5CECB283DE68EC888341
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a97ed58c98bc089332f18eadf7c5d28b2ff04c6b3d145aea494134a267bdf68
                                  • Instruction ID: cf227432489ae99e89c074a2f03b37b3f893f3002a626c9a09e24179a43501e9
                                  • Opcode Fuzzy Hash: 3a97ed58c98bc089332f18eadf7c5d28b2ff04c6b3d145aea494134a267bdf68
                                  • Instruction Fuzzy Hash: AC411722A0D78B0FF796D76855963657BE1EF56211F2440FAD08ECE183DE9DA8898340
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0704d12df6cb022c5156bde5adf15268d93c03ca05cf5c2b561a0e63998976d3
                                  • Instruction ID: 207e1744f50b46a8b6bc3143b5d3983725a7f1026c82b6ce27d479c1a9751ec1
                                  • Opcode Fuzzy Hash: 0704d12df6cb022c5156bde5adf15268d93c03ca05cf5c2b561a0e63998976d3
                                  • Instruction Fuzzy Hash: A3418512F0DACA0FF786EB3408696796EF1AF5A21075944FBD48ECB193DD5CAC898311
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9678ac8dc1b6b9c179ed1ad89fbecd8c3d23530be2d3f9caf334a8d6aae0f10f
                                  • Instruction ID: 83371d8916f8265f8af6a5fdd3b765a360929b30921845632a4b71470a76d143
                                  • Opcode Fuzzy Hash: 9678ac8dc1b6b9c179ed1ad89fbecd8c3d23530be2d3f9caf334a8d6aae0f10f
                                  • Instruction Fuzzy Hash: 6441853190C6869FEB45EF2484987697BA0EF16300F2540FAD44ECF193CF74A9899701
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47e74bbb8ec168031c75f35e34b070479cccc916e4c61cdb67860eeec72213cb
                                  • Instruction ID: c4b92c2a09ddf4e5db5cdf17caffe66a1e81fb13daaba063d633e8f668d82999
                                  • Opcode Fuzzy Hash: 47e74bbb8ec168031c75f35e34b070479cccc916e4c61cdb67860eeec72213cb
                                  • Instruction Fuzzy Hash: FC318312F1994B0FF792A728185937C66D2AF96210F6844BBD44EC7297DE9CACC98341
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57dc0b10859b277aff4d795e967511900125149bd2b7cd4265567466b46b4899
                                  • Instruction ID: f3c962b7f91902281426dc42b451447a7be1133889b498e8b8cf621499497070
                                  • Opcode Fuzzy Hash: 57dc0b10859b277aff4d795e967511900125149bd2b7cd4265567466b46b4899
                                  • Instruction Fuzzy Hash: 4541F76250DBCA4FE742DB2888557A97FB0EF5B314F1801EAE48DCB1D3DB286889C751
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96a10f8de96cd7d4656b993cb05655586ba239e7d937650fcac9b7f2b87009e9
                                  • Instruction ID: 3e5e6390ecda1fb3b084d7ac395c57b8e9976941b4d1370460c4d810cd717b76
                                  • Opcode Fuzzy Hash: 96a10f8de96cd7d4656b993cb05655586ba239e7d937650fcac9b7f2b87009e9
                                  • Instruction Fuzzy Hash: 4431727160868D4FEBA5DF28D849BEC7BE0FB45301F6441AAD48DCE182DB78A589C741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e289357f6251b7fb729b3f87363bef570f3a9d6b58b1b8f7d233ba895f3d4451
                                  • Instruction ID: 9faf3339be18c97516b33005f0925e4e05d72b28a4fd47cc7e2327859dab10b7
                                  • Opcode Fuzzy Hash: e289357f6251b7fb729b3f87363bef570f3a9d6b58b1b8f7d233ba895f3d4451
                                  • Instruction Fuzzy Hash: C231D822A1CB4B5BF750DA58554936976E0FB8C308F14017FE5CEC7282DBB8E9888241
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e36f1c97d22762c412565e182a36ba0cb4f99550d145b4872a48c04661ce469a
                                  • Instruction ID: 6ad23fc5cbca0d7dcb22dff4844a47df9718a9f823b7bea74be850bed0133651
                                  • Opcode Fuzzy Hash: e36f1c97d22762c412565e182a36ba0cb4f99550d145b4872a48c04661ce469a
                                  • Instruction Fuzzy Hash: 8121463161CB891FE764CB5CD886BBA7BE0FB99311F04047FE08DC7282DB6899848742
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62143b2292758bc3f102f78009bde8cde206fa8311537c95d6d93d94db820b36
                                  • Instruction ID: a6e1e78deb9aece948a7e5a861b181010084a6828448243bc9134c5518e2ffe5
                                  • Opcode Fuzzy Hash: 62143b2292758bc3f102f78009bde8cde206fa8311537c95d6d93d94db820b36
                                  • Instruction Fuzzy Hash: B2218322B58A0B0FF758AA6C54457BD72D1EB58351F20053EE48FC7283DE99F8C54245
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f6ccf45e8958e3e5694f67385f4a35f2797571d782997576ce9720b9a26ebc7
                                  • Instruction ID: 86c70613e0a8abb6412cb43c41bbd761fbaf25278bb1612d9913c8c817a90896
                                  • Opcode Fuzzy Hash: 2f6ccf45e8958e3e5694f67385f4a35f2797571d782997576ce9720b9a26ebc7
                                  • Instruction Fuzzy Hash: 9E219531E086469FE745EF28C498B697BA1EF5A300B2444FAD44ECF192CF79E885D700
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f85d89f8a698bd2a91cb0a1c0b2310cc7b7149c243728441270cf98b93451b8
                                  • Instruction ID: 7bbaa9be4098e0c34df797f9708c4216ad51e447216c2d4eb5c9b2532d397f4d
                                  • Opcode Fuzzy Hash: 0f85d89f8a698bd2a91cb0a1c0b2310cc7b7149c243728441270cf98b93451b8
                                  • Instruction Fuzzy Hash: 70115A52E0E7C50FE747973849A53156FB2AF97240B5A40E7C188CF1D3D9689C49C321
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76ec155c8d25ccc582c2b410daa825f780f0df4162339e349b17fa5eaf1760c9
                                  • Instruction ID: 541cde2cb6faeaeb0e1bdeac2c388c2992a0d638b1844c49b0163b56a106ec3e
                                  • Opcode Fuzzy Hash: 76ec155c8d25ccc582c2b410daa825f780f0df4162339e349b17fa5eaf1760c9
                                  • Instruction Fuzzy Hash: D301F902F0D98B0FF386BB34182933D99E1AF86240B6944F6D48ECB193DE1CAC858300
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f41e05bbb83a52c94d6dec9620abbf6ee305edbe98f02c4d948ac7b5d8752e1f
                                  • Instruction ID: 4c2035a99c8f0606b4d16962b8aa7e08313ca50299f98fdc68896c7a4d7ee254
                                  • Opcode Fuzzy Hash: f41e05bbb83a52c94d6dec9620abbf6ee305edbe98f02c4d948ac7b5d8752e1f
                                  • Instruction Fuzzy Hash: FE01B952F0E99B4FF742B734092933E59E1AF96240B6944F6D48ECB197DD6CAC858310
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1223fea559c6739189930a591883526027c62a5775c2d0c825241c2ff87ea7d3
                                  • Instruction ID: 951bc866812b4475002f0bf7dfbae46b7495cf645bb8134c7c2e2dde9718fd38
                                  • Opcode Fuzzy Hash: 1223fea559c6739189930a591883526027c62a5775c2d0c825241c2ff87ea7d3
                                  • Instruction Fuzzy Hash: CD018412F1D99A4FF782A734182937D6AE2AF46240B9944F6D48ECB197DD6CA8858310
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6519ad51ef6729046de5870b0813b22253637b1799371b69cb3bb0240550e41
                                  • Instruction ID: 02a4786c58a3c391cd878a4f6c8f59fa6fbe41716481debece767f766478fdff
                                  • Opcode Fuzzy Hash: a6519ad51ef6729046de5870b0813b22253637b1799371b69cb3bb0240550e41
                                  • Instruction Fuzzy Hash: DE017E12F1D9970FF746F734142A37D99E19F56240B6944F6D48ECB2A3DD5C6C858310
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57e8d8baac1023a2bd943c6c1cd496a3cf8e6a92eb3c9cefcc59a79d2989f5d6
                                  • Instruction ID: e09990c2366325266bed48a06ed7c32dbfacc1ec1750d4ae36cfb413bf48654f
                                  • Opcode Fuzzy Hash: 57e8d8baac1023a2bd943c6c1cd496a3cf8e6a92eb3c9cefcc59a79d2989f5d6
                                  • Instruction Fuzzy Hash: A3019612F0D99A0FF792A734041937E9AE1AF56240B5944F6D48ECB1D3DD5CA8858310
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e3618c5e6c6d22e52fab81a6686b51c2aed9d6d37b17a105f61333def1d491f
                                  • Instruction ID: 3dd8c363cfcb66d3778b8ab944692e15ad3ffb3d16e2f2777cff2a2e745a9f51
                                  • Opcode Fuzzy Hash: 3e3618c5e6c6d22e52fab81a6686b51c2aed9d6d37b17a105f61333def1d491f
                                  • Instruction Fuzzy Hash: 81014913D5DAC71FF34ADB24AD527687B70FF82240F94557AE089CB1C3D98C68858302
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0bab5f1199c4b00939f619324e8ae78ee712ca845b89a1b0441681de2d942ad
                                  • Instruction ID: e7bf01995108947f940bd59aec9efa1aaccc65f2ec382b44a78561fb79b31a6e
                                  • Opcode Fuzzy Hash: f0bab5f1199c4b00939f619324e8ae78ee712ca845b89a1b0441681de2d942ad
                                  • Instruction Fuzzy Hash: E2F04613B18E4B1BEB400ABC68A83F4B7C1EB9D222FA404BBC146CB395D98C68C58344
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4db8a1c4125001d562c082b03469aaebaaf3b718f8986b0b8482828d96dce920
                                  • Instruction ID: 623a6073c6f63443bf044ef2145b670ffe490473aaa5219b68a222463b4f2098
                                  • Opcode Fuzzy Hash: 4db8a1c4125001d562c082b03469aaebaaf3b718f8986b0b8482828d96dce920
                                  • Instruction Fuzzy Hash: BCF0C811F0CA5A0FE746AB385454379E6E1EF8B281B5540F2D44DCB297DE6DAC85C320
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60853338ebf1113ca274200d4eb173e0e3e520898d830c1f7720ad3573d7fa29
                                  • Instruction ID: bf17c7a3e933b0ec1f8abb7c8ad71ac34cd77965f357f96c9412cb0e30fd56f9
                                  • Opcode Fuzzy Hash: 60853338ebf1113ca274200d4eb173e0e3e520898d830c1f7720ad3573d7fa29
                                  • Instruction Fuzzy Hash: 31F0A01278EE490BD71C956E3C9D27537D1C7E9222B1801BFE409C7297DC905C8D83D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20c94fdcf09aa61ffe6dd2608258e52c57dee20b64de167efa8415b774d44d81
                                  • Instruction ID: eb24c8146379181b38d9f7bf218962cd36c7f79c8ef5118cadc9adc9e3ded719
                                  • Opcode Fuzzy Hash: 20c94fdcf09aa61ffe6dd2608258e52c57dee20b64de167efa8415b774d44d81
                                  • Instruction Fuzzy Hash: C4F0C272808A4D8FEB50DF04D4453A83FA0FF64301F6141DAE44ECF151D378E9898741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52126746ac202366dae0d369b834b2f655b2381deb68e26daa596b1de19faa96
                                  • Instruction ID: bcdc9a4e5fc4da5bf9b06bd7ad72266a555d47f6a7780a263b319324e3265506
                                  • Opcode Fuzzy Hash: 52126746ac202366dae0d369b834b2f655b2381deb68e26daa596b1de19faa96
                                  • Instruction Fuzzy Hash: 63F0E922A18A060FE749DA6C8C9A37437D2DB58211F1846B6D84AC62D3E999D8848380
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5aa4f5d14ce2f2255a9b4b280bc489d79da5f42dbdb1e83b6ae81843d0cd43c3
                                  • Instruction ID: 89111ddbbb41ad88db2a88e44c1b226061f8bf9ba0e909f37badcf02145eb285
                                  • Opcode Fuzzy Hash: 5aa4f5d14ce2f2255a9b4b280bc489d79da5f42dbdb1e83b6ae81843d0cd43c3
                                  • Instruction Fuzzy Hash: ADF0A4A160C7864EFB558F6984A57607FB1AF1A200F6900EAC84DCD1C7D6ACD848C351
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 684bac0eb82ad96c47f1546701255fd0955758fff67af5a0d37d8dc73c710c63
                                  • Instruction ID: af4b8ccc7f5b4dd153d81674249628b7cb25b10878f8695076e3e418a449d15a
                                  • Opcode Fuzzy Hash: 684bac0eb82ad96c47f1546701255fd0955758fff67af5a0d37d8dc73c710c63
                                  • Instruction Fuzzy Hash: 86F02763A6C84B47F744EB68598A27877B0FF46240F604939D08ED5193CDACB8C0C205
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95767df3709d84318517eddd43d37463da5247a75921752e37ce77706b7514e0
                                  • Instruction ID: d6ec39bc046771bb810e2f6965744ce9bea18b764b159876a6a1295e50a1d76b
                                  • Opcode Fuzzy Hash: 95767df3709d84318517eddd43d37463da5247a75921752e37ce77706b7514e0
                                  • Instruction Fuzzy Hash: 8FF0627191DB854FE3A1DF54C496AEA77E0FF99710F40046DC089D7152DB786881CB02
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7213f6c729134d1ebd914ccbcd0c4c06a1fc287d580626701d80231b4916160
                                  • Instruction ID: 8cdd9786fd1a5ee206990ef57e5d89c44705fb4366792af161a10b811662ace2
                                  • Opcode Fuzzy Hash: b7213f6c729134d1ebd914ccbcd0c4c06a1fc287d580626701d80231b4916160
                                  • Instruction Fuzzy Hash: BFE02B53A0C65F0FF749DB2494A163837E0EF8629275400B7D48EDF183CA4D6C898360
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1195469011.00007FF9D1DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9D1DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ff9d1db0000_Samsung_Driver_Installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3f4e3c38065621fc65e9efac6eb0c008bc8d8796005a7108be6348470b77cff
                                  • Instruction ID: d9a476ccec74179c4d8a91d3ffdbcc2aeb10365a56284507e3c365d511136eed
                                  • Opcode Fuzzy Hash: d3f4e3c38065621fc65e9efac6eb0c008bc8d8796005a7108be6348470b77cff
                                  • Instruction Fuzzy Hash: FED01215B1480A0BE959B36C24913BD02C3DBC9226F955036E44DD23C6CD0E1C476381
                                  Uniqueness

                                  Uniqueness Score: -1.00%