Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe

Overview

General Information

Sample name:SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
Analysis ID:1430330
MD5:61144b1d8168af54da7f364640019e2c
SHA1:091838658ea6001e64291d5541508bbb7b42f77e
SHA256:9cfe6496621b2695f95bfabfe9baab9f167a168dd633d3c9271f86d168699cdd
Tags:exe
Infos:

Detection

Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Query firmware table information (likely to detect VMs)
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\work\dtl_dep\utility\company_lib\core\softconfig\build\abroad\Release\softconfig.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.dr
Source: Binary string: F:\DTL6\dtl_install\project\DTLInstaller_duilib\Release_NU\DTLInstaller_NU.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: f:\work\code\svn_108\dtl_dep\utility\company_lib\core\substat\project\Release_en\substat.pdb M source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3423045526.000000006E86D000.00000002.00000001.01000000.00000006.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004495000.00000004.00000020.00020000.00000000.sdmp, substat.dll.0.dr
Source: Binary string: \DTInstUI\bulid\Release\DTInstUI.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422917435.000000006D2BA000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004169000.00000004.00000020.00020000.00000000.sdmp, DTInstUI.dll.0.dr
Source: Binary string: D:\tunk_dtl_dep\utility\company_lib\core\pcid\build\base\Release\pcid.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, pcid.dll.0.dr
Source: Binary string: f:\work\code\svn_108\dtl_dep\utility\company_lib\core\substat\project\Release_en\substat.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3423045526.000000006E86D000.00000002.00000001.01000000.00000006.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004495000.00000004.00000020.00020000.00000000.sdmp, substat.dll.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: z:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: y:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: x:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: w:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: v:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: u:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: t:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: s:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: r:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: q:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: p:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: o:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: n:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: m:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: l:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: k:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: j:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: i:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: h:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: g:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: f:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2C521 FindFirstFileW,GetFullPathNameW,SetLastError,lstrlenW,_wcsrchr,_wcsrchr,0_2_00E2C521
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E22BD5 GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,_memset,PathAddBackslashW,QueryDosDeviceW,PathAddBackslashW,PathAddBackslashW,0_2_00E22BD5
Source: global trafficUDP traffic: 192.168.2.6:60599 -> 209.58.131.173:3800
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: dispatch.integrate.drivethelife.com
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://bbs.160.com/forum-66-1.html
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bbs.160.com/forum-66-1.html0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.000000000097F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabjA
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.000000000097F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://install.integrate.drivethelife.com/common/IntegrateInstallStat.ashx
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://install.integrate.drivethelife.com/common/IntegrateInstallStat.ashx.
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://int.softconfig.drivethelife.com/server.ashx?type=%d
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drString found in binary or memory: http://int.softconfig.drivethelife.com/server.ashx?type=%dhttp://int.updrv.com/dtl/server.ashx?type=
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://int.updrv.com/common/IntegrateUnInstallStat.ashx
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://int.updrv.com/dtl/server.ashx?type=%d
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://s2.symcb.com0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sf.symcb.com
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sf.symcb.com/sf.crl0a
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sf.symcd.com0&
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://sv.symcd.com0&
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://www.drivethelife.com/
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.drivethelife.com/D
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://www.drivethelife.com/EULA.html
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drString found in binary or memory: http://www.openssl.org/support/faq.html
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drString found in binary or memory: http://www.openssl.org/support/faq.html....................
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://www.ostoto.com/licence/EULA-for-OSToto-Driver-Talent.html
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ostoto.com/licence/EULA-for-OSToto-Driver-Talent.html3
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://www.ostoto.com/web/install/%d/1
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ostoto.com/web/install/%d/1d?/
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: http://www.ostoto.com/web/uninstall/%d/1
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.sy
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E28968 ExitWindowsEx,0_2_00E28968
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E486A00_2_00E486A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E247120_2_00E24712
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E3187C0_2_00E3187C
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E720D90_2_00E720D9
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E331450_2_00E33145
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E652E70_2_00E652E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E5C2C00_2_00E5C2C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E692AF0_2_00E692AF
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E6E2900_2_00E6E290
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E3320D0_2_00E3320D
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E5E3DD0_2_00E5E3DD
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E4A4D00_2_00E4A4D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E544960_2_00E54496
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E474600_2_00E47460
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E645A60_2_00E645A6
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E3F6B30_2_00E3F6B3
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E687CF0_2_00E687CF
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E4B7260_2_00E4B726
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E6571C0_2_00E6571C
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E408C70_2_00E408C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E6B8CC0_2_00E6B8CC
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E7089E0_2_00E7089E
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2782D0_2_00E2782D
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E51AF00_2_00E51AF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E64A9A0_2_00E64A9A
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E4CA000_2_00E4CA00
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E47BE00_2_00E47BE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E33BDD0_2_00E33BDD
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E46CF00_2_00E46CF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E48CF10_2_00E48CF1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E48C500_2_00E48C50
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E45DC00_2_00E45DC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E32D860_2_00E32D86
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E68D3F0_2_00E68D3F
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: String function: 00E4E0C0 appears 55 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: String function: 00E2D9AF appears 37 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: String function: 00E2E753 appears 41 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: String function: 00E56770 appears 54 times
Source: DTInstUI.dll.0.drStatic PE information: Resource name: ZIP type: Zip archive data, at least v1.0 to extract, compression method=store
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004495000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesubstat.dll, vs SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3423076833.000000006E877000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamesubstat.dll, vs SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: substat.dll.0.drBinary string: %d IsWow64Processkernel32GetSystemFirmwareTablekernel32.dllROOT\WMIMSSMBios_RawSMBiosTablesSmbiosMajorVersionSmbiosMinorVersionSMBiosData\device\physicalmemoryntdll.dllZwOpenSectionZwMapViewOfSectionZwUnmapViewOfSectionZwCloseH
Source: pcid.dll.0.drBinary string: PCI{1A3E09BE-1E45-494B-9174-D7385B45BBF5}\\.\#{ad498944-762f-11d0-8dcb-00c04fc3358c}maclen[%d]CPCIDCalculator::CalculatePCID..\..\project\src\PCIDCalculator.cppcpulen[%d]bioslen[%d]GetDiskEx drive[%d] ret[%d]GetDisk drive[%d] ret[%d]disklen[%d][%d]:[%2x]GetSystemFirmwareTablekernel32.dllROOT\WMIMSSMBios_RawSMBiosTablesSmbiosMajorVersionSmbiosMinorVersionSMBiosData\device\physicalmemoryntdll.dllZwOpenSectionZwMapViewOfSectionZwUnmapViewOfSectionZwClosevector<T> too longm_cAssetTagNumber:%d
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drBinary or memory string: ...Slnt
Source: classification engineClassification label: mal42.evad.winEXE@1/16@4/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E3FC89 GetLastError,FormatMessageA,0_2_00E3FC89
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E229D4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_00E229D4
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E27203 __EH_prolog3_catch_GS,FindWindowW,PostMessageW,CreateToolhelp32Snapshot,0_2_00E27203
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2C69C FindResourceW,LoadResource,0_2_00E2C69C
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2111A OpenSCManagerW,OpenServiceW,QueryServiceStatusEx,QueryServiceStatusEx,StartServiceW,QueryServiceStatusEx,0_2_00E2111A
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{A043B702-166A-4FB8-9733-E2BC4713F36F}33
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile created: C:\Users\user\AppData\Local\Temp\Hot96EC.tmpJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: DAR00_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: DAR0_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: DAR20_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: global_app_id0_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: InstallPath0_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: DTLSE_OnInstall0_2_00E21F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCommand line argument: ~&0_2_00E625D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile read: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\instlan\English.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: <soft><softid>%d</softid><name>%s</name><describe>%s</describe><url>%s</url><checked>%d</checked> <installparam>%s</installpar
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: Khttp://install.integrate.drivethelife.com/common/IntegrateInstallStat.ashx
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: -start
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeString found in binary or memory: 'http://www.ostoto.com/web/install/%d/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile written: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\instlan\Armenian.iniJump to behavior
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic file information: File size 12960432 > 1048576
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xc21e00
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\work\dtl_dep\utility\company_lib\core\softconfig\build\abroad\Release\softconfig.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.dr
Source: Binary string: F:\DTL6\dtl_install\project\DTLInstaller_duilib\Release_NU\DTLInstaller_NU.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: f:\work\code\svn_108\dtl_dep\utility\company_lib\core\substat\project\Release_en\substat.pdb M source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3423045526.000000006E86D000.00000002.00000001.01000000.00000006.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004495000.00000004.00000020.00020000.00000000.sdmp, substat.dll.0.dr
Source: Binary string: \DTInstUI\bulid\Release\DTInstUI.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422917435.000000006D2BA000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004169000.00000004.00000020.00020000.00000000.sdmp, DTInstUI.dll.0.dr
Source: Binary string: D:\tunk_dtl_dep\utility\company_lib\core\pcid\build\base\Release\pcid.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, pcid.dll.0.dr
Source: Binary string: f:\work\code\svn_108\dtl_dep\utility\company_lib\core\substat\project\Release_en\substat.pdb source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3423045526.000000006E86D000.00000002.00000001.01000000.00000006.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.0000000004495000.00000004.00000020.00020000.00000000.sdmp, substat.dll.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_01ACE930 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_01ACE930
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E4F47C push ecx; ret 0_2_00E4F48F
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E567B5 push ecx; ret 0_2_00E567C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E58728 push edx; ret 0_2_00E58729
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile created: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\DTInstUI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile created: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\pcid.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile created: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\substat.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeFile created: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\softconfig.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2111A OpenSCManagerW,OpenServiceW,QueryServiceStatusEx,QueryServiceStatusEx,StartServiceW,QueryServiceStatusEx,0_2_00E2111A
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E54496 __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E54496
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E210940_2_00E21094
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\DTInstUI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\pcid.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\substat.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\softconfig.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-34754
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeAPI coverage: 8.5 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E210940_2_00E21094
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2C521 FindFirstFileW,GetFullPathNameW,SetLastError,lstrlenW,_wcsrchr,_wcsrchr,0_2_00E2C521
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E22BD5 GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,_memset,PathAddBackslashW,QueryDosDeviceW,PathAddBackslashW,PathAddBackslashW,0_2_00E22BD5
Source: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeAPI call chain: ExitProcess graph end nodegraph_0-35513
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeAPI call chain: ExitProcess graph end nodegraph_0-35313
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E671A1 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00E671A1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E2764D _memset,SHGetSpecialFolderPathW,_memset,__swprintf,OutputDebugStringW,OutputDebugStringW,_memset,GetLastError,__swprintf,OutputDebugStringW,SetEnvironmentVariableW,_memset,GetLastError,__swprintf,OutputDebugStringW,0_2_00E2764D
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_01ACE930 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_01ACE930
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E74433 GetProcessHeap,0_2_00E74433
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E58BC7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E58BC7
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E58BA4 SetUnhandledExceptionFilter,0_2_00E58BA4
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E21E30 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexW,GetLastError,FindWindowW,SwitchToThisWindow,0_2_00E21E30
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E547A7 cpuid 0_2_00E547A7
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: GetLocaleInfoW,0_2_00E6702D
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,0_2_00E63248
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,InterlockedDecrement,0_2_00E6420E
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,0_2_00E663B8
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__calloc_crt,__invoke_watson,0_2_00E5A5E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00E67598
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,0_2_00E666E5
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,0_2_00E66668
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: EnumSystemLocalesW,0_2_00E66628
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,0_2_00E66768
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00E6384C
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: GetLocaleInfoW,0_2_00E6695B
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00E66A83
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: GetLocaleInfoW,_GetPrimaryLen,0_2_00E66B30
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: _memset,_TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,0_2_00E66C04
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E508F5 GetSystemTimeAsFileTime,__aulldiv,0_2_00E508F5
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeCode function: 0_2_00E60779 __lock,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00E60779
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
3
Command and Scripting Interpreter
1
Windows Service
1
Access Token Manipulation
1
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Service Execution
1
DLL Side-Loading
1
Windows Service
1
Disable or Modify Tools
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)1
DLL Side-Loading
1
Access Token Manipulation
Security Account Manager241
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
Obfuscated Files or Information
LSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials11
Peripheral Device Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync4
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem23
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe13%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\DTInstUI.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\pcid.dll2%ReversingLabs
C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\softconfig.dll5%ReversingLabs
C:\Users\user\AppData\Local\Temp\Hot96EC.tmp\substat.dll4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://int.updrv.com/dtl/server.ashx?type=%d0%Avira URL Cloudsafe
http://int.updrv.com/common/IntegrateUnInstallStat.ashx0%Avira URL Cloudsafe
https://d.sy0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
online1.integrate.drivethelife.com
209.58.131.173
truefalse
    high
    dispatch.integrate.drivethelife.com
    209.58.131.173
    truefalse
      high
      behaviorgather.integrate.drivethelife.com
      209.58.131.173
      truefalse
        high
        int.softconfig.drivethelife.com
        unknown
        unknownfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.ostoto.com/web/install/%d/1d?/SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://int.updrv.com/dtl/server.ashx?type=%dSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
            • Avira URL Cloud: safe
            unknown
            http://www.ostoto.com/licence/EULA-for-OSToto-Driver-Talent.html3SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.openssl.org/support/faq.html....................SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drfalse
                high
                http://www.symauth.com/rpa00SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drfalse
                  high
                  http://install.integrate.drivethelife.com/common/IntegrateInstallStat.ashx.SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://bbs.160.com/forum-66-1.htmlSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                      high
                      https://d.sySecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://int.softconfig.drivethelife.com/server.ashx?type=%dSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                        high
                        http://www.drivethelife.com/SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                          high
                          http://install.integrate.drivethelife.com/common/IntegrateInstallStat.ashxSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                            high
                            http://www.ostoto.com/web/uninstall/%d/1SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                              high
                              http://bbs.160.com/forum-66-1.html0SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.symauth.com/cps0(SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, DTInstUI.dll.0.dr, pcid.dll.0.dr, substat.dll.0.drfalse
                                  high
                                  http://int.updrv.com/common/IntegrateUnInstallStat.ashxSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.drivethelife.com/EULA.htmlSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                                    high
                                    http://www.ostoto.com/web/install/%d/1SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                                      high
                                      https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drfalse
                                        high
                                        http://www.openssl.org/support/faq.htmlSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drfalse
                                          high
                                          http://int.softconfig.drivethelife.com/server.ashx?type=%dhttp://int.updrv.com/dtl/server.ashx?type=SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3422603402.000000006D1BD000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000003.2162319807.00000000042BE000.00000004.00000020.00020000.00000000.sdmp, softconfig.dll.0.drfalse
                                            high
                                            http://www.drivethelife.com/DSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe, 00000000.00000002.3419066406.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.ostoto.com/licence/EULA-for-OSToto-Driver-Talent.htmlSecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exefalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                209.58.131.173
                                                online1.integrate.drivethelife.comUnited States
                                                7203LEASEWEB-USA-SFO-12USfalse
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1430330
                                                Start date and time:2024-04-23 14:39:14 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 6m 33s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:5
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                Detection:MAL
                                                Classification:mal42.evad.winEXE@1/16@4/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 33
                                                • Number of non-executed functions: 127
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                209.58.131.173DriverTalent_111_8_1_5_16Get hashmaliciousUnknownBrowse
                                                  n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                    n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      online1.integrate.drivethelife.comDriverTalent_111_8_1_5_16Get hashmaliciousUnknownBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      behaviorgather.integrate.drivethelife.comDriverTalent_111_8_1_5_16Get hashmaliciousUnknownBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      dispatch.integrate.drivethelife.comDriverTalent_111_8_1_5_16Get hashmaliciousUnknownBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      n7Vvc3eoSX.exeGet hashmaliciousBabadeda, VidarBrowse
                                                      • 209.58.131.173
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      LEASEWEB-USA-SFO-12USfile.exeGet hashmaliciousUnknownBrowse
                                                      • 23.106.238.238
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.106.238.238
                                                      o2mV9s50D5.elfGet hashmaliciousMiraiBrowse
                                                      • 142.91.171.245
                                                      xQwEu422am.elfGet hashmaliciousMiraiBrowse
                                                      • 23.108.167.236
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.106.238.238
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.106.238.238
                                                      http://midjourney.coGet hashmaliciousUnknownBrowse
                                                      • 23.81.165.11
                                                      z3LCu8rCpN.elfGet hashmaliciousMiraiBrowse
                                                      • 23.108.120.209
                                                      x86.elfGet hashmaliciousMiraiBrowse
                                                      • 142.91.37.62
                                                      https://digitalmissioners.comGet hashmaliciousUnknownBrowse
                                                      • 23.81.165.11
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1410736
                                                      Entropy (8bit):7.504942644396103
                                                      Encrypted:false
                                                      SSDEEP:24576:67szuWfBpQgHQeZYzrRJXG+y7Cz39X50Uk8e8Fa53AzB9Q:p/OVyQ39J0UkMap4Q
                                                      MD5:301BC53BE97D7F122FBD2CCFF6D196B8
                                                      SHA1:FCCAB579B8CF0A723FE917C0C1DF67194DE6B977
                                                      SHA-256:9576B6749E538B2E8FC1A8BBDD8CF5135F31C5BF9F297DE6CE35602E0D8C013F
                                                      SHA-512:04D3B3F3C240A51EAB4FF3C42E5FFC0BB59AFF054637E203C86C16275240361C70D3CB80F1EA525B2F674F98838CB41F1A2F52710DC151A269F1AA3F57B5B30C
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8.[jY..jY..jY..M...kY..c!..qY..c!..-Y..c!...Y..M.|.gY..M.j.qY..jY..0X..c!..TY..c!..kY..t...kY..c!..kY..RichjY..........PE..L.....Y...........!.................]....................................................@.......................................... ...............R...4......Ll..................................s..@............................................text...M........................... ..`.rdata..............................@..@.data...,Z.......:..................@....rsrc........ ......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):2002
                                                      Entropy (8bit):4.3703707325215095
                                                      Encrypted:false
                                                      SSDEEP:48:rKs/Z8XrvU1SG8wsiFeUNuCX99IQJm9mCbmx+d8dtmL+SmeA+ImWUPmoddJQYQ:rKs/6TnG8L+NuCXfIQJm9mCbmxzXmL+d
                                                      MD5:477E56882AF75A082F45CFB4E67BC834
                                                      SHA1:575D1FA531BFD3A04BBB67805791C8CF2DF5503E
                                                      SHA-256:DC8216486E3007C03E2E43964983401DF699D9E86398974BB79470CCC5F0FF5C
                                                      SHA-512:CB16BDAF10297BCDEF49425DD75192B59F05D5C16CFC26FEF400DBAC3F1BBA75EB5D72F542895B43FC74650FC3C0C0CE25F7A8A7C6C0FDABADC195BA3242DB05
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.2.e.|.v.~.x...t. .g. .D.r.i.v.e.r. .T.a.l.e.n.t. ...e.r.a.d...t.a.v. .p.a.t.a.........S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.2.a...k. .c.a.l.x...}... .D.r.i.v.e.r. .T.a.l.e.n.t.-. .k. ...c...a.c.x...n.x...t.h.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.O.e.r.a.d...e.l.x.~. .o.a.t. ...c...a.c.x...n.e.l.x.~. .a.u.}. .a.z...a.v...h.,. .d.x..... .p.a.t.a.q.a.u.v.x...t. .e... .<.a.>. .<.u.>. .D.r.i.v.e.r. .T.a.l.e.n.t. .l.k...e.v.f.a.u.k.v. .z.a.u.t.a.v.a.c...k. .<./. .u.>. .<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.8.v.d.x...v.e.l. .e... ...e.r.a.d...e.l.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.1.v.q.v.a.o.a.v. ...e.r.a.d...x...t.h.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.2.a... .i.r.i.a.z.a.v.a.o.h.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):2004
                                                      Entropy (8bit):4.3275744310729864
                                                      Encrypted:false
                                                      SSDEEP:48:r0ymZ8X80yG8jmDZX0IQKJm0DmklhDmxXj+emLZWjZ+1mPY7E:rPm68pG86dX0IQgmgmk/mxNmLZ6QmPYw
                                                      MD5:B1105D3C95E6E4377F22636424DADE56
                                                      SHA1:AD991766A038C61ACC58351AFC6A8C53EC06C375
                                                      SHA-256:84FA2843F6F6900DE29FAFD9B2B8C76016720E494350F52F002E5DB6B5358966
                                                      SHA-512:1BA8450656F29C6AE4DCB9039FC4472591CC8BDB12DF968A39F38E04265F676ECB0BBF2D191DAEF87905F2B9B994B1C4EFEA0A62607EE697F90D2185EE61EDC3
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=...0.@.5.6.4.0.=.5. .7.0. .8.=.A.B.0.;.8.@.0.=.5. .D.r.i.v.e.r. .T.a.l.e.n.t.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=...>.1.@.5. .4.>.H.;.8. .4.0. .8.7.?.>.;.7.2.0.B.5. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.'.@.5.7. .8.=.A.B.0.;.8.@.0.=.5.B.>. .8.;.8. .8.7.?.>.;.7.2.0.=.5.B.>. .=.0. .B.>.7.8. .?.@.>.4.C.:.B. .?.@.8.5.<.0.B.5. .<.a.>. .<.u.>. .;.8.F.5.=.7.8.>.=.=.>.B.>. .A.?.>.@.0.7.C.<.5.=.8.5. .D.r.i.v.e.r. .T.a.l.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=...@.8.5.<.0.=.5. .8. .8.=.A.B.0.;.8.@.0.=.5.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=...=.A.B.0.;.8.@.0.=.5. .?.>. .;.8.G.=.8. .?.@.5.4.?.>.G.8.B.0.=.8.O.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=...B.2.>.@.5.=.0. .?.0.?.:.0.....S.T.R._.C.U.S.T.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1826
                                                      Entropy (8bit):3.8002533942888994
                                                      Encrypted:false
                                                      SSDEEP:48:rmmdZ8Xm0yG8lDMtZX+u7IQQCNmr4mxUmxmNAC94mLL1iQB+ubmc7l18HICj:rmmd6mpG85AX+UIQxmr4mxUmxmuC94mO
                                                      MD5:C218CB809230BB3C74AD64A247B4D9EE
                                                      SHA1:CA1E77DA0926B7BF6C47971BBDA1947A03E009E1
                                                      SHA-256:00F77A864DB64DB06A2FC71E6CB979D6D20477E181906A13D531A272BBC9B1F9
                                                      SHA-512:06811D5E129F2F8DDCD6CDFD0A309CF3BAF1A76197234C7A0C93309CAF4233D525AC4169139894745AA9F074EB6221F25526DC2BF42E469B4AF5E90F505BA04B
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.L.o.a.d.i.n.g. .f.o.r. .D.r.i.v.e.r. .T.a.l.e.n.t. .i.n.s.t.a.l.l.a.t.i.o.n.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.W.e.l.c.o.m.e. .t.o. .u.s.e. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.B.y. .i.n.s.t.a.l.l.i.n.g. .o.r. .u.s.i.n.g. .t.h.i.s. .p.r.o.d.u.c.t.,. .y.o.u. .a.g.r.e.e. .t.o. .<.a.>.<.u.>.D.r.i.v.e.r. .T.a.l.e.n.t. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.c.c.e.p.t. .a.n.d. .I.n.s.t.a.l.l.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.C.u.s.t.o.m. .I.n.s.t.a.l.l.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.O.p.e.n. .F.o.l.d.e.r.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.P.=.C.r.e.a.t.e. .a. .D.e.s.k.t.o.p. .I.c.o.n.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.M.E.N.U.=.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1982
                                                      Entropy (8bit):3.793793035589772
                                                      Encrypted:false
                                                      SSDEEP:48:rzmZ8X00yG8US0qWsDZX+FYTIQMKrmQ4mVmxD4mLF6L+wt4mF9R9i9:rzm60pG8US0qWsdX+CTIQ/mQ4mVmxD42
                                                      MD5:DADC5BBC0A65A7DF49D77EDC793C75BA
                                                      SHA1:C20B28B9AC761640C9E60B1BD5F12C5BBB297FCB
                                                      SHA-256:59EDA82F15B828FFF349F28C1BE769B36F7872317AF4BBE94C2793A009FBEF5B
                                                      SHA-512:6E11BEB68EAFDDFA61CADC7B9192CE53922B12E49E7FB6002F1D59F1CF5A6D9FC910595CBDC91A41EF637716ADB97C69DB503B78C0BBC9374DAD2978A616D712
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.C.h.a.r.g.e.m.e.n.t. .p.o.u.r. .l.'.i.n.s.t.a.l.l.a.t.i.o.n. .d.e. .D.r.i.v.e.r. .T.a.l.e.n.t.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.B.i.e.n.v.e.n.u.e. .d.a.n.s. .l.'.I.n.s.t.a.l.l.e.u.r. .d.e. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.E.n. .i.n.s.t.a.l.l.a.n.t. .o.u. .e.n. .u.t.i.l.i.s.a.n.t. .c.e. .p.r.o.d.u.i.t.,. .v.o.u.s. .a.c.c.e.p.t.e.z. .l.e. .<.a.>.<.u.>.c.o.n.t.r.a.t. .d.e. .l.i.c.e.n.c.e. .D.r.i.v.e.r. .T.a.l.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.c.c.e.p.t.e.r. .e.t. .I.n.s.t.a.l.l.e.r.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.I.n.s.t.a.l.l.a.t.i.o.n. .p.e.r.s.o.n.n.a.l.i.s...e.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.O.u.v.r.i.r. .l.e. .d.o.s.s.i.e.r.....S.T.R._.C.U.S.T.O.M._.P.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):2070
                                                      Entropy (8bit):3.7941777374928076
                                                      Encrypted:false
                                                      SSDEEP:48:rnStdZ8X1UdxTG8wweaeUO9gZX+M0+wpIQIumPmFDa9mxaDaOy4mLhc9R+mmdlVH:rnGd61WxTG8VCbUX+M0vpIQFmPmZ+mx5
                                                      MD5:4744678D11BE01D0CD1B335DA1828FFB
                                                      SHA1:CAB4B8B174D2514E64D2AEA8B13A3B27EB69B11F
                                                      SHA-256:B582D72220E4432B32A587B0186192ACE366377DE7B4AE9D7590DABEC137061C
                                                      SHA-512:89F15A1EB64CEA8A7DF294CD55499ED5AC52EF823603E4EFEB5A7880FB478A461A16A4F910B3E0FEAF8A75A01A8427BE5BEB5D3A70C468DD5DA1D043589E58F8
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.L.a.d.e.n. .f...r. .D.r.i.v.e.r. .T.a.l.e.n.t. .I.n.s.t.a.l.l.a.t.i.o.n.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.W.i.l.l.k.o.m.m.e.n. .b.e.i.m. .D.r.i.v.e.r.-.T.a.l.e.n.t.-.I.n.s.t.a.l.l.i.e.r.e.r.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.D.u.r.c.h. .I.n.s.t.a.l.l.i.e.r.e.n. .o.d.e.r. .B.e.n.u.t.z.e.n. .d.i.e.s.e.s. .P.r.o.d.u.k.t.s. .a.n.e.r.k.e.n.n.e.n. .S.i.e. .d.i.e. .<.a.>.<.u.>.D.r.i.v.e.r.-.T.a.l.e.n.t.-.L.i.z.e.n.z.v.e.r.e.i.n.b.a.r.u.n.g.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.k.z.e.p.t.i.e.r.e.n. .u.n.d. .I.n.s.t.a.l.l.i.e.r.e.n.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.B.e.n.u.t.z.e.r.d.e.f.i.n.i.e.r.t.e. .I.n.s.t.a.l.l.a.t.i.o.n.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.O.r.d.n.e.r. ...f.f.n.e.n.....S.T.R._.C.U.S.T.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):2082
                                                      Entropy (8bit):4.498077062477437
                                                      Encrypted:false
                                                      SSDEEP:48:rntmZ8XsC0yG8l+G+uCXuZEIQYLPm44mmm0n6mxcvsmLrre+vmYhflADRSZ:rntm6sCpG8l+ZuCXWEIQsPm44mR06mxq
                                                      MD5:CFD3F871C1DF18233522A2045D80A139
                                                      SHA1:CC4DB1A2221717E88187F755EF8D0674A9A9494F
                                                      SHA-256:9CF117A5B422250A3E44E3561708612A2A5762BF2AA515C7CFCB7609418D451B
                                                      SHA-512:37213625A656C35D17C3BDC107A5754EA6FAD7D31B0F791D6788ED00EB663F8A486AD04A45D19119B4415C6EAC48A90A12C1757699C16C7614769B06161DA4EA
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=............... ....... ....................... ....... .D.r.i.v.e.r. .T.a.l.e.n.t.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=........... ............... ....... ........... ....... .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=..... ....... ....................... ... ..... ........... ........... ....... ...................,. ..................... ..... .<.a.>. .<.u.>. ........... ............. .D.r.i.v.e.r. .T.a.l.e.n.t. .<./. .u.>. .<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=............... ....... ...........................S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=........................... ...............................;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=................. ...................S.T.R._.C.U.S.T.O.M._.P.A.G.E._.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1578
                                                      Entropy (8bit):4.578522500187184
                                                      Encrypted:false
                                                      SSDEEP:48:rFZRzZ8XwVG8z0/X7IQPmgmrkrmxrVA1mLp/+C2m4SL:rFvz6wVG8zMX7IQPmgmqmxrK1mLp/j20
                                                      MD5:725D679274128A159D8E9A822837BD80
                                                      SHA1:3B1D7A7EDF78B03702F4C50C69D05AA0001F321C
                                                      SHA-256:480699028A553C761126B6527DE9AE228055A24D9398ACF88D2BABD5FF75A85A
                                                      SHA-512:5AD7315068FA1D0447A931304782E0448E7EB869CBC7C20A727880D83E9994C41DACADC9E63F23BEE1EC551F9A3F4859CBA3639D4686EF6AB8307036DE62B287
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.D.r.i.v.e.r. .T.a.l.e.n.t.n0.0.0.0.0.0.0n0_0.0n0...0...0.0....S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. ..0.0.0.0.0.0.0k0.0F0S0]0....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.S0n0...T.0.0.0.0.0.0.0~0_0o0.O(uY0.0S0h0g0.0<.a.>.<.u.>.D.r.i.v.e.r. .T.a.l.e.n.t. ..O(u1...QY.}<./.u.>.<./.a.>.k0.T.aW0_0S0h0k0j0.0~0Y0.0....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=..T.aW0f0.0.0.0.0.0.0....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=..0.0.0.0.0.0.0.0.0.0........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=..0.0.0.0.0..O0....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.P.=..0.0.0.0.0.0n0.0.0.0.0.0\O.b....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.M.E.N.U.=..0.0.0.0.0.0.0.0.0.0.0.0.0\O.bW0~0Y0....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.B.A.C.K.=..0.0.0.0........;.OS..u.b.....S.T.R._.l.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1944
                                                      Entropy (8bit):3.9391359271038993
                                                      Encrypted:false
                                                      SSDEEP:48:rEiZ8XQ0yG8o+xEWfMsCX+RIQvmo4m4oY5mxhMRmmLefU4E+C5m6wrLV:rEi6QpG8o+/FCX+RIQvmo4mtamxhMRmV
                                                      MD5:D3A6D66B591B77EF3803F19BFE43357F
                                                      SHA1:52B0A3650B1686791572DBCA8A15E462A18D516B
                                                      SHA-256:8B4B06E23058560D9F93E370C63D99AF6ABAD7ED5FE905282D304E7A2B4DA899
                                                      SHA-512:963C8EF9476C6836B9C739F96ABAF57CAEB8F412B3E3FC6CBB2864AB860B1987B4CA6888721953B08B3A1014F576AE21420A2CA9E7D20DCED06119113649E239
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.A.a.d.o.w.a.n.i.e. .d.o. .D.r.i.v.e.r. .T.a.l.e.n.t. .i.n.s.t.a.l.a.c.j.i.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.Z.a.p.r.a.s.z.a.m.y. .d.o. .k.o.r.z.y.s.t.a.n.i.a. .z. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.I.n.s.t.a.l.u.j...c. .l.u.b. .u.|.y.w.a.j...c. .t.e.g.o. .p.r.o.d.u.k.t.u.,. .w.y.r.a.|.a.s.z. .z.g.o.d... .n.a. .<.a.>. .<.u.>. .D.r.i.v.e.r. .T.a.l.e.n.t. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .<./. .u.>. .<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.k.c.e.p.t.u.j. .i. .z.a.i.n.s.t.a.l.u.j.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.I.n.s.t.a.l.a.c.j.a. .n.i.e.s.t.a.n.d.a.r.d.o.w.a.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.O.t.w...r.z. .f.o.l.d.e.r.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.P.=.S.t.w...
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1954
                                                      Entropy (8bit):3.7968320372005917
                                                      Encrypted:false
                                                      SSDEEP:48:rEmZ8XeE0yG8YFNdaDZX+1FITIQsomQmtjR7mxwJ4mL0h+E4m6ZYggOf+3:rEm6HpG8YladX+1yTIQbmQmt17mxU4mW
                                                      MD5:148F7CD8F300A45128677375760EB2E2
                                                      SHA1:F2DD4388B3076A3AEC9E037DB482BCCE35288669
                                                      SHA-256:A935DDAEC2F4DECD46E63D6BE75929C1663D7CD8352A8C8273BBA753755889B2
                                                      SHA-512:6A8F0C4CD26D2BDD742A7E71215D429C6F2DA24769514A6EB2A11C83FD4732950C61A5932B9B7F7791C6B3AAF97FA2AB2154C7DF018C9AA2529453B87B20D12F
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.C.a.r.r.e.g.a.n.d.o. .p.a.r.a. .a. .i.n.s.t.a.l.a.....o. .d.o. .D.r.i.v.e.r. .T.a.l.e.n.t.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.B.e.m.-.v.i.n.d.o. .a.o. .i.n.s.t.a.l.a.d.o.r. .d.o. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.A.o. .i.n.s.t.a.l.a.r. .o.u. .u.s.a.r. .e.s.t.e. .p.r.o.d.u.t.o.,. .v.o.c... .a.c.e.i.t.a. .o. .<.a.>.<.u.>.C.o.n.t.r.a.t.o. .d.e. .L.i.c.e.n...a. .d.a. .D.r.i.v.e.r. .T.a.l.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.c.e.i.t.a.r. .e. .I.n.s.t.a.l.a.r.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.I.n.s.t.a.l.a.....o. .p.e.r.s.o.n.a.l.i.z.a.d.a.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.P.a.s.t.a. .a.b.e.r.t.a.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.P.=.C.r.i.a.r. .u.m. ...c.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1970
                                                      Entropy (8bit):4.360400151941801
                                                      Encrypted:false
                                                      SSDEEP:48:r0fmZ8Xik0yG8gqu/YADZXfTIQ46mEKmpDmxKbmLZ8Yw+7m3plnBYW:ram6rpG8gL/YAdX7IQ5mtmtmxKbmLZ8V
                                                      MD5:850DCB75CA9AD9E82262809BEB776993
                                                      SHA1:E05F86ACF326925529D6577AB12E35B19F46D613
                                                      SHA-256:84BEFF254365E394B92EB5EA686BB98ED8DB240281F2D16AAA30F4F2AA247B37
                                                      SHA-512:F213FFBF864862CA7E86E29871E4016A30B4E0A6AAE959E858FBFFD24E1B671F8846EF02B662BA7C3ADEDBFCFA6068789264EE36192ABC0B573E6D7B0ED94125
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=...0.3.@.C.7.:.0. .4.;.O. .C.A.B.0.=.>.2.:.8. .D.r.i.v.e.r. .T.a.l.e.n.t.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=...>.1.@.>. .?.>.6.0.;.>.2.0.B.L. .2. .8.A.?.>.;.L.7.>.2.0.=.8.5. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=...@.8. .C.A.B.0.=.>.2.:.5. .8.;.8. .8.A.?.>.;.L.7.>.2.0.=.8.8. .M.B.>.3.>. .?.@.>.4.C.:.B.0. .2.K. .A.>.3.;.0.H.0.5.B.5.A.L. .<.a.>.<.u.>...8.F.5.=.7.8.>.=.=.>.5. .A.>.3.;.0.H.5.=.8.5. .>. .D.r.i.v.e.r. .T.a.l.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=...@.8.=.O.B.L. .8. .C.A.B.0.=.>.2.8.B.L.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=...K.1.>.@.>.G.=.0.O. .C.A.B.0.=.>.2.:.0.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=...B.:.@.K.B.L. .D.0.9.;.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):2012
                                                      Entropy (8bit):3.7680430429090093
                                                      Encrypted:false
                                                      SSDEEP:48:rSvLZ8XiP0yG8kiKYDZX+yFITIQzkom8mxMZmxmyymmLNAB+o1+4mNXB8lmPiBA:rSvL6iPpG8kZYdX+yyTIQzjm8mxwmxmd
                                                      MD5:5AA1FE95F88A79A5D2181855A9228033
                                                      SHA1:00B254E1DA56BC54D3D68475AC987292E9B43703
                                                      SHA-256:850017B3DB86BD86DED1F1170E893F2EC18F45EF0D54325F0A1B2FF665DF3B2A
                                                      SHA-512:E45056B2346CCD80506192C64941EF84E0CDCCF62EF8B6936E6F29B1947C7B845511BD4B511592A933F90582444D4DCB42959502230CEACCA0E3DB6A70EFAA3C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.C.a.r.g.a.n.d.o. .p.a.r.a. .D.r.i.v.e.r. .T.a.l.e.n.t. .i.n.s.t.a.l.a.c.i...n.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.B.i.e.n.v.e.n.i.d.o. .a.l. .i.n.s.t.a.l.a.d.o.r. .d.e. .D.r.i.v.e.r. .T.a.l.e.n.t.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.P.a.r.a. .i.n.s.t.a.l.a.r. .o. .u.s.a.r. .e.s.t.e. .p.r.o.d.u.c.t.o.,. .u.s.t.e.d. .d.e.b.e. .e.s.t.a.r. .d.e. .a.c.u.e.r.d.o. .c.o.n. .e.l. .<.a.>.<.u.>.A.c.u.e.r.d.o. .d.e. .L.i.c.e.n.c.i.a. .D.r.i.v.e.r. .T.a.l.e.n.t.<./.u.>.<./.a.>.....S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.A.c.e.p.t.a.r. .e. .I.n.s.t.a.l.a.r.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=.I.n.s.t.a.l.a.c.i...n. .P.e.r.s.o.n.a.l.i.z.a.d.a.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.A.b.r.i.r. .C.a.r.p.e.t.a.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1890
                                                      Entropy (8bit):3.9177491703568497
                                                      Encrypted:false
                                                      SSDEEP:48:rFfRZ8XwTG8DliFq4XiGIQdrmHmSWmx5omLPvUs+ymDIeaeFcu:rFfR6wTG8oFTXTIQBmHmSWmx5omLnUsu
                                                      MD5:8809690693704F3BFAA513F2D9784CBF
                                                      SHA1:6029E5AF271495CDFB3103F8AD84083A6DF508AA
                                                      SHA-256:EA3D87F15E6D7A7B08F3E37F754F40CEDE2E41F8C146B67476ABA1534D97E648
                                                      SHA-512:CD2D131AF9F74D83180BC8F922F3904C0BCD2BE5A57A77D9725CF69FFBCA77290846D0DDE0A8F3AF9CF69BDE320F0DA235C64AF2581A4B707B38F056CB714B05
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..[.L.A.N.S.T.R.].....S.T.R._.I.N.S.T._.I.N.I.T._.T.I.P.=.D.r.i.v.e.r. .T.a.l.e.n.t. .y...k.l.e.m.e.s.i. .y...k.l.e.n.i.y.o.r.......S.T.R._.M.A.I.N.W.N.D._.T.I.T.L.E.=.D.r.i.v.e.r. .T.a.l.e.n.t. .-. .I.n.s.t.a.l.l.a.t.i.o.n.........;..[...u.....S.T.R._.F.I.R.S.T._.P.A.G.E._.W.E.L.C.O.M.E.=.D.r.i.v.e.r. .T.a.l.e.n.t.'.i. .k.u.l.l.a.n.m.a.y.a. .h.o._. .g.e.l.d.i.n.i.z.....S.T.R._.F.I.R.S.T._.P.A.G.E._.l.I.C.E.N.S.E.=.B.u. ...r...n... .y...k.l.e.y.e.r.e.k. .v.e.y.a. .k.u.l.l.a.n.a.r.a.k.,. .<.a.>. .<.u.>. .D.r.i.v.e.r. .T.a.l.e.n.t. .L.i.s.a.n.s. .A.n.l.a._.m.a.s.1. .<./. .u.>. .<./.a.>. .n.1. .k.a.b.u.l. .e.t.m.i._. .o.l.u.r.s.u.n.u.z.......S.T.R._.F.I.R.S.T._.P.A.G.E._.I.N.S.T.A.L.L.=.K.a.b.u.l. .E.t. .v.e. .Y...k.l.e.....S.T.R._.F.I.R.S.T._.P.A.G.E._.C.U.S.T.O.M.=...z.e.l. .y...k.l.e.m.e.........;.(u7b..y.u.b.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.O.P.E.N.F.L.O.D.E.R.=.A...1.k. .d.o.s.y.a.....S.T.R._.C.U.S.T.O.M._.P.A.G.E._.D.E.S.K.T.O.P.=.M.a.s.a...s.t... .s.i.m.g.e.s.i. .y.a.r.a.t.....
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):134320
                                                      Entropy (8bit):6.670168945334509
                                                      Encrypted:false
                                                      SSDEEP:1536:rpfIBeWKNKHHH6kNr8oeie2dLVyTECMlB7LWZ0QwlncB5nEhG44hV:dflGHa/7aB3QwlncB5n6b4f
                                                      MD5:25B1811C74D68C23E13727C0CD71DABD
                                                      SHA1:1F309CE705766382DCC196B9E4D67E6A4ABABC1F
                                                      SHA-256:873D35358170C308C98BE5215CE5B255B788D3FEFFF5AE82B86AF59279DE1677
                                                      SHA-512:E85F4238F6B3AE6CC7288D7655992B389CAE9A59F06265F10FA29F0EFA8FF7E25BF6873661308DC483DAA3A4A55DFA04E85E8C21F88EE6D773F6E7FAF8BC17EC
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0..^..^..^.....^....z.^..[3..^......^.....^..[%..^.._.l.^......^.....^.....^.....^.Rich.^.........PE..L.....W...........!.....^...v......(........p............................... .......J....@.........................`..................L................4...........q..................................@............p...............................text....].......^.................. ..`.rdata..N<...p...>...b..............@..@.data....0..........................@....rsrc...L...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1780736
                                                      Entropy (8bit):6.791309928164918
                                                      Encrypted:false
                                                      SSDEEP:24576:T/mW5mVjT3xTe9axrYFb1xXcUcgTKapa6Y9juppaCcp/IodwVHapK:bmB3xTeSOLs4Tzpa3EUCcp/IoUHapK
                                                      MD5:8CBD024FA59F52272C6B7E2EFBD3507A
                                                      SHA1:C7A4C35642A1B91D093CFB3D9900F7EC84DB352C
                                                      SHA-256:FF9FD95D6F98CFFC6D2C296320501BEC0DA9748BDFB59D3C28C5FA055341B893
                                                      SHA-512:11046325B7CEEE77FE662F4D59702421500DCC9E53C76329150209E3E7BC764EFB95A78F94AE2172C5BCC519A52A86CCDD5AC018C102EA462BBEBB9B0BF48A02
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..m..@>..@>..@>...>..@>...>D.@>...>M.@>...>..@>',;>..@>..A>..@>...>8.@>...>..@>...>..@>...>..@>Rich..@>........PE..L...qv.Y...........!.........p......l...............................................).....@......................... }.......k.......p..L............................................................)..@............................................text.............................. ..`.rdata..............................@..@.data................l..............@....rsrc...L....p......................@..@.reloc..J...........................@..B........................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):169648
                                                      Entropy (8bit):6.658586828116448
                                                      Encrypted:false
                                                      SSDEEP:3072:PdUA7dHAlB70un3xxjUrfQn2ZilfNZxlM59dHKki8L+:VN7+PBLjUr42ZilFZkUR
                                                      MD5:BE8B79788E7E42CB2B90D775EC97A094
                                                      SHA1:8C605A7E70BD01C8F516C00BA001F44E69958E7D
                                                      SHA-256:D5D48D7BA1204C057455195D9388FA3CF86AE896C7ABA3457653329DB7B56BCD
                                                      SHA-512:3506668F658DB81B53ABE7C98DC87C5A62780325C3587E498616B9CB3852D4C4C261A124AB0FA8626F8E54B5AE7325BF0D99C2C078F26D62C77D4F7729C6ED7B
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............q^..q^..q^.;.^..q^..^..q^...^..q^...^..q^...^V.q^.;.^..q^..p^..q^...^..q^...^..q^..^..q^...^..q^Rich..q^........................PE..L.....<X...........!................................................................j.....@......................... ...............p..@............b...4..............................................@...............4............................text.............................. ..`.rdata...Q.......R..................@..@.data....>...0..."..................@....rsrc...@....p.......0..............@..@.reloc...*.......,...6..............@..B................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                      Entropy (8bit):7.992476917613254
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.66%
                                                      • UPX compressed Win32 Executable (30571/9) 0.30%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      File size:12'960'432 bytes
                                                      MD5:61144b1d8168af54da7f364640019e2c
                                                      SHA1:091838658ea6001e64291d5541508bbb7b42f77e
                                                      SHA256:9cfe6496621b2695f95bfabfe9baab9f167a168dd633d3c9271f86d168699cdd
                                                      SHA512:d281c9c3ad370b884606ce38e1b1d2b55008598de2af6a1f9527d9bc97df3f1a9e085ce2e9b66c8ad0873c0d0539a70f9817b27baabf82f27bccbf30dab0a779
                                                      SSDEEP:196608:mINErayu7wK1k7fVPWJ4bc/Hkxqjk1gnyx/RnQx9jx/dy0PtGrc5DL4p/DG6Jhm/:1NEAh1k7fxWJ4GBk1XgtZkbGuhPO2O9D
                                                      TLSH:86D633D17994194BC84E063EF0275A796FB2E19D0A20B31AC7466D5CFB64FCDF20A90E
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................A~......A}.7....A|.......0....... .........A....i~.....?k`.....?kz.......$.....?k......Rich...................
                                                      Icon Hash:8e1939602d29370e
                                                      Entrypoint:0x10ae930
                                                      Entrypoint Section:UPX1
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x59929765 [Tue Aug 15 06:40:37 2017 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:9839050326998486d9cba92bfaf396b9
                                                      Signature Valid:true
                                                      Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                                                      Signature Validation Error:The operation completed successfully
                                                      Error Number:0
                                                      Not Before, Not After
                                                      • 16/02/2017 01:00:00 19/11/2019 00:59:59
                                                      Subject Chain
                                                      • CN=OSTOTO CO. LIMITED, OU=International DEPT, O=OSTOTO CO. LIMITED, L=HongKong, S=HongKong, C=HK
                                                      Version:3
                                                      Thumbprint MD5:954398F2A4B792C85166DCCCE550E20C
                                                      Thumbprint SHA-1:1439D6BD763B63B3FCDA5393B1998A17EAA7898B
                                                      Thumbprint SHA-256:30093174523EB36392CD3F18D025660FBD22D24B8EF7399B2DDD7DA0D146326A
                                                      Serial:4D5940384D9AD293948E2C4013C204D0
                                                      Instruction
                                                      pushad
                                                      mov esi, 01078000h
                                                      lea edi, dword ptr [esi-00C77000h]
                                                      push edi
                                                      jmp 00007F8A2150B83Dh
                                                      nop
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      mov byte ptr [edi], al
                                                      inc edi
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F8A2150B81Fh
                                                      mov eax, 00000001h
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      add ebx, ebx
                                                      jnc 00007F8A2150B83Dh
                                                      jne 00007F8A2150B85Ah
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F8A2150B851h
                                                      dec eax
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      jmp 00007F8A2150B806h
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      jmp 00007F8A2150B884h
                                                      xor ecx, ecx
                                                      sub eax, 03h
                                                      jc 00007F8A2150B843h
                                                      shl eax, 08h
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      xor eax, FFFFFFFFh
                                                      je 00007F8A2150B8A7h
                                                      sar eax, 1
                                                      mov ebp, eax
                                                      jmp 00007F8A2150B83Dh
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F8A2150B7FEh
                                                      inc ecx
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F8A2150B7F0h
                                                      add ebx, ebx
                                                      jne 00007F8A2150B839h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      add ebx, ebx
                                                      jnc 00007F8A2150B821h
                                                      jne 00007F8A2150B83Bh
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jnc 00007F8A2150B816h
                                                      add ecx, 02h
                                                      cmp ebp, FFFFFB00h
                                                      adc ecx, 02h
                                                      lea edx, dword ptr [edi+ebp]
                                                      cmp ebp, FFFFFFFCh
                                                      jbe 00007F8A2150B840h
                                                      mov al, byte ptr [edx]
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [RES] VS2012 UPD3 build 60610
                                                      • [LNK] VS2012 UPD3 build 60610
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x18d0ba80x238.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xcaf0000xc21ba8.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xc58e000x34b0UPX0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x18d0de00x10.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcaeb140x48UPX1
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      UPX00x10000xc770000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      UPX10xc780000x370000x36c0091282aa39832b8be3a324adbd474c699False0.9679205907534246data7.924885102773607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xcaf0000xc220000xc21e0078ba9e5f4451ef3e213e7eda17cf9c57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      DAR0xcaf4600x5c5Lua bytecode, version 5.3ChineseChina0.5802301963439405
                                                      DAR0xcafa2c0x5769Lua bytecode, version 5.3ChineseChina0.37547481789337267
                                                      DAR0xcb519c0xc814Lua bytecode, version 5.3ChineseChina0.3644279578289731
                                                      DATA0xcc19b40xa6c0c1dataChineseChina1.0003108978271484
                                                      DATA0x172da7c0x173f67dataChineseChina1.0003108978271484
                                                      RT_ICON0x18a19e80x6f80PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9948500560538116
                                                      RT_ICON0x18a896c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18276055838163965
                                                      RT_ICON0x18b91980x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016ChineseChina0.24153878494849695
                                                      RT_ICON0x18c26440x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600ChineseChina0.2666820702402957
                                                      RT_ICON0x18c7ad00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.25679026924893716
                                                      RT_ICON0x18cbcfc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.33443983402489624
                                                      RT_ICON0x18ce2a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.3794559099437148
                                                      RT_ICON0x18cf3540x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.48237704918032787
                                                      RT_ICON0x18cfce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.5656028368794326
                                                      RT_DIALOG0x18d014c0x72dataChineseChina0.6666666666666666
                                                      RT_GROUP_ICON0x18d01c40x84dataChineseChina0.7272727272727273
                                                      RT_VERSION0x18d024c0x564dataChineseChina0.2536231884057971
                                                      RT_MANIFEST0x18d07b40x3f2XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (950), with CRLF line terminatorsEnglishUnited States0.5138613861386139
                                                      DLLImport
                                                      ADVAPI32.dllRegCloseKey
                                                      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                                      ole32.dllCoInitialize
                                                      PSAPI.DLLGetProcessImageFileNameW
                                                      SHELL32.dll
                                                      SHLWAPI.dllPathIsURLW
                                                      urlmon.dllURLDownloadToFileW
                                                      USER32.dllEnumWindows
                                                      VERSION.dllVerQueryValueW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      ChineseChina
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 23, 2024 14:40:13.024750948 CEST6059853192.168.2.61.1.1.1
                                                      Apr 23, 2024 14:40:13.372553110 CEST53605981.1.1.1192.168.2.6
                                                      Apr 23, 2024 14:40:13.460217953 CEST605993800192.168.2.6209.58.131.173
                                                      Apr 23, 2024 14:40:13.623482943 CEST380060599209.58.131.173192.168.2.6
                                                      Apr 23, 2024 14:40:13.624723911 CEST5209553192.168.2.61.1.1.1
                                                      Apr 23, 2024 14:40:13.663503885 CEST5483753192.168.2.61.1.1.1
                                                      Apr 23, 2024 14:40:13.867048979 CEST53520951.1.1.1192.168.2.6
                                                      Apr 23, 2024 14:40:13.868024111 CEST605993800192.168.2.6209.58.131.173
                                                      Apr 23, 2024 14:40:14.031574965 CEST380060599209.58.131.173192.168.2.6
                                                      Apr 23, 2024 14:40:14.032351971 CEST6500953192.168.2.61.1.1.1
                                                      Apr 23, 2024 14:40:14.057173967 CEST53548371.1.1.1192.168.2.6
                                                      Apr 23, 2024 14:40:14.204763889 CEST53650091.1.1.1192.168.2.6
                                                      Apr 23, 2024 14:40:14.831219912 CEST605996130192.168.2.6209.58.131.173
                                                      Apr 23, 2024 14:40:14.831789017 CEST605996130192.168.2.6209.58.131.173
                                                      Apr 23, 2024 14:40:14.994754076 CEST613060599209.58.131.173192.168.2.6
                                                      Apr 23, 2024 14:40:14.995037079 CEST613060599209.58.131.173192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Apr 23, 2024 14:40:13.024750948 CEST192.168.2.61.1.1.10xac14Standard query (0)dispatch.integrate.drivethelife.comA (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:13.624723911 CEST192.168.2.61.1.1.10x2f50Standard query (0)online1.integrate.drivethelife.comA (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:13.663503885 CEST192.168.2.61.1.1.10xed1dStandard query (0)int.softconfig.drivethelife.comA (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:14.032351971 CEST192.168.2.61.1.1.10x34d8Standard query (0)behaviorgather.integrate.drivethelife.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Apr 23, 2024 14:40:13.372553110 CEST1.1.1.1192.168.2.60xac14No error (0)dispatch.integrate.drivethelife.com209.58.131.173A (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:13.867048979 CEST1.1.1.1192.168.2.60x2f50No error (0)online1.integrate.drivethelife.com209.58.131.173A (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:14.057173967 CEST1.1.1.1192.168.2.60xed1dName error (3)int.softconfig.drivethelife.comnonenoneA (IP address)IN (0x0001)false
                                                      Apr 23, 2024 14:40:14.204763889 CEST1.1.1.1192.168.2.60x34d8No error (0)behaviorgather.integrate.drivethelife.com209.58.131.173A (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Target ID:0
                                                      Start time:14:40:10
                                                      Start date:23/04/2024
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.DriverTalent.A.gen.Eldorado.3883.7584.exe"
                                                      Imagebase:0xe20000
                                                      File size:12'960'432 bytes
                                                      MD5 hash:61144B1D8168AF54DA7F364640019E2C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:4.8%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:20.4%
                                                        Total number of Nodes:1080
                                                        Total number of Limit Nodes:32
                                                        execution_graph 34181 e4f237 34182 e4f243 __rmtmp 34181->34182 34218 e58906 GetStartupInfoW 34182->34218 34185 e4f248 34220 e58bdd GetProcessHeap 34185->34220 34186 e4f2a0 34187 e4f2ab 34186->34187 34371 e4f387 45 API calls 3 library calls 34186->34371 34221 e577d9 34187->34221 34190 e4f2b1 34191 e4f2bd __RTC_Initialize 34190->34191 34372 e4f387 45 API calls 3 library calls 34190->34372 34242 e5a8a7 34191->34242 34194 e4f2bc 34194->34191 34195 e4f2cb 34196 e4f2d7 GetCommandLineW ___crtGetEnvironmentStringsW 34195->34196 34373 e4f387 45 API calls 3 library calls 34195->34373 34260 e5ab55 GetModuleFileNameW 34196->34260 34199 e4f2d6 34199->34196 34201 e4f2fc 34266 e5ad8e 34201->34266 34205 e4f30d 34280 e543f1 34205->34280 34208 e4f315 34209 e4f321 __wwincmdln 34208->34209 34376 e543b7 46 API calls 3 library calls 34208->34376 34284 e21f35 GetCurrentDirectoryW 34209->34284 34214 e4f343 34378 e543e2 5 API calls _doexit 34214->34378 34217 e4f348 __rmtmp 34219 e5891c 34218->34219 34219->34185 34220->34186 34379 e54496 30 API calls 2 library calls 34221->34379 34223 e577de 34380 e5c08a InitializeCriticalSectionAndSpinCount 34223->34380 34225 e577e7 34381 e5784f 24 API calls 2 library calls 34225->34381 34226 e577e3 34226->34225 34382 e58888 TlsAlloc 34226->34382 34229 e577ec 34229->34190 34230 e577f9 34230->34225 34231 e57804 34230->34231 34383 e5663a 34231->34383 34234 e57846 34391 e5784f 24 API calls 2 library calls 34234->34391 34237 e5784b 34237->34190 34238 e57825 34238->34234 34239 e5782b 34238->34239 34390 e57726 12 API calls 3 library calls 34239->34390 34241 e57833 GetCurrentThreadId 34241->34190 34400 e56770 34242->34400 34244 e5a8b3 __lock 34245 e5663a __calloc_crt 21 API calls 34244->34245 34246 e5a8cb 34245->34246 34247 e5a936 GetStartupInfoW 34246->34247 34248 e5a8d6 __rmtmp 34246->34248 34251 e5aa74 34247->34251 34252 e5a94b 34247->34252 34248->34195 34249 e5ab38 34401 e5ab4c RtlLeaveCriticalSection _doexit 34249->34401 34251->34249 34253 e5aabd GetStdHandle 34251->34253 34256 e5aacf GetFileType 34251->34256 34257 e5aafc InitializeCriticalSectionAndSpinCount 34251->34257 34252->34251 34254 e5a999 34252->34254 34255 e5663a __calloc_crt 21 API calls 34252->34255 34253->34251 34254->34251 34258 e5a9d9 InitializeCriticalSectionAndSpinCount 34254->34258 34259 e5a9cb GetFileType 34254->34259 34255->34252 34256->34251 34257->34251 34258->34254 34259->34254 34259->34258 34261 e5ab89 _wparse_cmdline 34260->34261 34262 e4f2f1 34261->34262 34263 e5abc3 34261->34263 34262->34201 34374 e543b7 46 API calls 3 library calls 34262->34374 34402 e56684 47 API calls _malloc 34263->34402 34265 e5abc9 _wparse_cmdline 34265->34262 34267 e5ada7 34266->34267 34271 e4f302 34266->34271 34268 e5663a __calloc_crt 21 API calls 34267->34268 34273 e5add0 34268->34273 34269 e5ae27 34404 e4ef5c 34269->34404 34271->34205 34375 e543b7 46 API calls 3 library calls 34271->34375 34272 e5663a __calloc_crt 21 API calls 34272->34273 34273->34269 34273->34271 34273->34272 34274 e5ae4c 34273->34274 34277 e5ae63 34273->34277 34403 e4e62c 29 API calls __fclose_nolock 34273->34403 34275 e4ef5c __fclose_nolock 21 API calls 34274->34275 34275->34271 34410 e54a7e 8 API calls 2 library calls 34277->34410 34279 e5ae6f 34281 e543fd __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 34280->34281 34283 e5443c __IsNonwritableInCurrentImage 34281->34283 34412 e4e286 52 API calls __cinit 34281->34412 34283->34208 34285 e21e08 34284->34285 34286 e21f8a GetModuleFileNameW 34285->34286 34413 e21dea 34286->34413 34288 e21f9d 34417 e222c1 34288->34417 34293 e21fc5 CoInitialize 34424 e222e4 34293->34424 34298 e222e4 52 API calls 34299 e21ff4 34298->34299 34584 e23cd8 34299->34584 34300 e22052 SetCurrentDirectoryW 34648 e4d16b 34300->34648 34304 e2206f 34304->34214 34377 e5464d 5 API calls _doexit 34304->34377 34305 e222e4 52 API calls 34306 e22088 34305->34306 34307 e23cd8 195 API calls 34306->34307 34309 e2208f 34307->34309 34311 e21fff _memset 34309->34311 34312 e220c6 34309->34312 34635 e4e0c0 34311->34635 34313 e222e4 52 API calls 34312->34313 34314 e220cb 34313->34314 34612 e2d6ab 183 API calls 34314->34612 34316 e220e0 34613 e227ac 34316->34613 34320 e220fe 34619 e2d37d 34320->34619 34323 e22125 34623 e21e30 InitializeSecurityDescriptor SetSecurityDescriptorDacl 34323->34623 34328 e22161 34329 e2217f 34328->34329 34330 e222e4 52 API calls 34328->34330 34668 e2d6ab 183 API calls 34329->34668 34332 e22175 34330->34332 34663 e24637 34332->34663 34334 e22193 34335 e221af 34334->34335 34336 e222e4 52 API calls 34334->34336 34669 e2d6ab 183 API calls 34335->34669 34337 e221a7 34336->34337 34339 e24637 183 API calls 34337->34339 34339->34335 34340 e221c1 34341 e227ac 183 API calls 34340->34341 34342 e221ce 34341->34342 34670 e226cf 34342->34670 34346 e221ea 34679 e2d6ab 183 API calls 34346->34679 34348 e22212 34680 e2d6ab 183 API calls 34348->34680 34349 e221f6 34349->34348 34350 e222e4 52 API calls 34349->34350 34352 e2220a 34350->34352 34353 e24637 183 API calls 34352->34353 34353->34348 34354 e22240 34681 e2d6ab 183 API calls 34354->34681 34355 e22224 34355->34354 34356 e222e4 52 API calls 34355->34356 34357 e22238 34356->34357 34359 e24637 183 API calls 34357->34359 34359->34354 34360 e2226e 34682 e2d6ab 183 API calls 34360->34682 34361 e22252 34361->34360 34362 e222e4 52 API calls 34361->34362 34363 e22266 34362->34363 34365 e24637 183 API calls 34363->34365 34365->34360 34366 e22280 34367 e222e4 52 API calls 34366->34367 34368 e2204a 34366->34368 34369 e22294 34367->34369 34368->34300 34370 e24637 183 API calls 34369->34370 34370->34368 34371->34187 34372->34194 34373->34199 34377->34214 34378->34217 34379->34223 34380->34226 34381->34229 34382->34230 34385 e56641 34383->34385 34386 e5667e 34385->34386 34387 e5665f Sleep 34385->34387 34392 e62cc9 34385->34392 34386->34234 34389 e588e4 TlsSetValue 34386->34389 34388 e56676 34387->34388 34388->34385 34388->34386 34389->34238 34390->34241 34391->34237 34393 e62cd4 34392->34393 34397 e62cef __calloc_impl 34392->34397 34394 e62ce0 34393->34394 34393->34397 34399 e500c9 21 API calls __getptd_noexit 34394->34399 34396 e62cff RtlAllocateHeap 34396->34397 34398 e62ce5 34396->34398 34397->34396 34397->34398 34398->34385 34399->34398 34400->34244 34401->34248 34402->34265 34403->34273 34405 e4ef65 RtlFreeHeap 34404->34405 34406 e4ef8e __dosmaperr 34404->34406 34405->34406 34407 e4ef7a 34405->34407 34406->34271 34411 e500c9 21 API calls __getptd_noexit 34407->34411 34409 e4ef80 GetLastError 34409->34406 34410->34279 34411->34409 34412->34283 34414 e21dfb 34413->34414 34416 e21df3 34413->34416 34683 e21d9a 47 API calls 34414->34683 34416->34288 34418 e222cf PathRemoveFileSpecW 34417->34418 34419 e222cd 34417->34419 34684 e2230b 34418->34684 34419->34418 34422 e21c90 34423 e21c9a 34422->34423 34423->34293 34425 e21fd1 34424->34425 34426 e222ed 34424->34426 34428 e23872 34425->34428 34688 e4e286 52 API calls __cinit 34426->34688 34689 e2fba0 34428->34689 34430 e23cca 34431 e23886 34431->34430 34432 e238c9 34431->34432 34699 e2f517 34431->34699 34434 e2f517 183 API calls 34432->34434 34435 e238dc 34434->34435 34436 e2f517 183 API calls 34435->34436 34437 e238f7 34436->34437 34438 e2f517 183 API calls 34437->34438 34439 e2390f 34438->34439 34440 e2f517 183 API calls 34439->34440 34441 e23927 34440->34441 34714 e298c9 183 API calls 34441->34714 34443 e23931 34715 e2d595 34443->34715 34447 e2394d 34448 e2d595 183 API calls 34447->34448 34449 e2395a 34448->34449 34720 e2d9af 183 API calls 34449->34720 34451 e23967 34452 e2d595 183 API calls 34451->34452 34453 e23974 34452->34453 34721 e2d9af 183 API calls 34453->34721 34455 e23981 34456 e2d595 183 API calls 34455->34456 34457 e2398e 34456->34457 34722 e2d9af 183 API calls 34457->34722 34459 e2399b 34460 e2d595 183 API calls 34459->34460 34461 e239a8 34460->34461 34723 e2d9af 183 API calls 34461->34723 34463 e239b5 34464 e2d595 183 API calls 34463->34464 34465 e239c2 34464->34465 34724 e2d9af 183 API calls 34465->34724 34467 e239cf 34468 e2d595 183 API calls 34467->34468 34469 e239dc 34468->34469 34725 e2d9af 183 API calls 34469->34725 34471 e239e9 34472 e2d595 183 API calls 34471->34472 34473 e239f6 34472->34473 34726 e2d9af 183 API calls 34473->34726 34475 e23a03 34476 e2d595 183 API calls 34475->34476 34477 e23a10 34476->34477 34727 e2d9af 183 API calls 34477->34727 34479 e23a1d 34480 e2d595 183 API calls 34479->34480 34481 e23a2a 34480->34481 34728 e2d9af 183 API calls 34481->34728 34483 e23a37 34484 e2d595 183 API calls 34483->34484 34485 e23a44 34484->34485 34729 e2d9af 183 API calls 34485->34729 34487 e23a51 34488 e2d595 183 API calls 34487->34488 34489 e23a5e 34488->34489 34730 e2d9af 183 API calls 34489->34730 34491 e23a6b 34492 e2d595 183 API calls 34491->34492 34493 e23a78 34492->34493 34731 e2d9af 183 API calls 34493->34731 34495 e23a85 34496 e2d595 183 API calls 34495->34496 34497 e23a92 34496->34497 34732 e2d9af 183 API calls 34497->34732 34499 e23a9f 34500 e2d595 183 API calls 34499->34500 34501 e23aac 34500->34501 34733 e2d9af 183 API calls 34501->34733 34503 e23ab9 34504 e2d595 183 API calls 34503->34504 34505 e23ac6 34504->34505 34734 e2d9af 183 API calls 34505->34734 34507 e23ad3 34508 e2d595 183 API calls 34507->34508 34509 e23ae0 34508->34509 34735 e2d9af 183 API calls 34509->34735 34511 e23aed 34512 e2d595 183 API calls 34511->34512 34513 e23afa 34512->34513 34736 e2d9af 183 API calls 34513->34736 34515 e23b07 34516 e2d595 183 API calls 34515->34516 34517 e23b14 34516->34517 34737 e2d9af 183 API calls 34517->34737 34519 e23b21 34520 e2d595 183 API calls 34519->34520 34521 e23b2e 34520->34521 34738 e2d9af 183 API calls 34521->34738 34523 e23b3b 34524 e2d595 183 API calls 34523->34524 34525 e23b48 34524->34525 34739 e2d9af 183 API calls 34525->34739 34527 e23b55 34528 e2d595 183 API calls 34527->34528 34529 e23b62 34528->34529 34740 e2d9af 183 API calls 34529->34740 34531 e23b6f 34532 e2d595 183 API calls 34531->34532 34533 e23b7c 34532->34533 34741 e2d9af 183 API calls 34533->34741 34535 e23b89 34536 e2d595 183 API calls 34535->34536 34537 e23b96 34536->34537 34742 e2d9af 183 API calls 34537->34742 34539 e23ba3 34540 e2d595 183 API calls 34539->34540 34541 e23bb0 34540->34541 34743 e2d9af 183 API calls 34541->34743 34543 e23bbd 34544 e2d595 183 API calls 34543->34544 34545 e23bca 34544->34545 34744 e2d9af 183 API calls 34545->34744 34547 e23bd7 34548 e2d595 183 API calls 34547->34548 34549 e23be4 34548->34549 34745 e2d9af 183 API calls 34549->34745 34551 e23bf1 34552 e2d595 183 API calls 34551->34552 34553 e23bfe 34552->34553 34746 e2d9af 183 API calls 34553->34746 34555 e23c0b 34556 e2d595 183 API calls 34555->34556 34557 e23c18 34556->34557 34747 e2d9af 183 API calls 34557->34747 34559 e23c25 34560 e2d595 183 API calls 34559->34560 34561 e23c32 34560->34561 34748 e2d9af 183 API calls 34561->34748 34563 e23c3f 34564 e2d595 183 API calls 34563->34564 34565 e23c4c 34564->34565 34749 e2d9af 183 API calls 34565->34749 34567 e23c59 34568 e2d595 183 API calls 34567->34568 34569 e23c66 34568->34569 34750 e2d9af 183 API calls 34569->34750 34571 e23c73 34572 e2d595 183 API calls 34571->34572 34573 e23c80 34572->34573 34751 e2d9af 183 API calls 34573->34751 34575 e23c8d 34576 e2d595 183 API calls 34575->34576 34577 e23c9a 34576->34577 34752 e2d9af 183 API calls 34577->34752 34579 e23ca7 34580 e2d595 183 API calls 34579->34580 34581 e23cb4 34580->34581 34753 e2d9af 183 API calls 34581->34753 34583 e21fd8 34583->34298 34583->34368 34585 e2c69c 2 API calls 34584->34585 34586 e23d3d 34585->34586 34587 e23d45 _memset 34586->34587 34588 e23dd9 LockResource 34586->34588 34593 e4e0c0 __swprintf 85 API calls 34587->34593 34589 e23e25 SizeofResource 34588->34589 34590 e23de9 _memset 34588->34590 34591 e23e7a 34589->34591 34592 e23e3b _memset 34589->34592 34595 e23e07 GetLastError 34590->34595 35417 e2cb70 49 API calls 34591->35417 34599 e4e0c0 __swprintf 85 API calls 34592->34599 34596 e23d83 OutputDebugStringW 34593->34596 34598 e4e0c0 __swprintf 85 API calls 34595->34598 34600 e4e030 _memset 34596->34600 34597 e23e8c 35418 e23ef5 34597->35418 34602 e23e20 OutputDebugStringW 34598->34602 34599->34602 34603 e23db1 GetLastError 34600->34603 34606 e23ead 34602->34606 34605 e4e0c0 __swprintf 85 API calls 34603->34605 34607 e23dca OutputDebugStringW 34605->34607 34608 e23ec9 34606->34608 34609 e23ebf FreeResource 34606->34609 34607->34606 34610 e4d16b __atodbl_l 6 API calls 34608->34610 34609->34608 34611 e21ffb 34610->34611 34611->34305 34611->34311 34612->34316 34614 e2d3ec 183 API calls 34613->34614 34615 e227c8 34614->34615 35463 e2271b 34615->35463 34618 e2d6ab 183 API calls 34618->34320 34620 e2d38c 34619->34620 34622 e22109 34620->34622 35468 e308d2 22 API calls __floor_pentium4 34620->35468 34622->34323 34655 e21a39 34622->34655 35469 e2101f 34623->35469 34627 e21ec6 34628 e21ef1 GetLastError 34627->34628 34629 e21f1b 34627->34629 34628->34629 34630 e21efe FindWindowW 34628->34630 34633 e4d16b __atodbl_l 6 API calls 34629->34633 34631 e21f17 34630->34631 34632 e21f0e SwitchToThisWindow 34630->34632 34631->34629 34632->34631 34634 e21f2d 34633->34634 34634->34368 34662 e2d6ab 183 API calls 34634->34662 34636 e4e0f1 34635->34636 34637 e4e0dc 34635->34637 34636->34637 34639 e4e0f8 34636->34639 35480 e500c9 21 API calls __getptd_noexit 34637->35480 35482 e54bf6 85 API calls 10 library calls 34639->35482 34640 e4e0e1 35481 e54a6e 8 API calls __fclose_nolock 34640->35481 34643 e4e11e 34645 e4e128 34643->34645 35483 e54aa9 82 API calls 5 library calls 34643->35483 34646 e2203a OutputDebugStringW 34645->34646 35484 e54aa9 82 API calls 5 library calls 34645->35484 34646->34368 34649 e4d175 IsProcessorFeaturePresent 34648->34649 34650 e4d173 34648->34650 34652 e50acc 34649->34652 34650->34304 35485 e50a7b 5 API calls 2 library calls 34652->35485 34654 e50baf 34654->34304 34656 e21a49 34655->34656 34657 e21a5e 34656->34657 34658 e21a7c 34656->34658 35486 e219b6 47 API calls 34657->35486 35487 e21cd4 47 API calls 34658->35487 34661 e21a78 34661->34323 34662->34328 34664 e2d595 183 API calls 34663->34664 34665 e24660 34664->34665 35488 e2dc92 34665->35488 34667 e2467f 34667->34329 34668->34334 34669->34340 34671 e226db __EH_prolog3_GS 34670->34671 35495 e225d4 34671->35495 34674 e2d524 183 API calls 34675 e22709 34674->34675 34676 e4f490 6 API calls 34675->34676 34677 e221de 34676->34677 34678 e2d9af 183 API calls 34677->34678 34678->34346 34679->34349 34680->34355 34681->34361 34682->34366 34683->34416 34685 e22314 34684->34685 34686 e21dea 47 API calls 34685->34686 34687 e21fa6 SetCurrentDirectoryW 34686->34687 34687->34422 34688->34425 34691 e2fbcd 34689->34691 34690 e4d16b __atodbl_l 6 API calls 34692 e2fccc 34690->34692 34697 e2fcba 34691->34697 34754 e508f5 GetSystemTimeAsFileTime __aulldiv 34691->34754 34692->34431 34694 e2fc0d 34755 e356bc 34694->34755 34697->34690 34846 e2f49e 34699->34846 34703 e2f53e 34704 e2d595 183 API calls 34703->34704 34706 e2f5a1 34703->34706 34705 e2f55c 34704->34705 34861 e2d524 34705->34861 34887 e2d9af 183 API calls 34706->34887 34710 e2f5cb 34710->34431 34712 e2f579 34880 e2d90d 34712->34880 34714->34443 34716 e2d5b4 34715->34716 34718 e2393e 34715->34718 34717 e36399 183 API calls 34716->34717 34717->34718 34719 e2d9af 183 API calls 34718->34719 34719->34447 34720->34451 34721->34455 34722->34459 34723->34463 34724->34467 34725->34471 34726->34475 34727->34479 34728->34483 34729->34487 34730->34491 34731->34495 34732->34499 34733->34503 34734->34507 34735->34511 34736->34515 34737->34519 34738->34523 34739->34527 34740->34531 34741->34535 34742->34539 34743->34543 34744->34547 34745->34551 34746->34555 34747->34559 34748->34563 34749->34567 34750->34571 34751->34575 34752->34579 34753->34583 34754->34694 34756 e356fe __setjmp3 34755->34756 34759 e3570e 34756->34759 34762 e36167 34756->34762 34757 e4d16b __atodbl_l 6 API calls 34758 e2fcae 34757->34758 34758->34697 34761 e2fa97 183 API calls 34758->34761 34759->34757 34761->34697 34763 e36188 34762->34763 34764 e36175 ___from_strstr_to_strchr 34762->34764 34763->34759 34764->34763 34780 e354da 34764->34780 34768 e361e1 34771 e36167 183 API calls 34768->34771 34769 e361fb 34772 e36167 183 API calls 34769->34772 34770 e361a7 34770->34768 34770->34769 34773 e361eb 34771->34773 34774 e36205 34772->34774 34775 e44094 183 API calls 34773->34775 34776 e4384c 183 API calls 34774->34776 34778 e361f8 34775->34778 34776->34778 34777 e36261 34777->34759 34778->34777 34779 e388a8 183 API calls 34778->34779 34779->34778 34791 e352a7 34780->34791 34783 e35645 34784 e35653 34783->34784 34785 e35692 34784->34785 34843 e512c0 RtlUnwind 34784->34843 34787 e356a2 34785->34787 34844 e355eb 183 API calls 34785->34844 34845 e5126f 36 API calls 3 library calls 34787->34845 34794 e352d6 ___from_strstr_to_strchr 34791->34794 34792 e35483 34810 e3527e 34792->34810 34798 e353f4 _sprintf 34794->34798 34802 e354c9 34794->34802 34803 e3527e 182 API calls 34794->34803 34808 e354da 182 API calls 34794->34808 34809 e35467 34794->34809 34815 e358d6 34794->34815 34819 e351db 183 API calls 3 library calls 34794->34819 34797 e354ae 34801 e4d16b __atodbl_l 6 API calls 34797->34801 34798->34794 34804 e354c5 34801->34804 34822 e30717 183 API calls 34802->34822 34803->34794 34804->34783 34808->34794 34809->34792 34820 e35812 183 API calls 34809->34820 34823 e34726 34810->34823 34812 e35290 34813 e3549b 34812->34813 34833 e35812 183 API calls 34812->34833 34813->34797 34821 e31264 183 API calls __atodbl_l 34813->34821 34816 e358e7 34815->34816 34817 e358ef 34815->34817 34842 e35812 183 API calls 34816->34842 34817->34794 34819->34794 34821->34797 34824 e34743 34823->34824 34825 e3473a 34823->34825 34827 e34768 34824->34827 34828 e34748 34824->34828 34834 e3463d 34825->34834 34841 e38896 183 API calls 34827->34841 34840 e34614 183 API calls 34828->34840 34830 e34740 _memmove 34830->34812 34832 e3476d 34835 e34660 _memcmp 34834->34835 34837 e3451c 183 API calls 34835->34837 34838 e346da _memmove 34835->34838 34839 e346bc 34835->34839 34836 e36399 183 API calls 34836->34838 34837->34839 34838->34830 34839->34836 34840->34830 34841->34832 34844->34787 34847 e2f4ba 34846->34847 34848 e2d633 183 API calls 34847->34848 34849 e2f4c3 34848->34849 34853 e2f4c9 34849->34853 34888 e2d86a 183 API calls 34849->34888 34851 e2f4e8 34852 e2d90d 183 API calls 34851->34852 34852->34853 34854 e2d633 34853->34854 34889 e3476e 34854->34889 34859 e2d64d 34860 e2d674 34859->34860 34893 e30a47 34859->34893 34860->34703 34862 e2d536 34861->34862 34863 e2d52e 34861->34863 34864 e3476e 183 API calls 34862->34864 34865 e2d561 34863->34865 34912 e3742e 183 API calls 34863->34912 34864->34863 34867 e35dc9 34865->34867 34868 e35de2 34867->34868 34869 e35ded 34867->34869 34870 e35de4 34868->34870 34871 e35e0f 34868->34871 34913 e35ba3 34869->34913 34870->34869 34873 e35e1a 34870->34873 34949 e30717 183 API calls 34871->34949 34876 e35645 183 API calls 34873->34876 34874 e35df5 34874->34712 34877 e35e22 34876->34877 34878 e35dc9 183 API calls 34877->34878 34879 e35e35 34878->34879 34879->34712 34881 e3476e 183 API calls 34880->34881 34882 e2d920 34881->34882 34884 e2d929 34882->34884 35415 e342bb 30 API calls 34882->35415 34886 e2d93e 34884->34886 35416 e30b1d 183 API calls 34884->35416 34886->34706 34887->34710 34888->34851 34891 e3478b 34889->34891 34890 e2d645 34890->34859 34904 e342bb 30 API calls 34890->34904 34891->34890 34892 e34726 183 API calls 34891->34892 34892->34890 34896 e30a5a 34893->34896 34894 e30ad3 34894->34860 34895 e30a71 34910 e305a9 183 API calls 34895->34910 34896->34894 34896->34895 34897 e30ade 34896->34897 34900 e30ad1 34896->34900 34909 e342eb 31 API calls 34896->34909 34905 e37643 34897->34905 34911 e30717 183 API calls 34900->34911 34904->34859 34906 e37685 34905->34906 34907 e35dc9 183 API calls 34906->34907 34908 e376a7 34906->34908 34907->34908 34908->34894 34909->34896 34912->34865 34914 e35c17 34913->34914 34923 e35bbd 34913->34923 34915 e35c52 34914->34915 34921 e35c5c 34914->34921 35173 e3742e 183 API calls 34914->35173 35174 e35812 183 API calls 34915->35174 34918 e35cbc 34922 e35cd2 34918->34922 35177 e2f77d 183 API calls 34918->35177 34919 e35cb2 35176 e35812 183 API calls 34919->35176 34920 e35c7f 34920->34918 34920->34919 35175 e3742e 183 API calls 34920->35175 34932 e35d51 34921->34932 35180 e2f77d 183 API calls 34921->35180 34933 e35d03 34922->34933 35178 e358f5 183 API calls __atodbl_l 34922->35178 34923->34914 34923->34920 35170 e3742e 183 API calls 34923->35170 35171 e35812 183 API calls 34923->35171 35172 e35a04 183 API calls 34923->35172 34937 e35d1c 34932->34937 35181 e358f5 183 API calls __atodbl_l 34932->35181 34950 e3e3a4 34933->34950 34960 e2a1e5 34933->34960 34973 e26198 34933->34973 34990 e23337 34933->34990 35019 e2c69c FindResourceW 34933->35019 35022 e24712 34933->35022 35091 e23803 lstrcmpW 34933->35091 35097 e2764d 34933->35097 35118 e28c97 34933->35118 35137 e2b8b4 34933->35137 35146 e25059 34933->35146 34934 e35d08 35179 e35b3d 183 API calls 34934->35179 34937->34874 34951 e3e3c1 34950->34951 35182 e2f3ee 34951->35182 34953 e3e3cf 34954 e2d90d 183 API calls 34953->34954 34955 e3e3f2 34954->34955 34956 e2d524 183 API calls 34955->34956 34957 e3e3ff 34956->34957 34958 e2d90d 183 API calls 34957->34958 34959 e3e411 34958->34959 34959->34934 34961 e2a229 34960->34961 34962 e227ac 182 API calls 34961->34962 34966 e2a22d 34961->34966 34964 e2a24a LoadLibraryW 34962->34964 34963 e4d16b __atodbl_l 6 API calls 34967 e2a2df 34963->34967 34965 e2a277 34964->34965 34964->34966 35195 e2dfc6 34965->35195 34966->34963 34967->34934 34974 e227ac 178 API calls 34973->34974 34975 e261ea 34974->34975 35231 e299fc 34975->35231 34980 e2622a SHCreateDirectory PathFileExistsW 34982 e262b7 _memset 34980->34982 34983 e26270 _memset 34980->34983 34981 e2621d 34987 e4d16b __atodbl_l 6 API calls 34981->34987 34984 e4e0c0 __swprintf 85 API calls 34982->34984 34985 e4e0c0 __swprintf 85 API calls 34983->34985 34986 e262dd OutputDebugStringW 34984->34986 34988 e2629b OutputDebugStringW 34985->34988 34986->34981 34989 e26328 34987->34989 34988->34981 34989->34934 34997 e23343 __EH_prolog3_GS 34990->34997 34991 e2335b 35252 e4f490 34991->35252 34994 e23411 PathFileExistsA 34995 e23419 34994->34995 34996 e2341c GetLastError 34994->34996 34995->34996 34998 e2d3ec 173 API calls 34996->34998 34997->34991 34997->34994 35004 e2d37d 22 API calls 34997->35004 35005 e23451 34997->35005 35243 e2d3ec 34997->35243 34999 e23435 lstrcmp 34998->34999 34999->34991 35000 e23464 lstrcmp 34999->35000 35000->34991 35001 e23474 lstrcmp 35000->35001 35001->34991 35002 e23484 lstrcmp 35001->35002 35002->34991 35003 e234a7 lstrcmp 35002->35003 35003->34991 35006 e234ce lstrcmp 35003->35006 35004->34997 35010 e2d524 173 API calls 35005->35010 35008 e23500 lstrcmp 35006->35008 35009 e234de 35006->35009 35011 e23510 35008->35011 35012 e23537 lstrcmp 35008->35012 35250 e2c866 183 API calls __EH_prolog3_GS 35009->35250 35013 e2345d 35010->35013 35251 e21aae 47 API calls 35011->35251 35012->34991 35249 e306c6 183 API calls 35013->35249 35016 e2351b 35018 e226cf 173 API calls 35016->35018 35018->34991 35020 e2c6ba 35019->35020 35021 e2c6be LoadResource 35019->35021 35020->34934 35021->35020 35024 e2479a 35022->35024 35023 e227ac 165 API calls 35025 e248bd 35023->35025 35032 e24811 35024->35032 35079 e24d6d 35024->35079 35264 e2edc3 183 API calls 35024->35264 35026 e299fc 52 API calls 35025->35026 35029 e248cb 35026->35029 35027 e24df0 _memset 35037 e4e0c0 __swprintf 85 API calls 35027->35037 35028 e24dad _memset 35036 e4e0c0 __swprintf 85 API calls 35028->35036 35031 e23061 48 API calls 35029->35031 35033 e248d5 PathFileExistsW 35031->35033 35032->35023 35034 e24977 35033->35034 35035 e248f4 _memset 35033->35035 35039 e24ad1 35034->35039 35040 e2497f 35034->35040 35043 e4e0c0 __swprintf 85 API calls 35035->35043 35038 e24dcc OutputDebugStringW 35036->35038 35041 e24e0a OutputDebugStringW 35037->35041 35059 e2495d 35038->35059 35046 e24af7 35039->35046 35047 e24b9b 35039->35047 35042 e227ac 165 API calls 35040->35042 35041->35059 35044 e2498e 35042->35044 35045 e24941 OutputDebugStringW 35043->35045 35048 e299fc 52 API calls 35044->35048 35045->35059 35051 e2d37d 22 API calls 35046->35051 35050 e227ac 165 API calls 35047->35050 35052 e2499c 35048->35052 35053 e24baa 35050->35053 35054 e24b05 35051->35054 35055 e23061 48 API calls 35052->35055 35056 e2c69c 2 API calls 35053->35056 35057 e2c69c 2 API calls 35054->35057 35058 e249a6 PathFileExistsW 35055->35058 35061 e24bce 35056->35061 35062 e24b1e 35057->35062 35063 e24a4a _memset 35058->35063 35064 e249db _memset 35058->35064 35266 e2282f RaiseException __EH_prolog3 35059->35266 35060 e24e41 _Func_class 35069 e4d16b __atodbl_l 6 API calls 35060->35069 35065 e24bf2 _memset 35061->35065 35066 e24c70 _memset 35061->35066 35067 e24b26 _memset 35062->35067 35068 e24cce 6 API calls 35062->35068 35074 e4e0c0 __swprintf 85 API calls 35063->35074 35071 e4e0c0 __swprintf 85 API calls 35064->35071 35077 e4e0c0 __swprintf 85 API calls 35065->35077 35076 e4e0c0 __swprintf 85 API calls 35066->35076 35080 e4e0c0 __swprintf 85 API calls 35067->35080 35257 e45360 35068->35257 35072 e24e7e 35069->35072 35075 e24a09 OutputDebugStringW 35071->35075 35072->34934 35081 e24a82 OutputDebugStringW 35074->35081 35089 e24a25 35075->35089 35082 e24ca8 OutputDebugStringW 35076->35082 35083 e24c11 OutputDebugStringW 35077->35083 35078 e24d63 FreeResource 35078->35079 35079->35027 35079->35028 35084 e24b65 OutputDebugStringW 35080->35084 35265 e453e0 64 API calls 35081->35265 35086 e21c90 35082->35086 35087 e24b81 35083->35087 35084->35087 35086->35068 35087->35059 35090 e24c54 FreeResource 35087->35090 35088 e24abd 35088->35079 35089->35059 35090->35059 35092 e23820 lstrcmpW 35091->35092 35095 e23819 35091->35095 35093 e23833 lstrcmpW 35092->35093 35092->35095 35094 e23846 lstrcmpW 35093->35094 35093->35095 35094->35095 35096 e23859 lstrcmpW 35094->35096 35095->34934 35096->35095 35098 e2d37d 22 API calls 35097->35098 35099 e2767e _memset 35098->35099 35100 e2769d SHGetSpecialFolderPathW 35099->35100 35101 e276b6 _memset 35100->35101 35102 e2776d 35100->35102 35106 e4e0c0 __swprintf 85 API calls 35101->35106 35103 e227ac 176 API calls 35102->35103 35104 e2777a SetEnvironmentVariableW 35103->35104 35105 e2779d _memset 35104->35105 35110 e277f0 35104->35110 35109 e277c3 GetLastError 35105->35109 35107 e276f3 OutputDebugStringW 35106->35107 35395 e4e030 35107->35395 35112 e4e0c0 __swprintf 85 API calls 35109->35112 35113 e4d16b __atodbl_l 6 API calls 35110->35113 35111 e2772b GetLastError 35114 e4e0c0 __swprintf 85 API calls 35111->35114 35115 e277df OutputDebugStringW 35112->35115 35116 e27829 35113->35116 35117 e27747 OutputDebugStringW 35114->35117 35115->35110 35116->34934 35117->35110 35119 e227ac 181 API calls 35118->35119 35120 e28ce9 35119->35120 35121 e299fc 52 API calls 35120->35121 35122 e28cf8 35121->35122 35123 e23061 48 API calls 35122->35123 35124 e28d02 35123->35124 35125 e227ac 181 API calls 35124->35125 35126 e28d0f _memset 35125->35126 35127 e28d2f GetTempFileNameW 35126->35127 35128 e28d60 35127->35128 35133 e28dac 35127->35133 35129 e21a39 47 API calls 35128->35129 35130 e28d81 35129->35130 35131 e226cf 181 API calls 35130->35131 35132 e28d94 35131->35132 35134 e28d9f DeleteFileW 35132->35134 35135 e4d16b __atodbl_l 6 API calls 35133->35135 35134->35133 35136 e28dee 35135->35136 35136->34934 35138 e2b8cb 35137->35138 35139 e2b8bf 35137->35139 35138->34934 35397 e4d7c4 35139->35397 35143 e2b8e6 35144 e29302 183 API calls 35143->35144 35145 e2b901 35144->35145 35145->34934 35147 e227ac 178 API calls 35146->35147 35148 e250be 35147->35148 35149 e227ac 178 API calls 35148->35149 35150 e250d4 35149->35150 35151 e23803 5 API calls 35150->35151 35152 e2511d 35151->35152 35410 e2bebd 35152->35410 35155 e227ac 178 API calls 35156 e25140 RegQueryValueExW 35155->35156 35157 e25181 35156->35157 35169 e251ca 35156->35169 35158 e2520a 35157->35158 35159 e2518a 35157->35159 35164 e25243 RegQueryValueExW 35158->35164 35160 e251d4 RegQueryValueExW 35159->35160 35161 e2518f 35159->35161 35160->35169 35165 e25198 RegQueryValueExW 35161->35165 35161->35169 35162 e252b6 RegCloseKey 35163 e252bd 35162->35163 35166 e4d16b __atodbl_l 6 API calls 35163->35166 35167 e226cf 178 API calls 35164->35167 35165->35169 35168 e252e0 35166->35168 35167->35169 35168->34934 35169->35162 35169->35163 35170->34923 35172->34923 35173->34915 35175->34919 35177->34922 35178->34933 35179->34937 35180->34932 35181->34937 35190 e2d05c 35182->35190 35186 e2f48d 35186->34953 35187 e2d595 183 API calls 35188 e2f41b 35187->35188 35188->35186 35188->35187 35189 e2d90d 183 API calls 35188->35189 35189->35188 35191 e2d07f 35190->35191 35192 e2d07a 35190->35192 35191->35192 35193 e356bc 183 API calls 35191->35193 35192->35188 35194 e2ea12 183 API calls 35192->35194 35193->35192 35196 e2dfd2 35195->35196 35197 e2e024 35195->35197 35205 e36399 35196->35205 35209 e38896 183 API calls 35197->35209 35200 e2e029 35202 e2a281 35204 e2e8de 183 API calls 35202->35204 35210 e388a8 35205->35210 35207 e2dfde 35207->35202 35208 e3742e 183 API calls 35207->35208 35208->35202 35209->35200 35223 e2f6ba 35210->35223 35211 e38907 35211->35207 35212 e388f3 35212->35211 35215 e35645 183 API calls 35212->35215 35216 e3891f 35215->35216 35217 e3893a 35216->35217 35218 e2d05c 183 API calls 35216->35218 35217->35207 35219 e38936 35218->35219 35219->35217 35230 e2e753 183 API calls 35219->35230 35224 e2f6c3 35223->35224 35225 e2f6cf 35223->35225 35226 e4ef5c __fclose_nolock 21 API calls 35224->35226 35227 e5066e __realloc_crt 49 API calls 35225->35227 35228 e2f6cb 35226->35228 35227->35228 35228->35211 35228->35212 35229 e374d8 183 API calls 35228->35229 35232 e29a05 35231->35232 35233 e261f8 35231->35233 35242 e4e286 52 API calls __cinit 35232->35242 35235 e23061 35233->35235 35236 e2307e ExpandEnvironmentStringsW 35235->35236 35238 e21a39 47 API calls 35236->35238 35239 e230a5 35238->35239 35240 e4d16b __atodbl_l 6 API calls 35239->35240 35241 e230b3 PathFileExistsW 35240->35241 35241->34980 35241->34981 35242->35233 35244 e2d3fb 35243->35244 35245 e2d40b 35244->35245 35255 e351db 183 API calls 3 library calls 35244->35255 35245->34997 35247 e2d422 35247->35245 35256 e3742e 183 API calls 35247->35256 35250->34991 35251->35016 35253 e4d16b __atodbl_l 6 API calls 35252->35253 35254 e4f49a 35253->35254 35254->35254 35255->35247 35256->35245 35267 e4ef94 35257->35267 35259 e45388 _memmove 35281 e454d0 35259->35281 35262 e24d5a 35262->35078 35262->35079 35263 e4ef5c __fclose_nolock 21 API calls 35263->35262 35264->35032 35265->35088 35266->35060 35268 e4f00f __calloc_impl 35267->35268 35278 e4efa0 __calloc_impl 35267->35278 35316 e500c9 21 API calls __getptd_noexit 35268->35316 35269 e4efab 35269->35278 35311 e58bf2 42 API calls __NMSG_WRITE 35269->35311 35312 e58c4f 42 API calls 7 library calls 35269->35312 35313 e543a1 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 35269->35313 35272 e4efd3 RtlAllocateHeap 35273 e4f007 35272->35273 35272->35278 35273->35259 35275 e4effb 35314 e500c9 21 API calls __getptd_noexit 35275->35314 35278->35269 35278->35272 35278->35275 35279 e4eff9 35278->35279 35315 e500c9 21 API calls __getptd_noexit 35279->35315 35282 e454eb 35281->35282 35283 e21a39 47 API calls 35282->35283 35284 e45543 35283->35284 35285 e4555a PathAddBackslashW 35284->35285 35286 e2230b 47 API calls 35285->35286 35287 e4556c 35286->35287 35317 e486a0 35287->35317 35289 e45605 35290 e46140 21 API calls 35289->35290 35302 e4561f _memset _memmove 35289->35302 35290->35302 35291 e459b7 35369 e46140 35291->35369 35293 e459cb 35294 e4d16b __atodbl_l 6 API calls 35293->35294 35295 e453be 35294->35295 35295->35262 35295->35263 35296 e45998 35366 e48c40 35296->35366 35298 e457bf CreateDirectoryW 35298->35302 35299 e457cb CreateFileW 35300 e457f9 GetLastError 35299->35300 35299->35302 35300->35302 35301 e45788 CreateDirectoryW 35301->35302 35302->35291 35302->35296 35302->35298 35302->35299 35302->35301 35304 e4588e CreateFileW 35302->35304 35307 e4592b FindCloseChangeNotification 35302->35307 35309 e45969 SetFileAttributesW 35302->35309 35353 e48a60 35302->35353 35361 e45b10 35302->35361 35305 e458c5 GetLastError 35304->35305 35306 e458b9 35304->35306 35305->35302 35306->35302 35307->35302 35308 e45936 GetLastError 35307->35308 35308->35296 35308->35302 35309->35302 35311->35269 35312->35269 35314->35279 35315->35273 35316->35273 35321 e486db 35317->35321 35318 e48a40 35319 e4d16b __atodbl_l 6 API calls 35318->35319 35320 e48a52 35319->35320 35320->35289 35321->35318 35322 e48752 35321->35322 35323 e4873c 35321->35323 35326 e487b2 35322->35326 35327 e4879c 35322->35327 35324 e4d16b __atodbl_l 6 API calls 35323->35324 35325 e4874e 35324->35325 35325->35289 35329 e48a2a 35326->35329 35332 e487cb 35326->35332 35339 e487de 35326->35339 35328 e4d16b __atodbl_l 6 API calls 35327->35328 35331 e487ae 35328->35331 35330 e4d16b __atodbl_l 6 API calls 35329->35330 35333 e48a3c 35330->35333 35331->35289 35334 e4d16b __atodbl_l 6 API calls 35332->35334 35333->35289 35335 e487da 35334->35335 35335->35289 35336 e48a14 35337 e4d16b __atodbl_l 6 API calls 35336->35337 35338 e48a26 35337->35338 35338->35289 35339->35318 35339->35336 35340 e4888e 35339->35340 35340->35318 35341 e488a2 35340->35341 35341->35329 35346 e488bd 35341->35346 35342 e4d16b __atodbl_l 6 API calls 35343 e48a10 35342->35343 35343->35289 35344 e4895b 35345 e489ef 35344->35345 35347 e489b8 35344->35347 35345->35342 35346->35344 35346->35345 35373 e478d0 35346->35373 35378 e48590 47 API calls __atodbl_l 35347->35378 35350 e489ca 35351 e4d16b __atodbl_l 6 API calls 35350->35351 35352 e489eb 35351->35352 35352->35289 35354 e48a98 35353->35354 35355 e48abf 35353->35355 35354->35302 35356 e48b63 35355->35356 35357 e48b31 35355->35357 35379 e48c20 35355->35379 35356->35302 35359 e48b3a 35357->35359 35384 e49c90 35357->35384 35359->35302 35362 e45b25 35361->35362 35363 e45b6f 35361->35363 35362->35363 35364 e45b30 WriteFile 35362->35364 35363->35302 35364->35362 35365 e45b78 GetLastError 35364->35365 35365->35302 35367 e4ef5c __fclose_nolock 21 API calls 35366->35367 35368 e48c4b 35367->35368 35368->35291 35370 e4614f 35369->35370 35372 e48c40 21 API calls 35370->35372 35371 e4617c 35372->35371 35374 e477a0 7 API calls 35373->35374 35375 e478f8 35374->35375 35376 e4791c 35375->35376 35377 e49c90 47 API calls 35375->35377 35376->35344 35377->35375 35378->35350 35380 e48c2c 35379->35380 35381 e48c2a 35379->35381 35382 e4ef94 _malloc 46 API calls 35380->35382 35381->35357 35383 e48c32 35382->35383 35383->35357 35385 e468d0 7 API calls 35384->35385 35388 e49cfa 35385->35388 35386 e49e2b 35387 e4d16b __atodbl_l 6 API calls 35386->35387 35389 e49e3d 35387->35389 35388->35386 35390 e49d4e 35388->35390 35389->35356 35391 e495f0 46 API calls 35390->35391 35393 e49da6 35391->35393 35392 e4d16b __atodbl_l 6 API calls 35394 e49e27 35392->35394 35393->35392 35394->35356 35396 e4e03c 35395->35396 35396->35111 35396->35396 35400 e4d7cc __calloc_impl 35397->35400 35398 e4ef94 _malloc 46 API calls 35398->35400 35399 e2b8c6 35399->35138 35404 e4d052 35399->35404 35400->35398 35400->35399 35401 e4d7e8 std::exception::exception 35400->35401 35408 e4f421 RaiseException 35401->35408 35403 e4d812 35405 e4d06d std::exception::exception 35404->35405 35409 e4f421 RaiseException 35405->35409 35407 e4d082 35408->35403 35409->35407 35411 e2bee6 RegOpenKeyExW 35410->35411 35412 e2bed8 35410->35412 35411->35412 35413 e25127 35412->35413 35414 e2beff RegCloseKey 35412->35414 35413->35155 35413->35169 35414->35413 35415->34884 35416->34886 35417->34597 35434 e2f15c 35418->35434 35421 e23f36 35423 e24637 183 API calls 35421->35423 35422 e23f49 35424 e227ac 183 API calls 35422->35424 35433 e23f3f 35423->35433 35425 e23f56 _memset 35424->35425 35428 e4e0c0 __swprintf 85 API calls 35425->35428 35426 e4d16b __atodbl_l 6 API calls 35427 e24004 35426->35427 35427->34606 35429 e23f9d OutputDebugStringW 35428->35429 35430 e23fc8 _memset 35429->35430 35431 e4e0c0 __swprintf 85 API calls 35430->35431 35432 e23fda OutputDebugStringW 35431->35432 35432->35433 35433->35426 35437 e2dd6c 35434->35437 35436 e23f2f 35436->35421 35436->35422 35440 e36267 35437->35440 35439 e2ddad 35439->35436 35451 e360ed 35440->35451 35443 e388a8 183 API calls 35444 e362ca 35443->35444 35445 e388a8 183 API calls 35444->35445 35446 e362e1 35445->35446 35447 e388a8 183 API calls 35446->35447 35448 e362f3 35447->35448 35449 e388a8 183 API calls 35448->35449 35450 e36305 35449->35450 35450->35439 35452 e356bc 183 API calls 35451->35452 35453 e3611f 35452->35453 35454 e3615a 35453->35454 35460 e3482f 183 API calls 35453->35460 35454->35443 35456 e36135 35461 e355eb 183 API calls 35456->35461 35458 e3613f 35462 e3586b 183 API calls 35458->35462 35460->35456 35461->35458 35462->35454 35464 e220ed 35463->35464 35465 e2276d MultiByteToWideChar 35463->35465 35464->34618 35466 e21e08 35465->35466 35467 e2278a MultiByteToWideChar 35466->35467 35467->35464 35468->34622 35470 e2102b __EH_prolog3_GS 35469->35470 35471 e21046 35470->35471 35472 e21038 35470->35472 35479 e21898 __vwprintf_p __EH_prolog3 vswprintf 35471->35479 35478 e21aae 47 API calls 35472->35478 35475 e21041 35476 e4f490 6 API calls 35475->35476 35477 e21093 CreateMutexW 35476->35477 35477->34627 35478->35475 35479->35475 35480->34640 35481->34646 35482->34643 35483->34645 35484->34646 35485->34654 35486->34661 35487->34661 35489 e2dca8 35488->35489 35490 e2dd31 35489->35490 35491 e2dcd5 35489->35491 35492 e360ed 183 API calls 35490->35492 35493 e35dc9 183 API calls 35491->35493 35494 e2dd1f 35492->35494 35493->35494 35494->34667 35496 e22623 WideCharToMultiByte 35495->35496 35497 e22657 35495->35497 35500 e22556 47 API calls 35496->35500 35497->34674 35499 e22648 WideCharToMultiByte 35499->35497 35500->35499 35501 e32c6f 35502 e32c88 35501->35502 35503 e35ba3 183 API calls 35502->35503 35504 e319c8 35503->35504 35505 1ace930 35506 1ace940 35505->35506 35507 1acea5a LoadLibraryA 35506->35507 35510 1acea9f VirtualProtect VirtualProtect 35506->35510 35508 1acea71 35507->35508 35508->35506 35512 1acea83 GetProcAddress 35508->35512 35511 1aceb04 35510->35511 35511->35511 35512->35508 35513 1acea99 ExitProcess 35512->35513 35514 e3320d 35515 e33240 35514->35515 35517 e3187c 35514->35517 35515->35517 35549 e35812 183 API calls 35515->35549 35519 e31ca2 35517->35519 35520 e31b4c 35517->35520 35521 e319d3 35517->35521 35522 e31956 35517->35522 35523 e31a3a 35517->35523 35536 e318d2 35517->35536 35537 e31c86 35517->35537 35540 e30763 183 API calls 35517->35540 35546 e33c8b 183 API calls __atodbl_l 35517->35546 35531 e31cea 35519->35531 35548 e342bb 30 API calls 35519->35548 35532 e31aa0 35520->35532 35545 e342eb 31 API calls 35520->35545 35529 e31996 35521->35529 35542 e342eb 31 API calls 35521->35542 35522->35529 35541 e342eb 31 API calls 35522->35541 35523->35532 35543 e342eb 31 API calls 35523->35543 35534 e30a47 183 API calls 35529->35534 35529->35536 35530 e30a47 183 API calls 35539 e319c5 35530->35539 35531->35530 35531->35536 35532->35536 35544 e30b1d 183 API calls 35532->35544 35534->35539 35547 e3742e 183 API calls 35537->35547 35540->35517 35541->35529 35542->35529 35543->35532 35544->35539 35545->35532 35546->35517 35547->35539 35548->35531 35550 e43b1a 35551 e43b2d 35550->35551 35552 e43b40 35551->35552 35553 e43c2b 35551->35553 35555 e388a8 183 API calls 35552->35555 35561 e38896 183 API calls 35553->35561 35558 e43b4d 35555->35558 35556 e43c30 35557 e43c26 35558->35557 35560 e43a93 183 API calls __atodbl_l 35558->35560 35560->35558 35561->35556

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 e24712-e247e3 call e24e82 call e227ee call e29871 7 e247e9-e247ea 0->7 8 e248ac 0->8 9 e24882 7->9 10 e247f0-e247f1 7->10 11 e248b0-e248ee call e227ac call e299fc call e23061 PathFileExistsW 8->11 12 e24886-e24893 call e2d24f 9->12 13 e247f7-e24808 call e2d24f 10->13 14 e24d7e-e24dab call e2d132 10->14 40 e24977-e24979 11->40 41 e248f4-e24972 call e4e030 call e4e0c0 OutputDebugStringW call e2d132 11->41 26 e24895-e248a1 call e2d3cf 12->26 27 e248a8-e248aa 12->27 13->12 28 e2480a-e2486a call e2edc3 call e24eb1 call e45470 13->28 24 e24df0-e24e26 call e4e030 call e4e0c0 OutputDebugStringW 14->24 25 e24dad-e24dee call e4e030 call e4e0c0 OutputDebugStringW 14->25 54 e24e29 24->54 25->54 26->27 43 e248a3-e248a6 26->43 27->11 28->9 66 e2486c-e2487e 28->66 48 e24ad1-e24af1 call e2d266 40->48 49 e2497f-e249d9 call e227ac call e299fc call e23061 PathFileExistsW 40->49 81 e24c5e-e24c6b call e21c90 41->81 43->11 63 e24af7-e24b20 call e2d37d call e2c69c 48->63 64 e24b9b-e24bf0 call e227ac call e2c69c 48->64 88 e24a4a-e24acc call e4e030 call e4e0c0 OutputDebugStringW call e453e0 call e21c90 49->88 89 e249db-e24a45 call e4e030 call e4e0c0 OutputDebugStringW call e2d132 call e21c90 49->89 61 e24e2d-e24e81 call e2282f call e29975 * 2 call e4d16b 54->61 95 e24b26-e24b96 call e4e030 call e4e0c0 OutputDebugStringW call e2d132 63->95 96 e24cce-e24d55 LockResource VirtualProtect * 4 SizeofResource call e45360 63->96 93 e24bf2-e24c48 call e4e030 call e4e0c0 OutputDebugStringW call e2d132 call e21c90 64->93 94 e24c70-e24cc9 call e4e030 call e4e0c0 OutputDebugStringW call e21c90 64->94 66->9 81->61 122 e24d71-e24d79 call e21c90 88->122 89->81 135 e24c4d-e24c52 93->135 94->96 95->135 109 e24d5a-e24d61 96->109 115 e24d63-e24d67 FreeResource 109->115 116 e24d6d 109->116 115->116 116->122 122->14 135->81 139 e24c54-e24c58 FreeResource 135->139 139->81
                                                        APIs
                                                          • Part of subcall function 00E227EE: __EH_prolog3.LIBCMT ref: 00E227F5
                                                        • PathFileExistsW.SHLWAPI(?,?,?), ref: 00E248EA
                                                        • _memset.LIBCMT ref: 00E24913
                                                        • __swprintf.LIBCMT ref: 00E2493C
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E2494C
                                                        • PathFileExistsW.SHLWAPI(00E7D368), ref: 00E249B5
                                                        • _memset.LIBCMT ref: 00E249DB
                                                        • __swprintf.LIBCMT ref: 00E24A04
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E24A14
                                                        • _memset.LIBCMT ref: 00E24A4A
                                                        • __swprintf.LIBCMT ref: 00E24A7D
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E24A8D
                                                        • _memset.LIBCMT ref: 00E24B46
                                                        • __swprintf.LIBCMT ref: 00E24B60
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E24B70
                                                        • _memset.LIBCMT ref: 00E24BF2
                                                        • __swprintf.LIBCMT ref: 00E24C0C
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E24C1C
                                                        • FreeResource.KERNEL32(00000000), ref: 00E24C58
                                                        • _memset.LIBCMT ref: 00E24C70
                                                        • __swprintf.LIBCMT ref: 00E24CA3
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E24CB3
                                                        • LockResource.KERNEL32(?), ref: 00E24CD2
                                                        • VirtualProtect.KERNEL32(00000000,00000001,00000004,00000000), ref: 00E24CF6
                                                        • VirtualProtect.KERNEL32(?,00000001,?,00000000), ref: 00E24D0C
                                                        • VirtualProtect.KERNEL32(00000001,00000001,00000004,00000000), ref: 00E24D18
                                                        • VirtualProtect.KERNEL32(00000001,00000001,?,00000000), ref: 00E24D28
                                                        • SizeofResource.KERNEL32(?), ref: 00E24D42
                                                          • Part of subcall function 00E2C69C: FindResourceW.KERNEL32(00000000,?,DAR,00E23D3D,?,?,5E3F636C,00000000,DAR), ref: 00E2C6AD
                                                        • FreeResource.KERNEL32(00000000,?,00000000,?), ref: 00E24D67
                                                        • _memset.LIBCMT ref: 00E24DAD
                                                        • __swprintf.LIBCMT ref: 00E24DC7
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,00000001,00000000), ref: 00E24DD7
                                                        • _memset.LIBCMT ref: 00E24DF0
                                                        • __swprintf.LIBCMT ref: 00E24E05
                                                        • OutputDebugStringW.KERNEL32(?,?,00000001,00000000), ref: 00E24E14
                                                        • _Func_class.LIBCPMT ref: 00E24E4D
                                                        • _Func_class.LIBCPMT ref: 00E24E56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset$Resource$ProtectVirtual$ExistsFileFreeFunc_classPath$FindH_prolog3LockSizeof
                                                        • String ID: DATA$Fun:%s ,LoadResource failed!$Fun:%s, Description: UnCompress failed.!$Fun:%s, Description:%s it's not exists!$Lua_UnCompress7z$UnCompress %s to %s .$UnCompress successful.$hwang $lc?^
                                                        • API String ID: 2171481348-3067499199
                                                        • Opcode ID: 56c57ad88a0cb433b59a426455615048396fa435a3bfd1dd3405bcb5cf2add4b
                                                        • Instruction ID: 4705871f290c82eec90a5c2e8f5e351560631062eb115694ac829a40cc6ec9d1
                                                        • Opcode Fuzzy Hash: 56c57ad88a0cb433b59a426455615048396fa435a3bfd1dd3405bcb5cf2add4b
                                                        • Instruction Fuzzy Hash: AA227DB15083409FD314DF24E882BABB7E9FF84704F50581DF599A7292DB71E909CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 304 e21f35-e21fae GetCurrentDirectoryW call e21e08 GetModuleFileNameW call e21dea call e222c1 311 e21fb2-e21fda SetCurrentDirectoryW call e21c90 CoInitialize call e222e4 call e23872 304->311 312 e21fb0 304->312 319 e2204a 311->319 320 e21fdc-e21ffd call e222e4 call e23cd8 311->320 312->311 321 e2204c-e22072 SetCurrentDirectoryW call e4d16b 319->321 329 e22075-e22091 call e222e4 call e23cd8 320->329 330 e21fff-e22028 call e4e030 320->330 340 e22093-e220c1 call e4e030 329->340 341 e220c6-e22115 call e222e4 call e23cd5 call e2d6ab call e227ac call e2d6ab call e2d37d 329->341 335 e2202d-e22044 call e4e0c0 OutputDebugStringW 330->335 335->319 340->335 356 e22127 341->356 357 e22117-e22125 call e21a39 341->357 359 e22129-e22143 call e21e30 356->359 357->359 362 e22148-e2214a 359->362 363 e22155-e2216e call e2d6ab call e2d24f 362->363 364 e2214c-e22150 362->364 372 e22170-e2217f call e222e4 call e24637 363->372 373 e22181-e22185 363->373 365 e222b0-e222bc call e21c90 364->365 365->321 374 e22187-e221a0 call e2d6ab call e2d24f 372->374 373->374 383 e221a2-e221af call e222e4 call e24637 374->383 384 e221b1 374->384 386 e221b5-e22203 call e2d6ab call e227ac call e226cf call e2d9af call e2d6ab call e2d24f 383->386 384->386 402 e22214 386->402 403 e22205-e22212 call e222e4 call e24637 386->403 404 e22218-e22231 call e2d6ab call e2d24f 402->404 403->404 413 e22242 404->413 414 e22233-e22240 call e222e4 call e24637 404->414 416 e22246-e2225f call e2d6ab call e2d24f 413->416 414->416 424 e22270 416->424 425 e22261-e2226e call e222e4 call e24637 416->425 427 e22274-e2228d call e2d6ab call e2d24f 424->427 425->427 435 e2229e 427->435 436 e2228f-e2229c call e222e4 call e24637 427->436 437 e222a2-e222ab call e21c90 435->437 436->437 437->365
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00E21F5C
                                                        • GetModuleFileNameW.KERNEL32(00000000,00000000,00000104), ref: 00E21F8D
                                                          • Part of subcall function 00E222C1: PathRemoveFileSpecW.SHLWAPI(00000000,00000000,00000104,00E21FA6,00000000), ref: 00E222D0
                                                        • SetCurrentDirectoryW.KERNEL32(?,00000000), ref: 00E21FB3
                                                        • CoInitialize.OLE32(00000000), ref: 00E21FC6
                                                        • _memset.LIBCMT ref: 00E22020
                                                        • __swprintf.LIBCMT ref: 00E22035
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E22044
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E22057
                                                          • Part of subcall function 00E23CD8: _memset.LIBCMT ref: 00E23D5E
                                                          • Part of subcall function 00E23CD8: __swprintf.LIBCMT ref: 00E23D7E
                                                          • Part of subcall function 00E23CD8: OutputDebugStringW.KERNEL32(?,?,?,?,?,DAR), ref: 00E23D91
                                                          • Part of subcall function 00E23CD8: _memset.LIBCMT ref: 00E23DAC
                                                          • Part of subcall function 00E23CD8: GetLastError.KERNEL32(?,?,?,?,?,?,?,DAR), ref: 00E23DB4
                                                          • Part of subcall function 00E23CD8: __swprintf.LIBCMT ref: 00E23DC5
                                                          • Part of subcall function 00E23CD8: OutputDebugStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,DAR), ref: 00E23DD2
                                                          • Part of subcall function 00E23CD8: FreeResource.KERNEL32(00000000,00000000,00000000,?), ref: 00E23EC3
                                                        • _memset.LIBCMT ref: 00E220B4
                                                          • Part of subcall function 00E226CF: __EH_prolog3_GS.LIBCMT ref: 00E226D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memset$CurrentDebugDirectoryOutputString__swprintf$File$ErrorFreeH_prolog3_InitializeLastModuleNamePathRemoveResourceSpec
                                                        • String ID: DAR$DAR0$DAR2$DTLSE_AfterComplete$DTLSE_BeforeComplete$DTLSE_BeforeInit$DTLSE_BeforeInstall$DTLSE_OnInstall$DoResLua failed, DAR0$DoResLua failed, DAR2$Global\{A043B702-166A-4FB8-9733-E2BC4713F36F}$InstallPath$global_app_id$global_install_mutex_guid$global_install_path$hwang
                                                        • API String ID: 3785559241-2980821603
                                                        • Opcode ID: 6aae8e1162fb9694dceab450f79dc84158e3314c9474592823c071434217c273
                                                        • Instruction ID: 0b842bc14542396de92572ccc8d6f5083f73f166fda75acd90ee9ced363c0a26
                                                        • Opcode Fuzzy Hash: 6aae8e1162fb9694dceab450f79dc84158e3314c9474592823c071434217c273
                                                        • Instruction Fuzzy Hash: 94912632608760ABC624FB35AC06D5F76E5AFC2720F10A61DF569B71E1DF349902CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E27698
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00E276A8
                                                        • _memset.LIBCMT ref: 00E276D5
                                                        • __swprintf.LIBCMT ref: 00E276EE
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E27704
                                                        • _memset.LIBCMT ref: 00E27726
                                                        • GetLastError.KERNEL32 ref: 00E2772E
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E27752
                                                        • __swprintf.LIBCMT ref: 00E27742
                                                          • Part of subcall function 00E4E0C0: __woutput_l.LIBCMT ref: 00E4E119
                                                        • SetEnvironmentVariableW.KERNEL32(?,?), ref: 00E2778F
                                                        • _memset.LIBCMT ref: 00E277BE
                                                        • GetLastError.KERNEL32(?,?,00000001), ref: 00E277C6
                                                        • __swprintf.LIBCMT ref: 00E277DA
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,?,00000001), ref: 00E277EA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memset$DebugOutputString__swprintf$ErrorLast$EnvironmentFolderPathSpecialVariable__woutput_l
                                                        • String ID: SHGetSpecialFolderPathW csidl=%d failed!$SetEnvironmentVariableW failed!hwang err:%d$hwang $hwang err:%d
                                                        • API String ID: 2944793419-723870597
                                                        • Opcode ID: 3f72be3f22ec6be0d7762eca2d13dcb32eb997f85f44551a92f085b09f4a9ebf
                                                        • Instruction ID: 08d2ccf52ba1d4182330138542ec888b9c05a51ee64ab59a3a2c77812ed53ee2
                                                        • Opcode Fuzzy Hash: 3f72be3f22ec6be0d7762eca2d13dcb32eb997f85f44551a92f085b09f4a9ebf
                                                        • Instruction Fuzzy Hash: 914180725143409BC320DF65EC4AB9BB3E8FF89314F405929F94CDB142EBB59649CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 801 e21e30-e21eb0 InitializeSecurityDescriptor SetSecurityDescriptorDacl call e2101f 804 e21eb2 801->804 805 e21eb4-e21ec4 CreateMutexW 801->805 804->805 806 e21ee0-e21eef call e21c90 805->806 807 e21ec6-e21ec9 805->807 815 e21ef1-e21efc GetLastError 806->815 816 e21f1b-e21f1d 806->816 808 e21ed4-e21ed6 807->808 809 e21ecb-e21ecf 807->809 808->806 812 e21ed8-e21edb 808->812 809->808 811 e21ed1 809->811 811->808 812->806 814 e21edd 812->814 814->806 815->816 818 e21efe-e21f0c FindWindowW 815->818 817 e21f1e-e21f30 call e4d16b 816->817 819 e21f17-e21f19 818->819 820 e21f0e-e21f11 SwitchToThisWindow 818->820 819->817 820->819
                                                        APIs
                                                        • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 00E21E70
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 00E21E81
                                                          • Part of subcall function 00E2101F: __EH_prolog3_GS.LIBCMT ref: 00E21026
                                                        • CreateMutexW.KERNEL32(?,00000000,00000000), ref: 00E21EBB
                                                        • GetLastError.KERNEL32(00000001,00000000), ref: 00E21EF1
                                                        • FindWindowW.USER32(SMG_Installer,00000000), ref: 00E21F04
                                                        • SwitchToThisWindow.USER32(00000000,00000001), ref: 00E21F11
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DescriptorSecurityWindow$CreateDaclErrorFindH_prolog3_InitializeLastMutexSwitchThis
                                                        • String ID: SMG_Installer
                                                        • API String ID: 2013107316-1780044750
                                                        • Opcode ID: 386a39d01221a260f2c18a6119bf436578b5195c5da76a38fe210e4632d3a161
                                                        • Instruction ID: d031a297f78004264246f77e994ba76c15238f063b06afd7106db452f66fdedb
                                                        • Opcode Fuzzy Hash: 386a39d01221a260f2c18a6119bf436578b5195c5da76a38fe210e4632d3a161
                                                        • Instruction Fuzzy Hash: 2A318E31608340AFD710CF69DC08A9BBBF8FF98314F005A2AF959E6151D770DA48CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 823 1ace930-1ace93d 824 1ace94a-1ace94f 823->824 825 1ace951 824->825 826 1ace940-1ace945 825->826 827 1ace953 825->827 829 1ace946-1ace948 826->829 828 1ace958-1ace95a 827->828 830 1ace95c-1ace961 828->830 831 1ace963-1ace967 828->831 829->824 829->825 830->831 832 1ace969 831->832 833 1ace974-1ace977 831->833 834 1ace96b-1ace972 832->834 835 1ace993-1ace998 832->835 836 1ace979-1ace97e 833->836 837 1ace980-1ace982 833->837 834->833 834->835 838 1ace99a-1ace9a3 835->838 839 1ace9ab-1ace9ad 835->839 836->837 837->828 842 1acea1a-1acea1d 838->842 843 1ace9a5-1ace9a9 838->843 840 1ace9af-1ace9b4 839->840 841 1ace9b6 839->841 840->841 845 1ace9b8-1ace9bb 841->845 846 1ace984-1ace986 841->846 844 1acea22-1acea25 842->844 843->841 847 1acea27-1acea29 844->847 848 1ace9bd-1ace9c2 845->848 849 1ace9c4 845->849 850 1ace98f-1ace991 846->850 851 1ace988-1ace98d 846->851 847->844 852 1acea2b-1acea2e 847->852 848->849 849->846 853 1ace9c6-1ace9c8 849->853 854 1ace9e5-1ace9f4 850->854 851->850 852->844 855 1acea30-1acea4c 852->855 856 1ace9ca-1ace9cf 853->856 857 1ace9d1-1ace9d5 853->857 858 1acea04-1acea11 854->858 859 1ace9f6-1ace9fd 854->859 855->847 861 1acea4e 855->861 856->857 857->853 862 1ace9d7 857->862 858->858 860 1acea13-1acea15 858->860 859->859 863 1ace9ff 859->863 860->829 864 1acea54-1acea58 861->864 865 1ace9d9-1ace9e0 862->865 866 1ace9e2 862->866 863->829 867 1acea9f-1aceaa2 864->867 868 1acea5a-1acea70 LoadLibraryA 864->868 865->853 865->866 866->854 869 1aceaa5-1aceaac 867->869 870 1acea71-1acea76 868->870 871 1aceaae-1aceab0 869->871 872 1acead0-1aceb00 VirtualProtect * 2 869->872 870->864 873 1acea78-1acea7a 870->873 874 1aceab2-1aceac1 871->874 875 1aceac3-1aceace 871->875 876 1aceb04-1aceb08 872->876 877 1acea7c-1acea82 873->877 878 1acea83-1acea90 GetProcAddress 873->878 874->869 875->874 876->876 879 1aceb0a 876->879 877->878 880 1acea99 ExitProcess 878->880 881 1acea92-1acea97 878->881 881->870
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?), ref: 01ACEA6A
                                                        • GetProcAddress.KERNEL32(?,01ACAFF9), ref: 01ACEA88
                                                        • ExitProcess.KERNEL32(?,01ACAFF9), ref: 01ACEA99
                                                        • VirtualProtect.KERNEL32(00E20000,00001000,00000004,?,00000000), ref: 01ACEAE7
                                                        • VirtualProtect.KERNEL32(00E20000,00001000), ref: 01ACEAFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                                        • String ID:
                                                        • API String ID: 1996367037-0
                                                        • Opcode ID: f96569962d8490cabe86609db11f07e55abb59a778f0655005cc79c78326c73d
                                                        • Instruction ID: 19f415d97a708e85070024e61e372218102a8ef2e3bd0eede618715f3908e25c
                                                        • Opcode Fuzzy Hash: f96569962d8490cabe86609db11f07e55abb59a778f0655005cc79c78326c73d
                                                        • Instruction Fuzzy Hash: 1A51D5B2A542525ED7218FBCCCC06A4FFA5EB45A31B1C073DC6E6C73C6EBA4580587A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindResourceW.KERNEL32(00000000,?,DAR,00E23D3D,?,?,5E3F636C,00000000,DAR), ref: 00E2C6AD
                                                        • LoadResource.KERNEL32(00000000), ref: 00E2C6C5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoad
                                                        • String ID: DAR
                                                        • API String ID: 2619053042-3839210130
                                                        • Opcode ID: 396e2b61eb9cfabf15f397506625449fa8c6a7dd1bda9f7ac027a4ec7144cb71
                                                        • Instruction ID: 0bd23e3ef47f8b7146af42a91f0456e6eb52f201bdf9ff8d424c0ada491d4513
                                                        • Opcode Fuzzy Hash: 396e2b61eb9cfabf15f397506625449fa8c6a7dd1bda9f7ac027a4ec7144cb71
                                                        • Instruction Fuzzy Hash: FAE04F36404712EFCB119F21FC0847ABBA5FF24755320A82BE896B2220E771C895EF60
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: lc?^
                                                        • API String ID: 0-3458774033
                                                        • Opcode ID: 47de951206a761522049aeb14e359c792bc614238fd2cd8400a5f4054e73e33e
                                                        • Instruction ID: bf291dc4edb8af7ee59b2490911420554a8ce6257d4ca2393dc87b6e105c8d74
                                                        • Opcode Fuzzy Hash: 47de951206a761522049aeb14e359c792bc614238fd2cd8400a5f4054e73e33e
                                                        • Instruction Fuzzy Hash: 07B18F32E001189BCF54DFE8E981AEDB7F5EF88314F14516AE909F7342EA70AD458B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50f0a91fc2da87ce406fdb78e9d736d2e98b321360a202a0dab696a9ae80e4d9
                                                        • Instruction ID: 76fff2e01bbdbd833915906a37cded7c4c0ae99efa520e92be3da5172a6bb71a
                                                        • Opcode Fuzzy Hash: 50f0a91fc2da87ce406fdb78e9d736d2e98b321360a202a0dab696a9ae80e4d9
                                                        • Instruction Fuzzy Hash: DFF12DB5E006199BDB18CF59C8456AEBBF2FF84304F2982ACD416BB750D734AE41CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: caae16fb309dd417c58563bd18ab06a793007305648432a07970532f1d2a6de0
                                                        • Instruction ID: 85c77c4f7605650fa3c2cd77cb3369aea82a26afe08c0fab698467bcd7a8f68d
                                                        • Opcode Fuzzy Hash: caae16fb309dd417c58563bd18ab06a793007305648432a07970532f1d2a6de0
                                                        • Instruction Fuzzy Hash: F0E11CB2E006199FDB18CF99C8446ADBBF2FF88304F1981A9D815B7744D775AE01CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 135d62eb7ebc8b519e5aed100b11b51b4f0aae791db16a22cf4f64f06b9af6ba
                                                        • Instruction ID: 224c4d3d9b785c15c4cf2807b16eaae652d687f71a0a975fa83d46ee69984d23
                                                        • Opcode Fuzzy Hash: 135d62eb7ebc8b519e5aed100b11b51b4f0aae791db16a22cf4f64f06b9af6ba
                                                        • Instruction Fuzzy Hash: 54E12BB5E006199FDB18CF59C845AADBBF2FF88304F2981A9D411BB744D735AE01CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39081b72b43619e5533319b66845ba54d56a32206617a608db9f7dc18d5d31e6
                                                        • Instruction ID: 8c8680f5bb7b3754bcae3605243e63c0fa7c09fcfabb718da0551ff563a653cc
                                                        • Opcode Fuzzy Hash: 39081b72b43619e5533319b66845ba54d56a32206617a608db9f7dc18d5d31e6
                                                        • Instruction Fuzzy Hash: A1D13BB2E0061AABDB18CF58C8456ADBBF2FF88304F1582A9D516B7740D774AE41CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 443 e23337-e23359 call e4f4e1 call e2d498 448 e23376-e2339e call e2d3cf 443->448 449 e2335b-e23371 443->449 455 e2340d-e2340f 448->455 450 e23570-e23575 call e4f490 449->450 456 e233a0-e233ab call e2d24f 455->456 457 e23411-e23417 PathFileExistsA 455->457 463 e2340a 456->463 464 e233ad-e233ae 456->464 458 e23419 457->458 459 e2341c-e23447 GetLastError call e2d3ec lstrcmp 457->459 458->459 469 e23464-e23472 lstrcmp 459->469 470 e23449-e2344f 459->470 468 e2340c 463->468 466 e233b0-e233b1 464->466 467 e233f9-e23408 call e2d3cf 464->467 474 e233c2-e233d1 call e2d498 466->474 475 e233b3-e233b4 466->475 467->468 468->455 472 e23494-e23495 469->472 473 e23474-e23482 lstrcmp 469->473 476 e23498-e234a2 call e2d4b8 470->476 472->476 473->472 478 e23484-e23492 lstrcmp 473->478 474->468 479 e233e6-e233f7 call e2d37d 475->479 480 e233b6-e233b7 475->480 490 e2355f-e2356f call e2d4b8 476->490 478->472 483 e234a7-e234b5 lstrcmp 478->483 479->468 484 e233d3-e233e4 call e2d3ec 480->484 485 e233b9-e233bc 480->485 491 e234b7-e234c9 483->491 492 e234ce-e234dc lstrcmp 483->492 484->468 485->474 489 e23451-e2345f call e2d524 call e306c6 485->489 489->469 490->450 495 e2355b 491->495 496 e23500-e2350e lstrcmp 492->496 497 e234de-e234fe call e2ce04 call e2c866 call e226ae 492->497 495->490 501 e23510-e23535 call e21aae call e226cf call e21c90 496->501 502 e23537-e23548 lstrcmp 496->502 497->490 501->490 507 e2354a-e23556 502->507 508 e23558 502->508 507->495 508->495
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 00E2333E
                                                        • PathFileExistsA.SHLWAPI(00000048), ref: 00E23411
                                                        • GetLastError.KERNEL32 ref: 00E2341F
                                                        • lstrcmp.KERNEL32(00000000,00000000), ref: 00E2343F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorExistsFileH_prolog3_LastPathlstrcmp
                                                        • String ID: astr$bool$int$int64$ptr$uint$uint64$unknow argument type$wstr
                                                        • API String ID: 671010600-603663793
                                                        • Opcode ID: bdd560b5672b78a85bfe062a994b7f716f83c40cf02fa07c3f739ceb850043d7
                                                        • Instruction ID: 9a959a3c94a6b8b29db8ba628702afd7de818a9ed4698b87a846f5d45ba92f76
                                                        • Opcode Fuzzy Hash: bdd560b5672b78a85bfe062a994b7f716f83c40cf02fa07c3f739ceb850043d7
                                                        • Instruction Fuzzy Hash: CA619070B00724DBCB15EF75EC55AAEBBB5BF40704B60A429E01AB7252DB789E068F10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 548 e43efb-e43f1a 549 e43f1d-e43f22 548->549 549->549 550 e43f24-e43f44 call e439ed call e645a6 549->550 555 e43f55-e43f5e call e439cc 550->555 556 e43f46-e43f54 call e4d16b 550->556
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID: Instruction$Lua$binary string$corrupted$endianness mismatch in$float format mismatch in$format mismatch in$int$lua_Integer$lua_Number$not a$size_t$version mismatch in$xV
                                                        • API String ID: 2931989736-932411338
                                                        • Opcode ID: f6481a2f11b408fb8846f1622c78d92c44040e51d7dd67a014bf81154739ea27
                                                        • Instruction ID: 3620baf34e9a7f7effe3d52ed62eea7b4e1461489ecb1db8f73aa49c3b86baa0
                                                        • Opcode Fuzzy Hash: f6481a2f11b408fb8846f1622c78d92c44040e51d7dd67a014bf81154739ea27
                                                        • Instruction Fuzzy Hash: 1EF0A971B001145B9B04EF78ED418FEB7F9EF89304754156AEC46F3246ED709E0986A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26217
                                                        • SHCreateDirectory.SHELL32(00000000,?), ref: 00E2623B
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26250
                                                        • _memset.LIBCMT ref: 00E26270
                                                        • __swprintf.LIBCMT ref: 00E26296
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E262A3
                                                        • _memset.LIBCMT ref: 00E262B7
                                                        • __swprintf.LIBCMT ref: 00E262D8
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E262E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugExistsFileOutputPathString__swprintf_memset$CreateDirectoryEnvironmentExpandStrings
                                                        • String ID: Create Directory %s!$Fun:%s, Description:%s it's not exists!$Lua_CreateDirectory$hwang
                                                        • API String ID: 3850036116-1673828136
                                                        • Opcode ID: b975a7d70df44ef8f8bc37a317891c7e3a0895f49b24e86e7d107ea32d084ba3
                                                        • Instruction ID: d7e13ec0ec0bb9f0067ceddd59168f77deb7ff8dabf8200936bdacbf2fe1d523
                                                        • Opcode Fuzzy Hash: b975a7d70df44ef8f8bc37a317891c7e3a0895f49b24e86e7d107ea32d084ba3
                                                        • Instruction Fuzzy Hash: 92416C72608300DFC710DF29E885A5AB7E8FF88715F50592EF498E7191DB70E909CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26B8A
                                                        • SHFileOperationW.SHELL32(?), ref: 00E26BE3
                                                        • _memset.LIBCMT ref: 00E26C7F
                                                        • __swprintf.LIBCMT ref: 00E26CA3
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26CB6
                                                        • _memset.LIBCMT ref: 00E26CD6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: File_memset$DebugEnvironmentExistsExpandOperationOutputPathStringStrings__swprintf
                                                        • String ID: Delete %s failed!$SHFileOperation error code : %#x$hwang
                                                        • API String ID: 2973828913-2413928965
                                                        • Opcode ID: fd5d2b9e1b3416663e15176bb9a89b667b9a34f00e41b5a867819da6e02e5a2c
                                                        • Instruction ID: 30ed4c5ba1e49113c03cd0aa7f31a24bd0ffe269ee579b09124f273fc8f74420
                                                        • Opcode Fuzzy Hash: fd5d2b9e1b3416663e15176bb9a89b667b9a34f00e41b5a867819da6e02e5a2c
                                                        • Instruction Fuzzy Hash: 1761AF726083049FC714DF69D881A9BB7E8FF89700F50592EF589E7251EB71D904CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 628 e454d0-e4560c call e5feb0 call e21a39 call e21e08 PathAddBackslashW call e2230b call e45dc0 call e46070 call e486a0 643 e4560e-e4561a call e46140 628->643 644 e4561f-e45627 628->644 643->644 646 e4562d-e45668 call e4e030 644->646 647 e459ba-e459d8 call e46140 644->647 654 e4566c-e45697 call e4d180 646->654 655 e4566a 646->655 652 e459e8-e45a05 call e4d16b 647->652 653 e459da-e459e5 call e4d166 647->653 653->652 662 e459a4-e459b1 call e48c40 654->662 663 e4569d 654->663 655->654 665 e459b7 662->665 664 e456a0-e456be 663->664 666 e456c0-e456cb 664->666 667 e456de-e45723 664->667 665->647 666->667 668 e456cd-e456cf 666->668 669 e45725-e45763 call e48a60 667->669 670 e45779-e4577e 667->670 671 e456d1-e456dc 668->671 677 e45768-e45773 669->677 673 e45780 670->673 674 e457ae-e457bd 670->674 671->667 671->671 678 e45782-e45786 673->678 675 e457bf-e457c6 CreateDirectoryW 674->675 676 e457cb-e457f3 CreateFileW 674->676 679 e4597f-e45992 675->679 680 e457f5-e457f7 676->680 681 e457f9 GetLastError 676->681 677->662 677->670 682 e457a3-e457ac 678->682 683 e45788-e457a0 CreateDirectoryW 678->683 679->664 684 e45998 679->684 685 e457fb-e4580c 680->685 681->685 682->674 682->678 683->682 684->662 686 e45812-e45814 685->686 687 e458de-e458e0 685->687 690 e45816-e45848 686->690 691 e4584d-e4588c 686->691 688 e458e6-e45918 call e45b10 687->688 689 e4599a 687->689 688->689 696 e4591e-e45924 688->696 689->662 697 e458d8 690->697 698 e4588e-e458b7 CreateFileW 691->698 699 e458cf-e458d2 691->699 696->689 700 e45926-e45929 696->700 697->687 701 e458c5-e458cd GetLastError 698->701 702 e458b9-e458c3 698->702 699->679 699->697 703 e45940-e45948 700->703 704 e4592b-e45934 FindCloseChangeNotification 700->704 701->687 702->688 703->679 706 e4594a-e45959 703->706 704->703 705 e45936-e4593e GetLastError 704->705 705->689 705->703 706->679 707 e4595b-e45965 706->707 708 e45967 707->708 709 e45969-e45979 SetFileAttributesW 707->709 708->709 709->679
                                                        APIs
                                                        • PathAddBackslashW.SHLWAPI(00000000), ref: 00E4555B
                                                        • _memset.LIBCMT ref: 00E45659
                                                        • _memmove.LIBCMT ref: 00E45678
                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00E45795
                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00E457C0
                                                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?), ref: 00E457DC
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00E457F9
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?), ref: 00E458A6
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00E458C5
                                                        • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00E4592C
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?), ref: 00E45936
                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00E45979
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Create$ErrorFileLast$Directory$AttributesBackslashChangeCloseFindNotificationPath_memmove_memset
                                                        • String ID:
                                                        • API String ID: 3092469951-0
                                                        • Opcode ID: a7926552f18c3d217ca19567d97496d7bbe23a7dc1d09d9dcc4c185e912daa2e
                                                        • Instruction ID: 5f55bb340c6a1632ef136547ec815ee066d56fd6586a76cf58567312cd4cf59e
                                                        • Opcode Fuzzy Hash: a7926552f18c3d217ca19567d97496d7bbe23a7dc1d09d9dcc4c185e912daa2e
                                                        • Instruction Fuzzy Hash: 9EE16CB2A016299BCB20DF55DC84AD9B7B4FF84304F8141E9E609B7251EB706E89CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E23F77
                                                        • __swprintf.LIBCMT ref: 00E23F98
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00E23FAB
                                                        • _memset.LIBCMT ref: 00E23FC3
                                                        • __swprintf.LIBCMT ref: 00E23FD5
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00E23FE1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset
                                                        • String ID: %s$hwang $luaL_loadbuffer failed!
                                                        • API String ID: 797231043-2333062901
                                                        • Opcode ID: d9853d1fb3afc1e17b576dc8b6cf039e3d3cf34a46712f94e0296d4f27b50b40
                                                        • Instruction ID: 3644cab8657c9b6a18dc969cafc9a284b128e8a0ed32daafd6af394551ca3741
                                                        • Opcode Fuzzy Hash: d9853d1fb3afc1e17b576dc8b6cf039e3d3cf34a46712f94e0296d4f27b50b40
                                                        • Instruction Fuzzy Hash: 50314572504204AFD210EE64EC42EABB3DCFB89354F505929F998E7181E671A9098BD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 733 e5a8a7-e5a8d4 call e56770 __lock call e5663a 738 e5a8d6-e5a8ec @_EH4_CallFilterFunc@8 733->738 739 e5a8f1-e5a8f6 733->739 740 e5ab46-e5ab4b call e567b5 738->740 741 e5a8fc-e5a903 739->741 743 e5a905-e5a934 741->743 744 e5a936-e5a945 GetStartupInfoW 741->744 743->741 746 e5aa74-e5aa7a 744->746 747 e5a94b-e5a950 744->747 749 e5aa80-e5aa91 746->749 750 e5ab38-e5ab44 call e5ab4c 746->750 747->746 748 e5a956-e5a96d 747->748 751 e5a974-e5a977 748->751 752 e5a96f-e5a971 748->752 753 e5aaa6-e5aaac 749->753 754 e5aa93-e5aa96 749->754 750->740 759 e5a97a-e5a980 751->759 752->751 756 e5aab3-e5aaba 753->756 757 e5aaae-e5aab1 753->757 754->753 760 e5aa98-e5aaa1 754->760 761 e5aabd-e5aac9 GetStdHandle 756->761 757->761 762 e5a9a2-e5a9aa 759->762 763 e5a982-e5a993 call e5663a 759->763 764 e5ab32-e5ab33 760->764 765 e5ab10-e5ab26 761->765 766 e5aacb-e5aacd 761->766 768 e5a9ad-e5a9af 762->768 776 e5aa27-e5aa2e 763->776 777 e5a999-e5a99f 763->777 764->746 765->764 771 e5ab28-e5ab2b 765->771 766->765 769 e5aacf-e5aad8 GetFileType 766->769 768->746 772 e5a9b5-e5a9ba 768->772 769->765 775 e5aada-e5aae4 769->775 771->764 773 e5aa14-e5aa25 772->773 774 e5a9bc-e5a9bf 772->774 773->768 774->773 778 e5a9c1-e5a9c5 774->778 779 e5aae6-e5aaec 775->779 780 e5aaee-e5aaf1 775->780 781 e5aa34-e5aa42 776->781 777->762 778->773 782 e5a9c7-e5a9c9 778->782 783 e5aaf9 779->783 784 e5aaf3-e5aaf7 780->784 785 e5aafc-e5ab0e InitializeCriticalSectionAndSpinCount 780->785 786 e5aa44-e5aa66 781->786 787 e5aa68-e5aa6f 781->787 788 e5a9d9-e5aa0e InitializeCriticalSectionAndSpinCount 782->788 789 e5a9cb-e5a9d7 GetFileType 782->789 783->785 784->783 785->764 786->781 787->759 790 e5aa11 788->790 789->788 789->790 790->773
                                                        APIs
                                                        • __lock.LIBCMT ref: 00E5A8B5
                                                          • Part of subcall function 00E5BF5B: __mtinitlocknum.LIBCMT ref: 00E5BF6D
                                                          • Part of subcall function 00E5BF5B: RtlEnterCriticalSection.NTDLL(?), ref: 00E5BF86
                                                        • __calloc_crt.LIBCMT ref: 00E5A8C6
                                                          • Part of subcall function 00E5663A: __calloc_impl.LIBCMT ref: 00E56649
                                                          • Part of subcall function 00E5663A: Sleep.KERNEL32(00000000,000003BC,00E500CE,00E4F07C), ref: 00E56660
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 00E5A8E1
                                                        • GetStartupInfoW.KERNEL32(?,00E968B0,00000064,00E4F2CB,00E96440,00000014), ref: 00E5A93A
                                                        • __calloc_crt.LIBCMT ref: 00E5A985
                                                        • GetFileType.KERNEL32(00000001), ref: 00E5A9CC
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00E5AA05
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1426640281-0
                                                        • Opcode ID: da44f91c9c321c37c719f4406cf58c206a22af89124c237cd922d3b9741afd56
                                                        • Instruction ID: 2fb0eda90067602e4c85495865b4935c006e724761a6835f37aa174f6b2648e3
                                                        • Opcode Fuzzy Hash: da44f91c9c321c37c719f4406cf58c206a22af89124c237cd922d3b9741afd56
                                                        • Instruction Fuzzy Hash: 7B8105719057418FDB14CF68C8805ADBBF0AF06325B286B6ED8A6B73E1D734984BCB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 791 e23803-e23817 lstrcmpW 792 e23820-e2382a lstrcmpW 791->792 793 e23819-e2381e 791->793 795 e23833-e2383d lstrcmpW 792->795 796 e2382c-e23831 792->796 794 e2386f-e23871 793->794 797 e23846-e23850 lstrcmpW 795->797 798 e2383f-e23844 795->798 796->794 799 e23852-e23857 797->799 800 e23859-e2386a lstrcmpW 797->800 798->794 799->794 800->794
                                                        APIs
                                                        • lstrcmpW.KERNEL32(?,HKCR), ref: 00E23813
                                                        • lstrcmpW.KERNEL32(?,HKCU,?,HKCR), ref: 00E23826
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: lstrcmp
                                                        • String ID: HKCC$HKCR$HKCU$HKLM$HKU
                                                        • API String ID: 1534048567-62392802
                                                        • Opcode ID: a3ae62871da4db20ae5cb0ff209da82b97d18dc56c47d1bd462f7888248901c7
                                                        • Instruction ID: c23e0cd58a0f15ecc6421157c45b5eda835c7e27a9fbc838ae4a439eba9a57ec
                                                        • Opcode Fuzzy Hash: a3ae62871da4db20ae5cb0ff209da82b97d18dc56c47d1bd462f7888248901c7
                                                        • Instruction Fuzzy Hash: 87F012527C9737A2E21D213E7C01FAB15984F91B5CF316225F819FA1D8E68CCB434DA6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00E23803: lstrcmpW.KERNEL32(?,HKCR), ref: 00E23813
                                                          • Part of subcall function 00E2BEBD: RegCloseKey.ADVAPI32(?,?,00E25127,00000000,?), ref: 00E2BF01
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,?), ref: 00E25173
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00E251B9
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00E251F5
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E25252
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000001,00000000,00000000,?), ref: 00E252B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: QueryValue$Close$lstrcmp
                                                        • String ID:
                                                        • API String ID: 1731512416-0
                                                        • Opcode ID: fca8ead6cbaeefde84fb1b7e999bcf1d882c0b6f60bf89f97d5d31cde5f3c795
                                                        • Instruction ID: e87707c03d4ed1d61df1ee91ec6cd690db4083a4d09586fb62ed810fc415110e
                                                        • Opcode Fuzzy Hash: fca8ead6cbaeefde84fb1b7e999bcf1d882c0b6f60bf89f97d5d31cde5f3c795
                                                        • Instruction Fuzzy Hash: 96719E72608350AFC324DF14D845FABBBE8FF99714F50491EF59AA2191DB70E908CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E3617D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr
                                                        • String ID: attempt to load a %s chunk (mode is '%s')$binary$text
                                                        • API String ID: 601868998-592341459
                                                        • Opcode ID: 46e61018d429f63792bab232b308eee2ab54908df3244320c8941dcb04bff82b
                                                        • Instruction ID: 9d0c2060c6b9c78b7e80a18884b95d312d0228dd45aa22f8deb7cfb9834b4257
                                                        • Opcode Fuzzy Hash: 46e61018d429f63792bab232b308eee2ab54908df3244320c8941dcb04bff82b
                                                        • Instruction Fuzzy Hash: 7C31E6722053047FD714DF29D885AA6BBE9EF85324F14D46EF8599B242DA31EC01C7A0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _malloc.LIBCMT ref: 00E5067A
                                                          • Part of subcall function 00E4EF94: __FF_MSGBANNER.LIBCMT ref: 00E4EFAB
                                                          • Part of subcall function 00E4EF94: __NMSG_WRITE.LIBCMT ref: 00E4EFB2
                                                          • Part of subcall function 00E4EF94: RtlAllocateHeap.NTDLL(008E0000,00000000,00000001), ref: 00E4EFD7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_malloc
                                                        • String ID:
                                                        • API String ID: 501242067-0
                                                        • Opcode ID: 0e87318c3576b37e9314783c626a83dd6ad889a009b15297d0f51033d323927f
                                                        • Instruction ID: e3bcabd694cea199f0b235b55f0d57bebaf5a2a787cccf0c92b1696174fd9105
                                                        • Opcode Fuzzy Hash: 0e87318c3576b37e9314783c626a83dd6ad889a009b15297d0f51033d323927f
                                                        • Instruction Fuzzy Hash: 80110A32505712EFCF203B75BC0575A37D4AF40367B202C26FD08BA991DAB1889C9694
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryW.KERNEL32(lc?^), ref: 00E2A25F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: DllManagerMetaTable$lc?^
                                                        • API String ID: 1029625771-3872318702
                                                        • Opcode ID: dc9cf7fc9737963c8a5077a3d2c3493baa507356456e48fc9c10036becaf5c8f
                                                        • Instruction ID: f894c021c68e8742bbe6cafe2d00e04e034738914f053e355153f1fed2f68434
                                                        • Opcode Fuzzy Hash: dc9cf7fc9737963c8a5077a3d2c3493baa507356456e48fc9c10036becaf5c8f
                                                        • Instruction Fuzzy Hash: BE31B1326047108FD740DF29D882B2AB3E5FF85334F54992AF816AF2D2E771D8058B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegOpenKeyExW.KERNEL32(?,?,00000000,lc?^,?,?,00000000,?,?,00E25127,00000000,?), ref: 00E2BEED
                                                        • RegCloseKey.ADVAPI32(?,?,00E25127,00000000,?), ref: 00E2BF01
                                                          • Part of subcall function 00E2BE5A: GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,?,lc?^,00E2BEE4,?,?,?,lc?^,?,?,00000000,?,?,00E25127,00000000), ref: 00E2BE6C
                                                          • Part of subcall function 00E2BE5A: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00E2BE7C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressCloseHandleModuleOpenProc
                                                        • String ID: lc?^
                                                        • API String ID: 823179699-3458774033
                                                        • Opcode ID: acb5ddda6fe87423fe7b83f9771c1443b6a96abf5f9bedf414c394b1bcec17a9
                                                        • Instruction ID: fd7b5a81a4b3f6f867c7c4850add9a3d57bdfb9a09c3427990ea82d1a30d8899
                                                        • Opcode Fuzzy Hash: acb5ddda6fe87423fe7b83f9771c1443b6a96abf5f9bedf414c394b1bcec17a9
                                                        • Instruction Fuzzy Hash: 820131B5604219FFDF258F06DC14CAEBBF9EF94350710842DF856A2220D7B19E50DB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • _memset.LIBCMT ref: 00E28D2A
                                                        • GetTempFileNameW.KERNEL32(?,?,00000000,?), ref: 00E28D56
                                                          • Part of subcall function 00E226CF: __EH_prolog3_GS.LIBCMT ref: 00E226D6
                                                        • DeleteFileW.KERNEL32(?,00000001,00000000), ref: 00E28DA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: File$DeleteEnvironmentExpandH_prolog3_NameStringsTemp_memset
                                                        • String ID:
                                                        • API String ID: 2698847642-0
                                                        • Opcode ID: 18bb09650aafeea00910c1739586f67bd8c36618aa912f69b528e0eb98595f24
                                                        • Instruction ID: ab710beefa88adb3d16f4d7febe30c069f73c2a5e21c4a7c6af9f660fb0e45ee
                                                        • Opcode Fuzzy Hash: 18bb09650aafeea00910c1739586f67bd8c36618aa912f69b528e0eb98595f24
                                                        • Instruction Fuzzy Hash: C3415D712083409FC714DF69D889E9BF7E8EFD9710F404A2EF49993291EB74A508CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memcmp_memmove
                                                        • String ID:
                                                        • API String ID: 533621379-0
                                                        • Opcode ID: a31d6048b0dffde2358a07a89cf99a6fd82ef31f1ae8bd217b0cbff476ad4a1d
                                                        • Instruction ID: ae11226b16889e560fe7fc2f7994c8fd3127faa67bdc44fc6ee06affe781b35f
                                                        • Opcode Fuzzy Hash: a31d6048b0dffde2358a07a89cf99a6fd82ef31f1ae8bd217b0cbff476ad4a1d
                                                        • Instruction Fuzzy Hash: AC31C2B1A04B05AFCB15CF68C445AAABBF4BF09314F1485ADE855A7791D730FA11CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WriteFile.KERNEL32(?,?,00000000,00E45913,00000000,?,00000000,?,?), ref: 00E45B4C
                                                        • GetLastError.KERNEL32 ref: 00E45B78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastWrite
                                                        • String ID:
                                                        • API String ID: 442123175-0
                                                        • Opcode ID: 77c536d25727c0e9bcbb03bca258d7e4b898f8e80c163d85e3a54a858d1c5aea
                                                        • Instruction ID: 2b6f756661b9b4ef9af48c92b4f0493831aab3302fddce6d34979251dd4db89e
                                                        • Opcode Fuzzy Hash: 77c536d25727c0e9bcbb03bca258d7e4b898f8e80c163d85e3a54a858d1c5aea
                                                        • Instruction Fuzzy Hash: CB01F236B01A19AFEB148E49E8407AAB7A8EF88769F20403AED08E7740D3709C0087D0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _malloc.LIBCMT ref: 00E45383
                                                          • Part of subcall function 00E4EF94: __FF_MSGBANNER.LIBCMT ref: 00E4EFAB
                                                          • Part of subcall function 00E4EF94: __NMSG_WRITE.LIBCMT ref: 00E4EFB2
                                                          • Part of subcall function 00E4EF94: RtlAllocateHeap.NTDLL(008E0000,00000000,00000001), ref: 00E4EFD7
                                                        • _memmove.LIBCMT ref: 00E45397
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_malloc_memmove
                                                        • String ID:
                                                        • API String ID: 3795339465-0
                                                        • Opcode ID: bea8169b006b0bd92e0618d362164a57a1bcb8948c447838a9d6833a33bd5de8
                                                        • Instruction ID: e3889850335ff86540e9b7a683ccf575da654ed0096daa109d37fd050968b3e8
                                                        • Opcode Fuzzy Hash: bea8169b006b0bd92e0618d362164a57a1bcb8948c447838a9d6833a33bd5de8
                                                        • Instruction Fuzzy Hash: 4C0162B2E001196BCF00DF99AC05B9FBBFCAF54354F044065F808B7202E7B19A188BE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00E57717), ref: 00E4EF70
                                                          • Part of subcall function 00E500C9: __getptd_noexit.LIBCMT ref: 00E500C9
                                                        • GetLastError.KERNEL32(00000000,?,00E57717), ref: 00E4EF82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 269751013-0
                                                        • Opcode ID: a4af1780984817ee71ec31e5cd674e40f4bc4265fd1f24b6484ab4b17ab36dd2
                                                        • Instruction ID: 2f0ffcc554c4502c06ec6026e66182a210e0b22144e92cc1ed9ead05f797d7be
                                                        • Opcode Fuzzy Hash: a4af1780984817ee71ec31e5cd674e40f4bc4265fd1f24b6484ab4b17ab36dd2
                                                        • Instruction Fuzzy Hash: 9BE0CD32105714AFDB102FF5FC0C7953BD8BB00356F604825F54CF6160D6704988C740
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __setjmp3
                                                        • String ID:
                                                        • API String ID: 3396615879-0
                                                        • Opcode ID: 2b3b4e1d99f9d50ebbf6919e5e36c1fa27ef98537655f5e9f61868c14e5cf5f9
                                                        • Instruction ID: 3423de4b83bfc2e7123360ab616f6a99a151a34165d0cee7ace39b361d2f9136
                                                        • Opcode Fuzzy Hash: 2b3b4e1d99f9d50ebbf6919e5e36c1fa27ef98537655f5e9f61868c14e5cf5f9
                                                        • Instruction Fuzzy Hash: 1501B075A043189FCB00DFE8D845A9EBBF4BF08314F60102AE805EB344E735AA05CB44
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memmove.LIBCMT ref: 00E34757
                                                          • Part of subcall function 00E3463D: _memcmp.LIBCMT ref: 00E3468D
                                                          • Part of subcall function 00E3463D: _memmove.LIBCMT ref: 00E346F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memmove$_memcmp
                                                        • String ID:
                                                        • API String ID: 2205784470-0
                                                        • Opcode ID: 8dad051b43dee63f4de58a0bead84476dfbbea11e449282d58693d5f199a13da
                                                        • Instruction ID: e4dd93ce01fb9268a2fa693a0039867ead6b3acce5c19f3e99bb8a8e5dabc7e2
                                                        • Opcode Fuzzy Hash: 8dad051b43dee63f4de58a0bead84476dfbbea11e449282d58693d5f199a13da
                                                        • Instruction Fuzzy Hash: FBE022C37012082B41286568AC8A8BFBB8DDAD3675F15172AFD25B32C1EA207D00C2E5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E4D7C4: _malloc.LIBCMT ref: 00E4D7DC
                                                        • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00E2B8E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception_malloc
                                                        • String ID:
                                                        • API String ID: 657562460-0
                                                        • Opcode ID: 4cfeb62aa40882b6b010b3bafd5334faf86f9cb9b67c8545b29f5845b6165288
                                                        • Instruction ID: 1e43d9adc07c869543fc4c721d826ba4e656aef821f4452a432ca5db3650f25d
                                                        • Opcode Fuzzy Hash: 4cfeb62aa40882b6b010b3bafd5334faf86f9cb9b67c8545b29f5845b6165288
                                                        • Instruction Fuzzy Hash: 6BF05839108601AFD308EB48D851916B7E1AF89324B00D86AF54AAB262CB70E810DB11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _malloc
                                                        • String ID:
                                                        • API String ID: 1579825452-0
                                                        • Opcode ID: 0fd6d89af8e6344ec75c770dbe4c57ed6021efd2d1aa1f4a50308734aa1426fd
                                                        • Instruction ID: ae8f30958905078b81719efe53be4c76be0e49ed9f0a619ff96025826fd6dffb
                                                        • Opcode Fuzzy Hash: 0fd6d89af8e6344ec75c770dbe4c57ed6021efd2d1aa1f4a50308734aa1426fd
                                                        • Instruction Fuzzy Hash: FAC09B71A4030C165D0455B9794155B73CD5550528F045461F90C9A701F531F9544053
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • _memset.LIBCMT ref: 00E2791E
                                                        • __swprintf.LIBCMT ref: 00E27938
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E27945
                                                        • _memset.LIBCMT ref: 00E279BC
                                                        • __swprintf.LIBCMT ref: 00E279D6
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E279E3
                                                        • FreeResource.KERNEL32(?), ref: 00E27BE3
                                                          • Part of subcall function 00E2C69C: FindResourceW.KERNEL32(00000000,?,DAR,00E23D3D,?,?,5E3F636C,00000000,DAR), ref: 00E2C6AD
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000002), ref: 00E27A42
                                                        • _memset.LIBCMT ref: 00E27A7C
                                                        • __swprintf.LIBCMT ref: 00E27B96
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E27BA3
                                                        • CloseHandle.KERNEL32(?), ref: 00E27BD4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset$Resource$CloseCreateEnvironmentExpandFileFindFreeHandleStrings
                                                        • String ID: Fun:%s ,CreateFileW %s failed!$Fun:%s ,LoadResource failed!$Fun:%s ,WriteFile %s failed!$Lua_ExtractResource$_7Z$hwang $lc?^
                                                        • API String ID: 3702404746-2470483299
                                                        • Opcode ID: 090a6e4614637d61943893dd43c8a90075217af633089f4c6c0d40506251cc8d
                                                        • Instruction ID: dbe7c019d128f3ab086a5a0de3bb0609f15d183ed24578f798e3a2d394bb6041
                                                        • Opcode Fuzzy Hash: 090a6e4614637d61943893dd43c8a90075217af633089f4c6c0d40506251cc8d
                                                        • Instruction Fuzzy Hash: FEB19F726083109FC710DF29EC85E9BB7E9FF89710F10591DF989A7151DBB19908CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __time64.LIBCMT ref: 00E3F793
                                                        • __localtime64.LIBCMT ref: 00E3F7C1
                                                        • __localtime64.LIBCMT ref: 00E3F7CF
                                                        • _memcmp.LIBCMT ref: 00E3F8A9
                                                        • _memmove.LIBCMT ref: 00E3F8C4
                                                        • _wcsftime.LIBCMT ref: 00E3F8E5
                                                          • Part of subcall function 00E2E5CA: _memcmp.LIBCMT ref: 00E2E61C
                                                        • __time64.LIBCMT ref: 00E3F97A
                                                          • Part of subcall function 00E508F5: GetSystemTimeAsFileTime.KERNEL32(00E2FC0D,?,?,?,00E2FC0D,00000000), ref: 00E508FE
                                                          • Part of subcall function 00E508F5: __aulldiv.LIBCMT ref: 00E5091E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Time__localtime64__time64_memcmp$FileSystem__aulldiv_memmove_wcsftime
                                                        • String ID: %$aAbBcdHIjmMpSUwWxXyYzZ%||#c#x#d#H#I#j#m#M#S#U#w#W#y#Y$day$field '%s' is not an integer$field '%s' is out-of-bound$field '%s' missing in date table$hour$invalid conversion specifier '%%%s'$isdst$min$month$sec$time result cannot be represented in this installation$year
                                                        • API String ID: 2487876962-2557036086
                                                        • Opcode ID: c073ffbeafe80b847a191a5f107f5519e561aaa2fb598d11aefb6478ea092e59
                                                        • Instruction ID: 97c2fdff642f4109ee9965cf92692b38b810b1aa4c451f6b10a89c273d70c0ba
                                                        • Opcode Fuzzy Hash: c073ffbeafe80b847a191a5f107f5519e561aaa2fb598d11aefb6478ea092e59
                                                        • Instruction Fuzzy Hash: 13C12871B083505BD714EA399C46A6FBBD9EFC5314F10A53EF499F7281EA708D02C692
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 21ac75984d18924aef6d5d14c6bc6da49327253679f5522441b29435f7384c94
                                                        • Instruction ID: 8d357d4cba851ef0da715857af5ae92c1c6cbdcf7127b67c44c171e3b39b41f5
                                                        • Opcode Fuzzy Hash: 21ac75984d18924aef6d5d14c6bc6da49327253679f5522441b29435f7384c94
                                                        • Instruction Fuzzy Hash: 7B325C75A022288FCB24CF25DC516E9B7F4FB4A315F1858D9E80AB7A81D7709E84CF42
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • _memset.LIBCMT ref: 00E66C3A
                                                        • _TranslateName.LIBCMT ref: 00E66C85
                                                        • _TranslateName.LIBCMT ref: 00E66CD0
                                                        • GetUserDefaultLCID.KERNEL32(?,?,00000055), ref: 00E66D1D
                                                          • Part of subcall function 00E66EED: _GetTableIndexFromLcid.LIBCMT ref: 00E66F1A
                                                          • Part of subcall function 00E66EED: _wcsnlen.LIBCMT ref: 00E66F2E
                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00E66D71
                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00E66D84
                                                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040), ref: 00E66DD7
                                                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00E66DEE
                                                        • __itow_s.LIBCMT ref: 00E66E00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Locale$InfoNameTranslateValid$CodeDefaultFromIndexLcidPageTableUser__getptd_noexit__itow_s_memset_wcsnlen
                                                        • String ID: 4|$4|
                                                        • API String ID: 1819841604-704439468
                                                        • Opcode ID: edef25c8ffbc20bfa0e02ae8fb680d83ef139f63dee3584996af833a13ce8d32
                                                        • Instruction ID: 96219dfc8be994ea0e72851b0f1ceaee54e8eeae4e499defc0c99346529a1045
                                                        • Opcode Fuzzy Hash: edef25c8ffbc20bfa0e02ae8fb680d83ef139f63dee3584996af833a13ce8d32
                                                        • Instruction Fuzzy Hash: 49519275A50609AFDF10EFA4EC45BBEB7B8EF04384F14182AE914FB141E7719A44CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2C5E0: FindClose.KERNEL32(?,?,00E2C52B,00000000,hwang ,00000000,00E2418E,?,00000001,00000000), ref: 00E2C5FA
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E2C553
                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00E2C570
                                                        • SetLastError.KERNEL32(0000007B), ref: 00E2C583
                                                        • lstrlenW.KERNEL32(?,00000000,hwang ,00000000,00E2418E,?,00000001,00000000), ref: 00E2C58E
                                                        • _wcsrchr.LIBCMT ref: 00E2C59F
                                                        • _wcsrchr.LIBCMT ref: 00E2C5A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Find_wcsrchr$CloseErrorFileFirstFullLastNamePathlstrlen
                                                        • String ID: *.*$hwang
                                                        • API String ID: 3086268848-3721845571
                                                        • Opcode ID: 7f1210ed32d778d986c4aa2ff8b30ebe9ae1f5d5b51e02c46d8c9df2b3b82c01
                                                        • Instruction ID: 50c7f414c0d29d8ee1fbab7b02866ff543add3205f00d2fcb91166bb658e78b0
                                                        • Opcode Fuzzy Hash: 7f1210ed32d778d986c4aa2ff8b30ebe9ae1f5d5b51e02c46d8c9df2b3b82c01
                                                        • Instruction Fuzzy Hash: FF11E6726807145BC3206735FC85A6F36EDEF99358F211C29F51AF3141FB74E50582A2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _wcscmp.LIBCMT ref: 00E66A9A
                                                        • _wcscmp.LIBCMT ref: 00E66AAB
                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,00E66D49,?,00000000), ref: 00E66AC7
                                                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,00E66D49,?,00000000), ref: 00E66AF1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale_wcscmp
                                                        • String ID: ACP$OCP
                                                        • API String ID: 1351282208-711371036
                                                        • Opcode ID: 344c0f912e351810bfca47436ed53f542a9efc919af91d6edb2015c9530f8108
                                                        • Instruction ID: becc52418d28616f9ae7d69017eb1da49572303931af8baeb1ba8c2b132f93bd
                                                        • Opcode Fuzzy Hash: 344c0f912e351810bfca47436ed53f542a9efc919af91d6edb2015c9530f8108
                                                        • Instruction Fuzzy Hash: 09018032291615AAEB10DFA8FC45FDA37D8EF007E9F44E025F909FA051EB70D9819785
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLogicalDriveStringsW.KERNEL32(00000000,00000000,5E3F636C,?,?,?,?), ref: 00E22C1C
                                                        • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 00E22C55
                                                        • _memset.LIBCMT ref: 00E22C7C
                                                        • QueryDosDeviceW.KERNEL32(00000000,?,00000104,?,?,?), ref: 00E22CCE
                                                        • PathAddBackslashW.SHLWAPI(?,?,?,?), ref: 00E22CDC
                                                        • PathAddBackslashW.SHLWAPI(00000000,?,?,?), ref: 00E22CDF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: BackslashDriveLogicalPathStrings$DeviceQuery_memset
                                                        • String ID:
                                                        • API String ID: 1915353016-0
                                                        • Opcode ID: c19cebd278e58660219d500e3cd6452fadee0730be27c3102371959dbff9128c
                                                        • Instruction ID: f1610f0a108b60ce69879fb06acb798f266255d624b4986c77d2d3a1797cfff4
                                                        • Opcode Fuzzy Hash: c19cebd278e58660219d500e3cd6452fadee0730be27c3102371959dbff9128c
                                                        • Instruction Fuzzy Hash: 2C51C072604390AFD321EF25EC85B6BB7E8EFD4704F01192DF589A7251EB70A944CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 00E21137
                                                        • OpenServiceW.ADVAPI32(00000000,?,000F01FF), ref: 00E2114D
                                                        • QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,?,?,000F01FF), ref: 00E2117E
                                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,000F01FF), ref: 00E211A5
                                                        • QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,?,?,000F01FF), ref: 00E211BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Service$OpenQueryStatus$ManagerStart
                                                        • String ID:
                                                        • API String ID: 1532350385-0
                                                        • Opcode ID: 502d9dce5cf6dfd484856cd324c4b634f90e6dd3d435d377a33fe05fb6239c51
                                                        • Instruction ID: 7adb283153b03fe11effdafc05d16a0298e4bd35be773f89898127fba3cb4e85
                                                        • Opcode Fuzzy Hash: 502d9dce5cf6dfd484856cd324c4b634f90e6dd3d435d377a33fe05fb6239c51
                                                        • Instruction Fuzzy Hash: CA217471A0121DAEDB20DFA6DC84DFEB7BCEF19758F041469EA01F6180DA709E45CB64
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 00E667C1
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 00E6680E
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 00E668BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale$__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1862418609-0
                                                        • Opcode ID: 1231ca271af80d1b97d11771e2d0e32d7d211e9940deb03e6d1831c6bd8810d5
                                                        • Instruction ID: e411d0e7f24c02c4b18473e482abfa56128f62b8ddcd2e68db789b12941db919
                                                        • Opcode Fuzzy Hash: 1231ca271af80d1b97d11771e2d0e32d7d211e9940deb03e6d1831c6bd8810d5
                                                        • Instruction Fuzzy Hash: 0451F1715A02129FDF289F28EC82BBA77E8EF10364F145179EC04EA195E774ED94CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __EH_prolog3_catch_GS.LIBCMT ref: 00E2720D
                                                        • FindWindowW.USER32(?,00000000), ref: 00E27258
                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 00E272BF
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E272FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateFindH_prolog3_catch_MessagePostSnapshotToolhelp32Window
                                                        • String ID:
                                                        • API String ID: 3104000208-0
                                                        • Opcode ID: 9024872093f1d423669bf7f47947979ad3df04919e20df878283c68e402baf29
                                                        • Instruction ID: fa23ed08b73077709898f5117298c62c7ad40c6768e260f0739482985127e1c0
                                                        • Opcode Fuzzy Hash: 9024872093f1d423669bf7f47947979ad3df04919e20df878283c68e402baf29
                                                        • Instruction Fuzzy Hash: 8B419171A04628DEDB24DF25AD45A9EB7F9BF84710F1090AEE189A6291DE705E80CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000020,?), ref: 00E229F7
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00E229FE
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E22A1C
                                                        • AdjustTokenPrivileges.ADVAPI32(00000010,00000000,00000000,00000010,00000000,00000000,?,?), ref: 00E22A46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                        • String ID:
                                                        • API String ID: 2349140579-0
                                                        • Opcode ID: c23fd06de89d659aa9328e1f5c256940af638dc923e48817846577e3598921b3
                                                        • Instruction ID: 92d99ce1d1eb866668825c105a606e4bc55be590a5b9ba0d59996fdcb04a0bd3
                                                        • Opcode Fuzzy Hash: c23fd06de89d659aa9328e1f5c256940af638dc923e48817846577e3598921b3
                                                        • Instruction Fuzzy Hash: 4811A572A04704AFD320DF2AEC45A5BBBECFBC8748F41092DF649E7110D671D9098AA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CountTick$Sleep
                                                        • String ID:
                                                        • API String ID: 4250438611-0
                                                        • Opcode ID: 9707ad16b730b7842f65cd319406b5f9eb7d6311b380fb346782c845cf3297ed
                                                        • Instruction ID: 7bcace7afe581b2194d7b952e3cf5c758ec541d5251eb489d4b4ff67f866c754
                                                        • Opcode Fuzzy Hash: 9707ad16b730b7842f65cd319406b5f9eb7d6311b380fb346782c845cf3297ed
                                                        • Instruction Fuzzy Hash: 5B01A1716097559FD324DF26FC4482BF3E8EFA4345B101D6EE646D3240DAB0EE548A72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: destination wrap around$position out of bounds$too many elements to move$wrong number of arguments to 'insert'
                                                        • API String ID: 0-3791153335
                                                        • Opcode ID: c336a51e470627e5b7a4214f2cadc6a837aa0c9e941ee311a4da71dc0f0ddf34
                                                        • Instruction ID: 78ff2b87a900f08e9d9acb3ccab92bcd0996c6f7d88711dd13f39ccd48cf5ef2
                                                        • Opcode Fuzzy Hash: c336a51e470627e5b7a4214f2cadc6a837aa0c9e941ee311a4da71dc0f0ddf34
                                                        • Instruction Fuzzy Hash: DED1FC327087108BD718DE29AC81A2EF3D6EFC4714F14A93DFA99E7382DA70DD454686
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLastError.KERNEL32(00000105), ref: 00E3FCA0
                                                        • FormatMessageA.KERNEL32(00001200,00000000,00000000,00000000,?,00000080,00000000), ref: 00E3FCBF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID: system error %d
                                                        • API String ID: 3479602957-1688351658
                                                        • Opcode ID: 51833daf9c674da23830975e5a2af4ef557b6b0498da3282290b2354c30fdfe6
                                                        • Instruction ID: 32cff1f7b9d2aa39f3135cbaf5b7df95d6e4094c3eb46485dc313ea77fa432ae
                                                        • Opcode Fuzzy Hash: 51833daf9c674da23830975e5a2af4ef557b6b0498da3282290b2354c30fdfe6
                                                        • Instruction Fuzzy Hash: D9F09631600214AFD714E7269C0EEAF77E8EB85714F405169F445F6280EEA05E0987A5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E229D4: GetCurrentProcess.KERNEL32(00000020,?), ref: 00E229F7
                                                          • Part of subcall function 00E229D4: OpenProcessToken.ADVAPI32(00000000), ref: 00E229FE
                                                          • Part of subcall function 00E229D4: LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E22A1C
                                                          • Part of subcall function 00E229D4: AdjustTokenPrivileges.ADVAPI32(00000010,00000000,00000000,00000010,00000000,00000000,?,?), ref: 00E22A46
                                                        • ExitWindowsEx.USER32(00000000,00000000), ref: 00E2899C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                                        • String ID: SeShutdownPrivilege
                                                        • API String ID: 1314775590-3733053543
                                                        • Opcode ID: 2f2ea82234fbbf3b1acfa61871f00c3fb1b1bc76c13f8e97b4240e746d4ba9f4
                                                        • Instruction ID: ed192c7ba2bd3ce32724a7603dea1026626c70c53c4f6105314321f07fb5c7cb
                                                        • Opcode Fuzzy Hash: 2f2ea82234fbbf3b1acfa61871f00c3fb1b1bc76c13f8e97b4240e746d4ba9f4
                                                        • Instruction Fuzzy Hash: 00F089723056115BE7089E5ABC86A2AE399EFC5230F60D13EF205DB2D1CA709C558690
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • _GetPrimaryLen.LIBCMT ref: 00E666B3
                                                        • EnumSystemLocalesW.KERNEL32(00E66768,00000001,000000A0,?,?,00E66CF2,00000000,?,?,?,?,?,00000055), ref: 00E666C3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: EnumLocalesPrimarySystem__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1605451767-0
                                                        • Opcode ID: 097de8ed2d942fec1fa9dcbe19a704450e6dad96a35746440c6dfaa363cf1836
                                                        • Instruction ID: 0c9251cb461bed52db7150f2c117462fe3e553af5959642a5e5adacffb1424bb
                                                        • Opcode Fuzzy Hash: 097de8ed2d942fec1fa9dcbe19a704450e6dad96a35746440c6dfaa363cf1836
                                                        • Instruction Fuzzy Hash: CC01A7325A4706DFEB209F34F509B69B7E4EF01759F105929E449F6091DBB4A864CB40
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00E6692A,00000000,00000000,?), ref: 00E66B5A
                                                        • _GetPrimaryLen.LIBCMT ref: 00E66B79
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: InfoLocalePrimary__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 3580725100-0
                                                        • Opcode ID: e46c697874db102edac5733d1a1011325f07fbfd06f285c2e14843308aa24082
                                                        • Instruction ID: b39e4420ca5029042309e8fd146e4d5152774683feaee5d0fd3962edb09eea16
                                                        • Opcode Fuzzy Hash: e46c697874db102edac5733d1a1011325f07fbfd06f285c2e14843308aa24082
                                                        • Instruction Fuzzy Hash: 98F02433A60514FBEF146734EC06BEE779CEB00798F144136E949F7080EA74BD1086A0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • _GetPrimaryLen.LIBCMT ref: 00E66717
                                                        • EnumSystemLocalesW.KERNEL32(00E6695B,00000001,?,?,00E66CBC,4|,?,?,00000055,?,?,00E57C34,?,?,?), ref: 00E6672A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: EnumLocalesPrimarySystem__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1605451767-0
                                                        • Opcode ID: b82e4b31633672f4a22824c19651e7abd7b1f3e6a5d84e19002ed5d26bee8623
                                                        • Instruction ID: 3c88fa3fcbc76f850978998fb20c16f27018e0de79de9985870623e9fb24d8d3
                                                        • Opcode Fuzzy Hash: b82e4b31633672f4a22824c19651e7abd7b1f3e6a5d84e19002ed5d26bee8623
                                                        • Instruction Fuzzy Hash: 79F0EC315A4705EFEB106B34FC45FA17BD1DB127A9F105417F44DFA0D2CA716C508A10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00E54A11,?,?,?,00000000), ref: 00E58BCC
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 00E58BD5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: bae1a82179ebbf3731d69f93cc60d893eb3f59e19c0a32e150112668963267bf
                                                        • Instruction ID: d957fd7e0baca7fbd89e2c1869c522cbb787e213b8029320e69241f782c6808c
                                                        • Opcode Fuzzy Hash: bae1a82179ebbf3731d69f93cc60d893eb3f59e19c0a32e150112668963267bf
                                                        • Instruction Fuzzy Hash: 23B09232048A08EFDA006B92EC09B983F29EB04663F400060F60D580B18BE358958B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: memory allocation error: block too big$table overflow
                                                        • API String ID: 0-350483971
                                                        • Opcode ID: 23c657c70ab87327dbda470ca4200402d01e262f6b21f11aac432c134cc3ae17
                                                        • Instruction ID: aba29335e97236b8b5a163cc943427b4eb31a75ef4e43ef37ed01aabba856297
                                                        • Opcode Fuzzy Hash: 23c657c70ab87327dbda470ca4200402d01e262f6b21f11aac432c134cc3ae17
                                                        • Instruction Fuzzy Hash: 05C1BE71A043158FDB14CF29C884A5AFBF5EF88314F1495AEE859E7381EB309E45CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 2b0dfc0710faed2328d6814c4213b29e4371b17e6604780dcc7d41ef5b22d60f
                                                        • Instruction ID: fc3b37da26927779bda6f6bd49d258ca7d20f05e73dd6e5fdceef02c9dbb3a7d
                                                        • Opcode Fuzzy Hash: 2b0dfc0710faed2328d6814c4213b29e4371b17e6604780dcc7d41ef5b22d60f
                                                        • Instruction Fuzzy Hash: 94623970A002099FCF24CF98E990AAEBBF1FF49708F145199E845BB345EB30AD45CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c2c6ee61c2885820a1cc40d2007009af3ce3541728c1207480eac7c57701b7db
                                                        • Instruction ID: 68cd23844398081124327bff280bbd7ae6c94389eec525d0e4cfc0f8e5919cce
                                                        • Opcode Fuzzy Hash: c2c6ee61c2885820a1cc40d2007009af3ce3541728c1207480eac7c57701b7db
                                                        • Instruction Fuzzy Hash: 32322621D29F414DD7279636DC22335A248EFB73C4F15E72BF81AB5EAAEB29C5834101
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 046b9a1d3e26648ed3790f6ecc71e2e039b8fe691e6f5e6ba3b340492e5b10f0
                                                        • Instruction ID: 6f65acd84403a5dfe17bef7b7bf36fb17232e50fd7f276b2d7f014d90e2d1e22
                                                        • Opcode Fuzzy Hash: 046b9a1d3e26648ed3790f6ecc71e2e039b8fe691e6f5e6ba3b340492e5b10f0
                                                        • Instruction Fuzzy Hash: 75223F74A052298FDF24DF28E880BA9B7B6BF45308F1451D9D84DB7252DB309E85CF92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8ea5c180d9e5252d43c1ce86c08a858b4dec78c7d6e99bc2e4ff608555e5b8fc
                                                        • Instruction ID: 9d1f4b55f3c403c5d59bd6fef5735c6012c88af7ed172326a22e830ff57fa8e8
                                                        • Opcode Fuzzy Hash: 8ea5c180d9e5252d43c1ce86c08a858b4dec78c7d6e99bc2e4ff608555e5b8fc
                                                        • Instruction Fuzzy Hash: 4EB1F531D2AF414DD32396399831336B69CAFBB2D5F61D71BFC1A70D22EB2295874240
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 00E669B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 2161030339-0
                                                        • Opcode ID: e5dee1e6d04f8ca83463de6bccec5928d836057087c5dbe6e9f74dfaf94cf51d
                                                        • Instruction ID: abdac4db9f9dfc4ac90ca1b0de3418cb804648f514e4987a883905dffcd651a4
                                                        • Opcode Fuzzy Hash: e5dee1e6d04f8ca83463de6bccec5928d836057087c5dbe6e9f74dfaf94cf51d
                                                        • Instruction Fuzzy Hash: 3721D0715602069FDB28DB68EC42BBA73ECEF01358F10647AE801F6181EB70AD54CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,20001004,?,00E57CBC,?,00E57CBC,?,20001004,?,00000002,?,00000004,?,00000000), ref: 00E67054
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: 31b1746c57a53a0217e42227ce91eb04b7d917c26ff3b3d5e4476778479981db
                                                        • Instruction ID: 845566f679c6dca3160a6d7246de811552857c9953d8c8597d5a07b5cf13b60c
                                                        • Opcode Fuzzy Hash: 31b1746c57a53a0217e42227ce91eb04b7d917c26ff3b3d5e4476778479981db
                                                        • Instruction Fuzzy Hash: F8D05E33144109FFCF01AFE6FC05C6A3BA9FF08354B445406F90CA5020DA72E8649B61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00E58BAA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: e756a01fae1d3544e6416a23c61ff380a304d52e061f0d188e3e8520e446573f
                                                        • Instruction ID: 4a329c89f39a9dc6463fd5863519ee3c9e333f12d7df52f805be1b7dd7784403
                                                        • Opcode Fuzzy Hash: e756a01fae1d3544e6416a23c61ff380a304d52e061f0d188e3e8520e446573f
                                                        • Instruction Fuzzy Hash: CCA0123100460CAB8A001B42EC044443F1DD7001537400060F40C0402087A354504A80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: HeapProcess
                                                        • String ID:
                                                        • API String ID: 54951025-0
                                                        • Opcode ID: f4fd6191a68f3d0b80c182929be863b2b089d29e19d51943c14894045b8fcaac
                                                        • Instruction ID: f2a6c9e7379ed2382b2c7f6b2f20005267642283b30ab49263fd87c8804cbbe4
                                                        • Opcode Fuzzy Hash: f4fd6191a68f3d0b80c182929be863b2b089d29e19d51943c14894045b8fcaac
                                                        • Instruction Fuzzy Hash: D7C012A22017419EC340DB63BE09B083A94634130AF60A54BE029752A0D7F001888F00
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 78117140076c9fa30991c39c806b5a8f7b600ec533652547dfe1fc8cfa7181d5
                                                        • Instruction ID: fc48f1497915ec922c5c160e100dbea438753758397d41c6025d16e8a7571a5e
                                                        • Opcode Fuzzy Hash: 78117140076c9fa30991c39c806b5a8f7b600ec533652547dfe1fc8cfa7181d5
                                                        • Instruction Fuzzy Hash: 5FD108B1E005258BCF0CCE59D4A02BDBBB2FFD8301F25966ED95AA7388D7309941CB94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction ID: eb3f6e7f051a99536340ecc6292c31cb38651f85e92ab6b0c04056867c3b453d
                                                        • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction Fuzzy Hash: CAC1F4732855934ADB2D4A39E43803EBAE1AEA27F571A235DD4B3DF0C4EE21C564C620
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction ID: 5414e93943b98ef1876f207c62d3b1b10eb4a6c8a7334894e45319dc168087ab
                                                        • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction Fuzzy Hash: A9C1E47328559349DF2D4639E43403EBAE0AAE27F571A236DD4B3EF0C4EE21C564D620
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction ID: 2a7f464aa7bce3d0066c971db0faebf5adfd2f4313669e0f237e2c37e1fd36e7
                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction Fuzzy Hash: B9C1D4B228519349DF2D4A3AE43403EFAE1AAA27F531A675DD4B3DF1C4EE21C564C620
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: baf4a54bea3bba5f9d2523af80ea2aede104ebe357da2cada934512c4f6ed797
                                                        • Instruction ID: b1351115250ca5f5df65f83c6de55fa225b40be0fe644e86919e10d383bbba77
                                                        • Opcode Fuzzy Hash: baf4a54bea3bba5f9d2523af80ea2aede104ebe357da2cada934512c4f6ed797
                                                        • Instruction Fuzzy Hash: FBB14E75E042099FCB14CFA9E4806ADBBF2FF98314F24956AD885AB340E735E941CBD0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 289001fb307db5d759d0ea81cc18fb09c0bcca247cecbbde20984d36be10ad56
                                                        • Instruction ID: f1bfb8a78341a94ba5bd3d4cf969952e32cf53a0a15268e4cb05d5da0da03c34
                                                        • Opcode Fuzzy Hash: 289001fb307db5d759d0ea81cc18fb09c0bcca247cecbbde20984d36be10ad56
                                                        • Instruction Fuzzy Hash: 9E7173B2E015588BDB08CB6DD8503ADFBF2EFD9300F1A8179E469E7351DA749905CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 51d2e1ae542a1be86dd4ad8c944031fdad3bb7ce672f4c644007da6c66dde631
                                                        • Instruction ID: 0296e93b6f6bfd08f586d97e9f68a835deea0fb65879296536cacffffe390ca6
                                                        • Opcode Fuzzy Hash: 51d2e1ae542a1be86dd4ad8c944031fdad3bb7ce672f4c644007da6c66dde631
                                                        • Instruction Fuzzy Hash: B4315733F442640B8B248A6C69D40ADFBD2DBD533972EC3BACD9AAB681D4758C05C3D1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 771790367dc5b6a472a37329ebfae59437e59acfa1e9a72b7b166e995cf9daf0
                                                        • Instruction ID: 5906f8e62921d89488ef63db37a1c1a9c143a05b37d98a05088c54f9ccae1153
                                                        • Opcode Fuzzy Hash: 771790367dc5b6a472a37329ebfae59437e59acfa1e9a72b7b166e995cf9daf0
                                                        • Instruction Fuzzy Hash: FF21807E265E014BA70CC71BAD73A7A2143E3C4305688E12EE24BDA3E9EE7C4815C109
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c33a8aa4f4cd679048c9687fcf20e7cc67de5e4bf1e25cd606c97537424b384f
                                                        • Instruction ID: 370c104bf1af28279c85deadb3d2d38f6a0f9aaf32200ce0f75fe4959e0ad200
                                                        • Opcode Fuzzy Hash: c33a8aa4f4cd679048c9687fcf20e7cc67de5e4bf1e25cd606c97537424b384f
                                                        • Instruction Fuzzy Hash: D121DE329219279BD72ADE0DDC817F9B361FF98309F548325DD4097289C739AA22C7C0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction ID: aac374bc6067afad2802b75ad789e0f395e845dee2bc8f24d7e9b6c40af64d09
                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction Fuzzy Hash: 28113B77200041C3D6948A2DD4F47B6E3A6EAD633BB2C6BF9C8416B644F122994D9500
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a841ba4d3933f4d7009d1e3633c227c1fa50a95a4d5e76c970b6527f4421cf20
                                                        • Instruction ID: b47a64c706c4936260e1879b88e4d3a4dceacbda501dd78f41ef108e736b2e17
                                                        • Opcode Fuzzy Hash: a841ba4d3933f4d7009d1e3633c227c1fa50a95a4d5e76c970b6527f4421cf20
                                                        • Instruction Fuzzy Hash: DF1136325215260BE7269D0CDCD17BAB351FF90318F498235DC41AB248CA38E811C7E0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38C28
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38CB2
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38CD1
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38D32
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38D7C
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38DB6
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E38DD3
                                                          • Part of subcall function 00E2E5CA: _memcmp.LIBCMT ref: 00E2E61C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr$_memcmp
                                                        • String ID: >%s$activelines$currentline$flnStu$func$invalid option$istailcall$isvararg$lastlinedefined$level out of range$linedefined$name$namewhat$nparams$nups$short_src$source$what
                                                        • API String ID: 2585625864-3424287483
                                                        • Opcode ID: a75c89ae3af2c30092eada020e17563ecbeac7e04e6363229364a61c76b90bd7
                                                        • Instruction ID: c7874a6959e315b8dc801528b0e63fa00ef5fa8e7d18381608df10c5d77b12e8
                                                        • Opcode Fuzzy Hash: a75c89ae3af2c30092eada020e17563ecbeac7e04e6363229364a61c76b90bd7
                                                        • Instruction Fuzzy Hash: 4EE1B4317043115BDB14AE34A89652EB7D6DFC8724F24A92DF80AAF3C6DEB4DC058791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(Kernel32,Wow64DisableWow64FsRedirection,00000001,00000000,00000000), ref: 00E27D0F
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E27D18
                                                        • GetWindowsDirectoryW.KERNEL32(00000000,00000104), ref: 00E27D5D
                                                        • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,00000000), ref: 00E27D83
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E27D86
                                                        • GetCurrentProcess.KERNEL32(00000000), ref: 00E27D93
                                                        • PathAppendW.SHLWAPI(00000000,System32\regsvr32.exe,00000000), ref: 00E27DBD
                                                        • _memset.LIBCMT ref: 00E27E6A
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00E27EC2
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E27ED4
                                                        • CloseHandle.KERNEL32(?), ref: 00E27EDE
                                                        • GetModuleHandleW.KERNEL32(Kernel32,Wow64RevertWow64FsRedirection), ref: 00E27F3F
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E27F42
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Handle$AddressModuleProc$AppendCloseCurrentDirectoryExecuteObjectPathProcessShellSingleWaitWindows_memset
                                                        • String ID: /s %s$/s /u %s$<$@$IsWow64Process$Kernel32$SysWOW64\regsvr32.exe$System32\regsvr32.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32
                                                        • API String ID: 2190183658-2197895514
                                                        • Opcode ID: 26deae4081bcd37216b101a7ce493458b0e5daa101d2296bcd35b4eb0c98009b
                                                        • Instruction ID: 6a107f24c742646428fe43786f4f9c37a55edb7d9f206963dc8f39e4f0083d98
                                                        • Opcode Fuzzy Hash: 26deae4081bcd37216b101a7ce493458b0e5daa101d2296bcd35b4eb0c98009b
                                                        • Instruction Fuzzy Hash: 6B919C712083419FD320DF24D846BABB7E9FF88714F10592EF199A7291DBB4A908CB53
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2C69C: FindResourceW.KERNEL32(00000000,?,DAR,00E23D3D,?,?,5E3F636C,00000000,DAR), ref: 00E2C6AD
                                                        • _memset.LIBCMT ref: 00E23D5E
                                                        • __swprintf.LIBCMT ref: 00E23D7E
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,DAR), ref: 00E23D91
                                                        • _memset.LIBCMT ref: 00E23DAC
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,DAR), ref: 00E23DB4
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,DAR), ref: 00E23DD2
                                                        • __swprintf.LIBCMT ref: 00E23DC5
                                                          • Part of subcall function 00E4E0C0: __woutput_l.LIBCMT ref: 00E4E119
                                                        • LockResource.KERNEL32(lc?^,?,?,5E3F636C,00000000,DAR), ref: 00E23DDD
                                                        • _memset.LIBCMT ref: 00E23E02
                                                        • GetLastError.KERNEL32 ref: 00E23E0A
                                                        • __swprintf.LIBCMT ref: 00E23E1B
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E23E72
                                                        • FreeResource.KERNEL32(00000000,00000000,00000000,?), ref: 00E23EC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputResourceString__swprintf_memset$ErrorLast$FindFreeLock__woutput_l
                                                        • String ID: DAR$LoadResource failed. Type : %s ID : %s$LockResource failed.hwang err:%d$ResSize == 0$hwang $hwang err:%d$lc?^
                                                        • API String ID: 2013659159-450655138
                                                        • Opcode ID: 121276a4b92c18e7af57e8b5cb4c13156c9803e96404f97f16c8ba91087f236a
                                                        • Instruction ID: 3ef3bb88b5ef987cadca6de56f16ea777d7d8c0d39053934bfd3655123ea73d4
                                                        • Opcode Fuzzy Hash: 121276a4b92c18e7af57e8b5cb4c13156c9803e96404f97f16c8ba91087f236a
                                                        • Instruction Fuzzy Hash: 7F51B272509704AFC311EF64EC41A9FB7E9FF89704F40582DF598A7241DBB2A909CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PathIsURLW.SHLWAPI(?), ref: 00E26E4E
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26E7A
                                                        • _memset.LIBCMT ref: 00E26EF0
                                                        • __swprintf.LIBCMT ref: 00E26F19
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26F29
                                                        • _memset.LIBCMT ref: 00E27014
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00E27071
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E2707F
                                                        • GetExitCodeProcess.KERNEL32(?,00000000), ref: 00E27093
                                                        • CloseHandle.KERNEL32(?), ref: 00E2709D
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • ShellExecuteW.SHELL32(00000000,?,?,?,?,00000001), ref: 00E2711A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ExecutePathShell_memset$CloseCodeDebugEnvironmentExistsExitExpandFileHandleObjectOutputProcessSingleStringStringsWait__swprintf
                                                        • String ID: <$@$Fun:%s, Description:%s it's not exists!$Lua_Exec$Startpin$Startunpin$Taskbarpin$Taskbarunpin$hwang
                                                        • API String ID: 3840862688-2712104450
                                                        • Opcode ID: c2b7f3eed974079763b7d5a17c829507ff46dff4774c2d447a5cd114fedb4ab8
                                                        • Instruction ID: 895429672ddea85e91ade01e286be5600a8646abff591c1161149a8d57c1eb43
                                                        • Opcode Fuzzy Hash: c2b7f3eed974079763b7d5a17c829507ff46dff4774c2d447a5cd114fedb4ab8
                                                        • Instruction Fuzzy Hash: D2C18C72508340DFD730DF64E885B9BB7E8FF84314F50892EE589A7291DB70A948CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E263A7
                                                        • _memset.LIBCMT ref: 00E263CC
                                                        • __swprintf.LIBCMT ref: 00E263F5
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26402
                                                        • SHFileOperationW.SHELL32(00000000), ref: 00E264A1
                                                        • _memset.LIBCMT ref: 00E264CD
                                                        • __swprintf.LIBCMT ref: 00E26500
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26513
                                                        • _memset.LIBCMT ref: 00E26530
                                                        • __swprintf.LIBCMT ref: 00E26546
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26553
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset$File$EnvironmentExistsExpandOperationPathStrings
                                                        • String ID: Copy %s to %s !$Copy %s to %s failed!$Fun:%s, Description:%s it's not exists!$Lua_CopyFile$SHFileOperation error code : %#x$hwang
                                                        • API String ID: 846663681-3038730398
                                                        • Opcode ID: 336c54ed9e0c8481f3d3f00fe246e7410357bcd45a95ed80652b3f9aa1967a08
                                                        • Instruction ID: 8a6fcbac4112b3c823f4a6c765f6858831f818fc54d8f5934ace406abfb2eea7
                                                        • Opcode Fuzzy Hash: 336c54ed9e0c8481f3d3f00fe246e7410357bcd45a95ed80652b3f9aa1967a08
                                                        • Instruction Fuzzy Hash: 2D816B725083009FC710DF64D886A9BB7E8FF88314F509D2EF599A7251EBB5E508CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26680
                                                        • _memset.LIBCMT ref: 00E266A5
                                                        • __swprintf.LIBCMT ref: 00E266CE
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E266DB
                                                        • SHFileOperationW.SHELL32(00000000), ref: 00E2677C
                                                        • _memset.LIBCMT ref: 00E267A8
                                                        • __swprintf.LIBCMT ref: 00E267DB
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E267EE
                                                        • _memset.LIBCMT ref: 00E2680B
                                                        • __swprintf.LIBCMT ref: 00E26821
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E2682E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset$File$EnvironmentExistsExpandOperationPathStrings
                                                        • String ID: Fun:%s, Description:%s it's not exists!$Lua_MoveFile$Move %s to %s !$Move %s to %s failed!$SHFileOperation error code : %#x$hwang
                                                        • API String ID: 846663681-4246444332
                                                        • Opcode ID: fbe4923399d159ade054cce414b80c94d878595b9ab93629e59c303437dcc91a
                                                        • Instruction ID: 71fca66c67fccb1ff1d1e535497dfbccb42692163d9e084268609764517a26a2
                                                        • Opcode Fuzzy Hash: fbe4923399d159ade054cce414b80c94d878595b9ab93629e59c303437dcc91a
                                                        • Instruction Fuzzy Hash: C2816B725083009FC710DF64D886A9BB7E8FF88314F509D2EF999A7251EBB5D508CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23803: lstrcmpW.KERNEL32(?,HKCR), ref: 00E23813
                                                        • _memset.LIBCMT ref: 00E2579B
                                                        • __swprintf.LIBCMT ref: 00E257C3
                                                        • RegDeleteKeyW.ADVAPI32(?,00000000), ref: 00E257F5
                                                        • _memset.LIBCMT ref: 00E25825
                                                        • RegDeleteValueW.ADVAPI32(?,?,?,00000000,00000000), ref: 00E25870
                                                        • _memset.LIBCMT ref: 00E25894
                                                        • __swprintf.LIBCMT ref: 00E258C8
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E258D5
                                                        • _memset.LIBCMT ref: 00E25907
                                                        • __swprintf.LIBCMT ref: 00E25930
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E2593D
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E25985
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memset$__swprintf$DebugDeleteOutputString$CloseValuelstrcmp
                                                        • String ID: Delete Value %s, %s, %s$DeleteSubKey %s failed, errcode: %ld$OpenKey %s %s failed, errcode: %ld$OpenKey %s failed, errcode: %ld$hwang
                                                        • API String ID: 3739965220-3264612562
                                                        • Opcode ID: fd3df26539749cfc85292d591975b192f54954c10da8c04441d02bb9d7a64432
                                                        • Instruction ID: 865d3b32074c6d8db09ae099e538d06cbf1b527b44aa2a106c577511e988559c
                                                        • Opcode Fuzzy Hash: fd3df26539749cfc85292d591975b192f54954c10da8c04441d02bb9d7a64432
                                                        • Instruction Fuzzy Hash: FC91DF72508710DFC320DF25E841AABB7E9FF84714F50592EF999A7181DB71D908CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset$FilePath$DeleteDirectoryExistsH_prolog3
                                                        • String ID: Lua_DelFileRecursive$Path is file!$PathIsDirectoryW$hwang
                                                        • API String ID: 136051702-689166761
                                                        • Opcode ID: 49ed58bfe18f44a520fcd02087109b69bdc8d4cb9b39a3832ddfb969ddbbebdb
                                                        • Instruction ID: 8def0f014b8ac8296c34433cb9674c039ab34d918e218efde67eac3be37f6b46
                                                        • Opcode Fuzzy Hash: 49ed58bfe18f44a520fcd02087109b69bdc8d4cb9b39a3832ddfb969ddbbebdb
                                                        • Instruction Fuzzy Hash: 0791AC725083409FC320DF68D881B9BB7E8FF89714F40592EF599A7281DB70E908CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E26957
                                                        • _memset.LIBCMT ref: 00E2697C
                                                        • __swprintf.LIBCMT ref: 00E269A2
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E269AF
                                                        • MoveFileExW.KERNEL32(?,?,00000001), ref: 00E26A0F
                                                        • _memset.LIBCMT ref: 00E26A34
                                                        • __swprintf.LIBCMT ref: 00E26A64
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E26A71
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugFileOutputString__swprintf_memset$EnvironmentExistsExpandMovePathStrings
                                                        • String ID: Fun:%s, Description:%s it's not exists!$Lua_RenameFile$MoveFile %s to %s !$MoveFile %s to %s failed!$hwang
                                                        • API String ID: 2574488690-3112440984
                                                        • Opcode ID: 3e3a4cf5ef4dc9551604260a7ca1fa5dd42f1cc677648097bcaa29634cef2f4e
                                                        • Instruction ID: 5de610ff497bb19e30b2d0aae7d1a8bd31c0efdebbe2630613c6319fe254b2a7
                                                        • Opcode Fuzzy Hash: 3e3a4cf5ef4dc9551604260a7ca1fa5dd42f1cc677648097bcaa29634cef2f4e
                                                        • Instruction Fuzzy Hash: DE519D725083009FC300DF64D886A9BB7E8FF98715F50492EF589A7152EB70E949CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E24072
                                                        • __swprintf.LIBCMT ref: 00E24099
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E240A9
                                                        • PathIsDirectoryW.SHLWAPI(00000000), ref: 00E240F8
                                                        • PathCombineW.SHLWAPI(00000000,?,*.*), ref: 00E24125
                                                        • _memset.LIBCMT ref: 00E24208
                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000001,00000000), ref: 00E2429D
                                                        • DeleteFileW.KERNEL32(00000000,?,?,00000001,00000000), ref: 00E24318
                                                        • FindNextFileW.KERNEL32(?,?), ref: 00E2434B
                                                        • RemoveDirectoryW.KERNEL32 ref: 00E2438E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: File$DirectoryPath_memset$AttributesCombineDebugDeleteFindNextOutputRemoveString__swprintf
                                                        • String ID: %s %s$*.*$DTLScriptuser::DeleteDirectories$hwang
                                                        • API String ID: 3676729722-2739714048
                                                        • Opcode ID: 0fa03993db42ac68d6ff3be94233d1af8e8b6c3933070b81aabba0101cfa32a0
                                                        • Instruction ID: 423e53d0b1e0bdf294ca85b85d560c31350e246059ed7eeca2ba2cb4b727b737
                                                        • Opcode Fuzzy Hash: 0fa03993db42ac68d6ff3be94233d1af8e8b6c3933070b81aabba0101cfa32a0
                                                        • Instruction Fuzzy Hash: A1B1D0B1208391CFC724DF24E885BAFB7E9BF94308F10192EF599A7291DB709944CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2111A: OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 00E21137
                                                          • Part of subcall function 00E2111A: OpenServiceW.ADVAPI32(00000000,?,000F01FF), ref: 00E2114D
                                                          • Part of subcall function 00E2111A: QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,?,?,000F01FF), ref: 00E2117E
                                                          • Part of subcall function 00E2111A: StartServiceW.ADVAPI32(00000000,00000000,00000000,?,000F01FF), ref: 00E211A5
                                                          • Part of subcall function 00E2111A: QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,?,?,000F01FF), ref: 00E211BE
                                                        • _memset.LIBCMT ref: 00E2758B
                                                        • __swprintf.LIBCMT ref: 00E275A2
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E275B5
                                                        • _memset.LIBCMT ref: 00E275D2
                                                        • GetLastError.KERNEL32 ref: 00E275DA
                                                        • __swprintf.LIBCMT ref: 00E275EB
                                                          • Part of subcall function 00E4E0C0: __woutput_l.LIBCMT ref: 00E4E119
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E275F8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Service$DebugOpenOutputQueryStatusString__swprintf_memset$ErrorLastManagerStart__woutput_l
                                                        • String ID: Lua_SCM$Unknow Error in fun:%s$hwang $hwang err:%d$start$stop
                                                        • API String ID: 2724863133-1376429012
                                                        • Opcode ID: e48015f3f7a88e998d8f9408c13fd2177129a06d90f897a825442dbce0fe989f
                                                        • Instruction ID: bf184cd6625bd9b084df233fc2f36c35e26bfe85ff15ab03f4ef8ecaf9d98096
                                                        • Opcode Fuzzy Hash: e48015f3f7a88e998d8f9408c13fd2177129a06d90f897a825442dbce0fe989f
                                                        • Instruction Fuzzy Hash: B35195726087009FD310DF65EC42B5BB7E9FF85714F10982DF549AB282DBB19905CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E23803: lstrcmpW.KERNEL32(?,HKCR), ref: 00E23813
                                                        • RegCreateKeyExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?,00000000,?,?), ref: 00E253CB
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 00E25440
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,?,00000000,?,?), ref: 00E2562F
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • RegSetValueExW.ADVAPI32(?,?,00000000,0000000B,?,00000008,?,00000000,?,?), ref: 00E25564
                                                        • RegSetValueExW.ADVAPI32(?,?,00000000,00000003,?,?,?,00000000,?,?), ref: 00E255C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Value$CloseCreateEnvironmentExpandQueryStringslstrcmp
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_QWORD$REG_SZ$lc?^
                                                        • API String ID: 3752836482-2035963083
                                                        • Opcode ID: eba1621feb70e10210961de00e9461c1b28301d2a393781c5c6bedcc118cc835
                                                        • Instruction ID: 96175914e66419b98da6b7036cafdc73be66f75b73ee52bcdd2f5f1162a1a80a
                                                        • Opcode Fuzzy Hash: eba1621feb70e10210961de00e9461c1b28301d2a393781c5c6bedcc118cc835
                                                        • Instruction Fuzzy Hash: 51A1CF71208350AFE314EF14E881FABB7E8EFD4714F50582DF68AA7191DBB09949CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _sprintf.LIBCMT ref: 00E3C8CF
                                                        • _sprintf.LIBCMT ref: 00E3C912
                                                        • _sprintf.LIBCMT ref: 00E3C980
                                                          • Part of subcall function 00E3C633: ___from_strstr_to_strchr.LIBCMT ref: 00E3C652
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E3C9F7
                                                        • _sprintf.LIBCMT ref: 00E3CA24
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _sprintf$___from_strstr_to_strchr
                                                        • String ID: %$%$d$invalid option '%%%c' to 'format'$no value$string contains zeros
                                                        • API String ID: 2993986216-2671167248
                                                        • Opcode ID: 770a73c1901561db9e57c14fd20a05343802329974a1ac2cac8eb43ed77fb733
                                                        • Instruction ID: 943d60e930aa2d77c0a25d5e7b156d56551ed31aaf5db06fa6e47bd5057adf7b
                                                        • Opcode Fuzzy Hash: 770a73c1901561db9e57c14fd20a05343802329974a1ac2cac8eb43ed77fb733
                                                        • Instruction Fuzzy Hash: AB91E7312083919BD718DF28D8499AFBBE6EFC5304F24A91EF486B3255DA30DE45CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E23208
                                                        • __swprintf.LIBCMT ref: 00E2321A
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E23226
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E23259
                                                        • OutputDebugStringW.KERNEL32(if (nullptr == pfn)), ref: 00E2326C
                                                        • GetLastError.KERNEL32 ref: 00E23272
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString$AddressErrorLastProc__swprintf_memset
                                                        • String ID: DllManagerMetaTable$hModule is nil$hwang $if (nullptr == pfn)$if (nullptr == phMod)
                                                        • API String ID: 1717717894-1859836620
                                                        • Opcode ID: 540733b28def50b4ee0fa6b8be2d1c5ec2093fa72d8208bdfb2e4a6b768b28fd
                                                        • Instruction ID: 56ce71404cd7479f43655136e80ae85d316ce6f3eb9aaa4b20031b6ee4237a12
                                                        • Opcode Fuzzy Hash: 540733b28def50b4ee0fa6b8be2d1c5ec2093fa72d8208bdfb2e4a6b768b28fd
                                                        • Instruction Fuzzy Hash: CF41B172600710CFCB44DF29E885A56B3E5FF89324B14D46AFD09AF292DBB5D9058F90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00E213DD
                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 00E213F0
                                                        • OpenServiceW.ADVAPI32 ref: 00E2140B
                                                        • QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,00000000), ref: 00E21440
                                                        • Sleep.KERNEL32(?), ref: 00E21482
                                                        • QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,00000000), ref: 00E2149A
                                                        • GetTickCount.KERNEL32 ref: 00E214B3
                                                        • GetTickCount.KERNEL32 ref: 00E214C4
                                                        • ControlService.ADVAPI32(00000000,00000001,?), ref: 00E214E9
                                                        • Sleep.KERNEL32(?), ref: 00E214F9
                                                        • QueryServiceStatusEx.ADVAPI32(?,00000000,?,00000024,00000000), ref: 00E21514
                                                        • GetTickCount.KERNEL32 ref: 00E21525
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Service$CountTick$QueryStatus$OpenSleep$ControlManager
                                                        • String ID:
                                                        • API String ID: 2662810397-0
                                                        • Opcode ID: b3481b679aa74bf80bd599d0ea8cf0b2cd3d33818a00d19d261b9a7311449ebd
                                                        • Instruction ID: 75e5f3198b321ae56fcdca7422e77ef1d5d694e604da80067805a1e081f0cecc
                                                        • Opcode Fuzzy Hash: b3481b679aa74bf80bd599d0ea8cf0b2cd3d33818a00d19d261b9a7311449ebd
                                                        • Instruction Fuzzy Hash: 9551AD716083419FD710DF25EC84A2BB7E8FF99748F40196EF58AE3290D770DA088B52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _fprintf$_fgets$_flsall_memcmp
                                                        • String ID: %s$=(debug command)$cont$lua_debug>
                                                        • API String ID: 1882596661-1535575468
                                                        • Opcode ID: e8d1b9757e1e5d304f1fc07d5a2cc6dc4c1ef5e920084e2336f3a649d42c44c4
                                                        • Instruction ID: 0e68e006fc7d83ae9196d80dce8b064d40ba98ae881763448e0b00ec1eebe2e1
                                                        • Opcode Fuzzy Hash: e8d1b9757e1e5d304f1fc07d5a2cc6dc4c1ef5e920084e2336f3a649d42c44c4
                                                        • Instruction Fuzzy Hash: C13129B2F0024426DB15BA759C47FAF72EC9FA5B04F0460B9F919F2283FEB49D444261
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4_sprintf$_frexp_localeconv
                                                        • String ID: %.14g$%.14gx0p+0$p%+d
                                                        • API String ID: 3234680198-2818671220
                                                        • Opcode ID: 417bbc03bc4156b163cab3e83535502edeb603916132ff29b6b8cf22837f55df
                                                        • Instruction ID: 290767c6534d851af8bfa8d2481436dbec00f5b8a79dca5ed3a3d5e51b6b350d
                                                        • Opcode Fuzzy Hash: 417bbc03bc4156b163cab3e83535502edeb603916132ff29b6b8cf22837f55df
                                                        • Instruction Fuzzy Hash: 4541F3B6C04E09DEC706DF78D8565BFB7B8FF4A340F20535AE98A72141EB3091999391
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID: _ENV$constant$field$global$local$method$upvalue
                                                        • API String ID: 2931989736-2491131414
                                                        • Opcode ID: 7d3b8678d4408ee14b0a0d1e51f438a6c685046d1fbb7c94c9bbff1b35153a6e
                                                        • Instruction ID: fb58d16e0776b78c47e067dd52ead71f60ee4c31a7da4c4d0680b55e7d015467
                                                        • Opcode Fuzzy Hash: 7d3b8678d4408ee14b0a0d1e51f438a6c685046d1fbb7c94c9bbff1b35153a6e
                                                        • Instruction Fuzzy Hash: 4C4124713056029BCB288A5DC8AD97A7BD5EBE8714F20A56EE80AEB356DE30DC01C340
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: ...$[C]$[string "
                                                        • API String ID: 4104443479-2990245297
                                                        • Opcode ID: 8ee27acd5f2fbf3a567b597daec5d5cac95db605848730a284caa2fbfa6cc38c
                                                        • Instruction ID: 42a9bf5945bb392a66a400648ec8bf3b1775b53a1f230c6b93ffdbf68981aa41
                                                        • Opcode Fuzzy Hash: 8ee27acd5f2fbf3a567b597daec5d5cac95db605848730a284caa2fbfa6cc38c
                                                        • Instruction Fuzzy Hash: F831886B904641BED701CF589C859FABBBD9F59304F1420AAFC49F7302E260AE48C771
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID: %s expected, got %s$__name$bad argument #%d (%s)$bad argument #%d to '%s' (%s)$calling '%s' on bad self (%s)$light userdata$method
                                                        • API String ID: 2931989736-2714722004
                                                        • Opcode ID: b6320c81dfa4ee9f3839fa53dbbaca59784703a83dc15640a6509a0fa93f284c
                                                        • Instruction ID: d59d424836b9c0f41c3b9db9a03b27fd62f644bf4232652b34650677a9afbb0d
                                                        • Opcode Fuzzy Hash: b6320c81dfa4ee9f3839fa53dbbaca59784703a83dc15640a6509a0fa93f284c
                                                        • Instruction Fuzzy Hash: 9421FD31700734BBAB24A635AC42E7F26DE9F95B14F207119F919BB3D1EA60CD014696
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E30097: ___from_strstr_to_strchr.LIBCMT ref: 00E300F2
                                                          • Part of subcall function 00E30097: ___from_strstr_to_strchr.LIBCMT ref: 00E30118
                                                        • _strlen.LIBCMT ref: 00E2447B
                                                          • Part of subcall function 00E2B15D: __EH_prolog3.LIBCMT ref: 00E2B164
                                                          • Part of subcall function 00E29C6D: _memmove.LIBCMT ref: 00E29CD4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr$H_prolog3_memmove_strlen
                                                        • String ID: <call stack>$%s%s() : line %d [%s : line %d]$%sunknown : line %d [%s : line %d]$-- | $-> | $lc?^$nSlu
                                                        • API String ID: 379101648-3076329294
                                                        • Opcode ID: c19f2de33010c38ad933b9dc4a41a9c57872f58a9806ee20abc790bbd00ed3bc
                                                        • Instruction ID: bcd209013e9f707abca750dd0683b3df6b7e0726b4f09731ad8d04db06ebcec6
                                                        • Opcode Fuzzy Hash: c19f2de33010c38ad933b9dc4a41a9c57872f58a9806ee20abc790bbd00ed3bc
                                                        • Instruction Fuzzy Hash: C731D672208354ABC734EB64EC52F6BB7D9AB89720F106A1DF1ADB22C2DB3155048752
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00E2122D
                                                          • Part of subcall function 00E217F4: _memset.LIBCMT ref: 00E21813
                                                        • EnumDependentServicesW.ADVAPI32(?,00000001,00000000,00000000,?,?,00000000,?), ref: 00E2127A
                                                        • GetLastError.KERNEL32(?,00000001,00000000,00000000,?,?,00000000,?), ref: 00E21280
                                                        • EnumDependentServicesW.ADVAPI32(?,00000001,?,?,?,?,?,?,00000001,00000000,00000000,?,?,00000000,?), ref: 00E212B8
                                                        • OpenServiceW.ADVAPI32(?,?,00000024,?,00000001,?,?,?,?,?,?,00000001,00000000,00000000,?,?), ref: 00E212DA
                                                        • ControlService.ADVAPI32(00000000,00000001,00000000,?,00000001,?,?,?,?,?,?,00000001,00000000,00000000,?,?), ref: 00E212FD
                                                        • Sleep.KERNEL32(?,?,00000001,?,?,?,?,?,?,00000001,00000000,00000000,?,?,00000000,?), ref: 00E21339
                                                        • QueryServiceStatusEx.ADVAPI32(00000000,00000000,?,00000024,00000000,?,00000001,?,?,?,?,?,?,00000001,00000000,00000000), ref: 00E21353
                                                        • GetTickCount.KERNEL32 ref: 00E21363
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Service$CountDependentEnumServicesTick$ControlErrorLastOpenQuerySleepStatus_memset
                                                        • String ID:
                                                        • API String ID: 2007799816-0
                                                        • Opcode ID: 14cb15997491772485757407ae5b5144bf39851267cea9b0ddf36da4a6c7dccb
                                                        • Instruction ID: 7c539b921fe90569a61a3cff2da5d34c9477880c71fe7725f96ef2c93b48d7c5
                                                        • Opcode Fuzzy Hash: 14cb15997491772485757407ae5b5144bf39851267cea9b0ddf36da4a6c7dccb
                                                        • Instruction Fuzzy Hash: BC517772109344EFD310DF5AD884A6BBBF8FF99749F41196EF189E2220D771DA088B52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E28673
                                                        • __swprintf.LIBCMT ref: 00E28685
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E28691
                                                          • Part of subcall function 00E23061: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104), ref: 00E23091
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00E286CC
                                                        • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 00E286F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: File$DebugEnvironmentExistsExpandMoveOutputPathStringStrings__swprintf_memset
                                                        • String ID: Lua_DeleteFileAfterReboot$hwang
                                                        • API String ID: 2373601923-728301025
                                                        • Opcode ID: bc34e51d7af9a6c9fb65196415a60cd9488e802d78c267cc455f0393eaf748a5
                                                        • Instruction ID: 7e9fe219e467c93107eac9c065d5b7402bbdfad6e93eb440fdfbbee9e9bda2ff
                                                        • Opcode Fuzzy Hash: bc34e51d7af9a6c9fb65196415a60cd9488e802d78c267cc455f0393eaf748a5
                                                        • Instruction Fuzzy Hash: 37317E726083009FC710DF29E885A5BB7E8FF89720F50592EF849E7291DB70D549CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _sprintf$_localeconv_strspn
                                                        • String ID: %.14g$%lld$-0123456789
                                                        • API String ID: 2271272227-645645145
                                                        • Opcode ID: 72b70c315849e7c8e102b55b43c56b731e1beb6bab72d8a1fc265b93b67ada8c
                                                        • Instruction ID: 2fcfc14b540e19fffb1fad1e6be0918f3a610bf1a55ffc7ce6b1fc4bec7e9f6d
                                                        • Opcode Fuzzy Hash: 72b70c315849e7c8e102b55b43c56b731e1beb6bab72d8a1fc265b93b67ada8c
                                                        • Instruction Fuzzy Hash: 3711E775A00705AFD710EFB8EC4589EBFF8AF0A304F1469AAF845B7352E6309944C7A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreatePipe.KERNEL32(?,?,0000000C,?,00E96BD8,0000002C,00E52AB8,?,00000400,00000000,00E96628,0000009C,00E3E705,?,00000000,00E7E488), ref: 00E6016B
                                                        • GetLastError.KERNEL32 ref: 00E60175
                                                        • __dosmaperr.LIBCMT ref: 00E6017C
                                                          • Part of subcall function 00E50095: __getptd_noexit.LIBCMT ref: 00E50095
                                                          • Part of subcall function 00E500C9: __getptd_noexit.LIBCMT ref: 00E500C9
                                                          • Part of subcall function 00E6766B: __mtinitlocknum.LIBCMT ref: 00E67683
                                                        • __set_osfhnd.LIBCMT ref: 00E602C8
                                                        • __set_osfhnd.LIBCMT ref: 00E602D1
                                                        • CloseHandle.KERNEL32(?), ref: 00E60342
                                                        • CloseHandle.KERNEL32(?), ref: 00E60347
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle__getptd_noexit__set_osfhnd$CreateErrorLastPipe__dosmaperr__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 3608612400-0
                                                        • Opcode ID: da41b0bc64b417dd4c421ec608efbc49b48a3c2a00a35985ae5414cdd7595de2
                                                        • Instruction ID: e9fddadcfaa99fa59c38dfacda00c71de16fcd9c091ba1d70661b565bce1094b
                                                        • Opcode Fuzzy Hash: da41b0bc64b417dd4c421ec608efbc49b48a3c2a00a35985ae5414cdd7595de2
                                                        • Instruction Fuzzy Hash: 1B614631A416148FCB08EFB8EC54AAE7BA1AF05365F18465DE461BF2E3EB31D8058740
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00E296EC
                                                        • _memset.LIBCMT ref: 00E29703
                                                        • Process32FirstW.KERNEL32 ref: 00E29719
                                                        • Process32NextW.KERNEL32(?,?), ref: 00E2973C
                                                          • Part of subcall function 00E22A67: Process32NextW.KERNEL32(?,?), ref: 00E22A72
                                                        • __wcsnicmp.LIBCMT ref: 00E2977B
                                                        • OpenProcess.KERNEL32(00000001,00000000,?,?,00000000,?), ref: 00E2978E
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,00000000,?), ref: 00E297A0
                                                        • Process32NextW.KERNEL32(?,?), ref: 00E297B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Process32$Next$Process$CreateFirstOpenSnapshotTerminateToolhelp32__wcsnicmp_memset
                                                        • String ID:
                                                        • API String ID: 3961592381-0
                                                        • Opcode ID: c94f735972b2bc8831b4b72f26168e8a74a0cabcdc8fe96a9713992b4c5b88d5
                                                        • Instruction ID: cf87d7fa8c98f2018dc3663cee11e9f32069c07aa3a6ce9353d1af3013a537db
                                                        • Opcode Fuzzy Hash: c94f735972b2bc8831b4b72f26168e8a74a0cabcdc8fe96a9713992b4c5b88d5
                                                        • Instruction Fuzzy Hash: 2B517D726083509FD724DF65EC45B6BB7E8EF84714F00292EF855E2191EBB0D908CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __mtinitlocknum.LIBCMT ref: 00E67683
                                                          • Part of subcall function 00E5BFE3: __FF_MSGBANNER.LIBCMT ref: 00E5BFF8
                                                          • Part of subcall function 00E5BFE3: __NMSG_WRITE.LIBCMT ref: 00E5BFFF
                                                          • Part of subcall function 00E5BFE3: __malloc_crt.LIBCMT ref: 00E5C01F
                                                        • __lock.LIBCMT ref: 00E67696
                                                        • __lock.LIBCMT ref: 00E676E2
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,?,?,00E96C80,00000018,00E60189), ref: 00E676FE
                                                        • RtlEnterCriticalSection.NTDLL(0000000C), ref: 00E6771B
                                                        • RtlLeaveCriticalSection.NTDLL(0000000C), ref: 00E6772B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1422805418-0
                                                        • Opcode ID: d9975be79f7901c3d8677e8327ecdf86b21d52525e9adc251008c3cb75aeb39c
                                                        • Instruction ID: 689cda525a13276598e4b4c8e029ece280156186e45b8b31835d0283555865bf
                                                        • Opcode Fuzzy Hash: d9975be79f7901c3d8677e8327ecdf86b21d52525e9adc251008c3cb75aeb39c
                                                        • Instruction Fuzzy Hash: 7C415871A446068FDB14DF69EC4539CBBA0BF013BEF20A21BE4A5B72C1D774A854CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • _wcscmp.LIBCMT ref: 00E57BCF
                                                        • _wcscmp.LIBCMT ref: 00E57BE5
                                                        • ___lc_wcstolc.LIBCMT ref: 00E57C11
                                                        • ___get_qualified_locale.LIBCMT ref: 00E57C36
                                                          • Part of subcall function 00E663B8: _TranslateName.LIBCMT ref: 00E663F8
                                                          • Part of subcall function 00E663B8: _GetLocaleNameFromLangCountry.LIBCMT ref: 00E66411
                                                          • Part of subcall function 00E663B8: _TranslateName.LIBCMT ref: 00E6642C
                                                          • Part of subcall function 00E663B8: _GetLocaleNameFromLangCountry.LIBCMT ref: 00E66442
                                                          • Part of subcall function 00E663B8: IsValidCodePage.KERNEL32(00000000,?,?,00000055,?,?,00E57C3B,?,?,?,?,00000004,?,00000000), ref: 00E66496
                                                        • GetACP.KERNEL32(?,?,?,?,?,00000004,?,00000000), ref: 00E57CCD
                                                        • _memmove.LIBCMT ref: 00E57D83
                                                        • __invoke_watson.LIBCMT ref: 00E57DD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Name$CountryFromLangLocaleTranslate_wcscmp$CodePageValid___get_qualified_locale___lc_wcstolc__getptd_noexit__invoke_watson_memmove
                                                        • String ID:
                                                        • API String ID: 90596148-0
                                                        • Opcode ID: 8298b8b10025bd635608606d11d5995846a8d325695bd1a2a389fda9dec46cc1
                                                        • Instruction ID: 8fde4f0dc117ded30b85dece5bc06c83553bf7bc344f2a55673c7517c1359661
                                                        • Opcode Fuzzy Hash: 8298b8b10025bd635608606d11d5995846a8d325695bd1a2a389fda9dec46cc1
                                                        • Instruction Fuzzy Hash: 3771D3729042156BDB219B21EC01BFF77B9EF55355F0428A6FD48F3241EB319EA48BA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _rand
                                                        • String ID: interval is empty$interval too large$value expected$wrong number of arguments
                                                        • API String ID: 1172538735-3023847178
                                                        • Opcode ID: 750b0fd8005fbfda421a1893282f969ffe27367af71f398d6eb016f07feff624
                                                        • Instruction ID: 8a2681a826ca0d1aa5d003f47fb07e459acd9ca6ff4e61230e10a1912d0d9fb1
                                                        • Opcode Fuzzy Hash: 750b0fd8005fbfda421a1893282f969ffe27367af71f398d6eb016f07feff624
                                                        • Instruction Fuzzy Hash: 146119327047145BD708DE38D88552EBBD6EFC5360F19A63DF89BBB282DA70DC818281
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr$_sprintf
                                                        • String ID: (null)$<\%d>$invalid option '%%%c' to 'lua_pushfstring'
                                                        • API String ID: 4149170566-1859914613
                                                        • Opcode ID: 807f1282ff609346a1af51406335d06e19386b20a9cf0c9e14fa9c2acaa9c619
                                                        • Instruction ID: 0e4fdc9c27cab8545e16dd2a331f8194386cb6b8939941cb7c0d1add5442e197
                                                        • Opcode Fuzzy Hash: 807f1282ff609346a1af51406335d06e19386b20a9cf0c9e14fa9c2acaa9c619
                                                        • Instruction Fuzzy Hash: D1513772604B018FD718CF28C898A2ABBE1EFC5318F28991DE456E7356D730E905C752
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000), ref: 00E5F495
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,?,?,?,00000000), ref: 00E5F509
                                                        • __freea.LIBCMT ref: 00E5F5FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea
                                                        • String ID:
                                                        • API String ID: 2689816821-0
                                                        • Opcode ID: 0e984292c82be34cefc89402ea3f42216794db9b0bcb8bab555fec81412746c9
                                                        • Instruction ID: 881ed90fe41a5ece7c0509ba66c8d5c4a9fa96799463534f6bb4ecda65d9bb2a
                                                        • Opcode Fuzzy Hash: 0e984292c82be34cefc89402ea3f42216794db9b0bcb8bab555fec81412746c9
                                                        • Instruction Fuzzy Hash: D6410872501206ABEF259F549C41FBF3B65EF4435AF245978FD1AB6250EB30CD18C660
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E501E1: __fsopen.LIBCMT ref: 00E501EC
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E3E636
                                                        • _strspn.LIBCMT ref: 00E3E65E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr__fsopen_strspn
                                                        • String ID: cannot open file '%s' (%s)$h$invalid mode$rwa
                                                        • API String ID: 1994843342-2170200070
                                                        • Opcode ID: c3bcceafe552ca7c625bef42bad2004d2e1057f68aaffcb3ff3491e11466b80b
                                                        • Instruction ID: d4a8fdf9d8e57f6227611bfa15b39b506a6d8ad18f97a997ae5ff0d30f1da99a
                                                        • Opcode Fuzzy Hash: c3bcceafe552ca7c625bef42bad2004d2e1057f68aaffcb3ff3491e11466b80b
                                                        • Instruction Fuzzy Hash: BF315B327043103BD7146B29A847A7E7FD9DF84724F24A06EF849BB3C2EE719C018691
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: <call stack>$-- | $invalid string position$string too long
                                                        • API String ID: 4104443479-1494190266
                                                        • Opcode ID: 4bfa1657b57489531e10c1ab749c2bc0f7eccf082733a586014d569840be0fe3
                                                        • Instruction ID: 3af1677b04fbfa85bf6efb4e6952368e990a59a42ccebf73449aacdffbbad2fb
                                                        • Opcode Fuzzy Hash: 4bfa1657b57489531e10c1ab749c2bc0f7eccf082733a586014d569840be0fe3
                                                        • Instruction Fuzzy Hash: 7241AE317043249BD734EE68F881A6AF7E9EB80714F10392DF492A7682CB60E845C6A5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr_memmove
                                                        • String ID: -+ #0$.$invalid format (repeated flags)$invalid format (width or precision too long)
                                                        • API String ID: 1158259468-2773969720
                                                        • Opcode ID: 0edd7b56f60473ef78e4a5bbf7fe9d2d163a22af39749aa8bf5eb4c4e6f57225
                                                        • Instruction ID: a7e87e130c018310838a826d4dc9aba839dcdbf09a426cb6dc8d10e8ed20cde9
                                                        • Opcode Fuzzy Hash: 0edd7b56f60473ef78e4a5bbf7fe9d2d163a22af39749aa8bf5eb4c4e6f57225
                                                        • Instruction Fuzzy Hash: F22160595087A229DB2112799C9AB363FCC4FC7B29F3436B9F891FA182D958CC01C371
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 00E2286F
                                                        • FormatMessageA.KERNEL32(00001100,00000000,?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,00000028), ref: 00E228B2
                                                        • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000028), ref: 00E22918
                                                        Strings
                                                        • F:\DTL6\dtl_install\project\DTLInstaller_duilib\Common\base\ProcessToolHelp.hpp, xrefs: 00E228F4
                                                        • DTLBase::ProcessToolHelp::TerminateProcessByPid, xrefs: 00E228EA
                                                        • Throw win_exception at File:%sLine:%uFunction:%sMessage:%sLastError:%uDescription:%s, xrefs: 00E228F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: FormatFreeH_prolog3_LocalMessage
                                                        • String ID: DTLBase::ProcessToolHelp::TerminateProcessByPid$F:\DTL6\dtl_install\project\DTLInstaller_duilib\Common\base\ProcessToolHelp.hpp$Throw win_exception at File:%sLine:%uFunction:%sMessage:%sLastError:%uDescription:%s
                                                        • API String ID: 2435402305-1184792285
                                                        • Opcode ID: ffde5564aef149e014446c5d10690cab1ef80a5a0fdf47936476d8b8d2138d01
                                                        • Instruction ID: d133094362290e7c37099c673a59003d51417f496ea13a06cb9bfdfe52187eb3
                                                        • Opcode Fuzzy Hash: ffde5564aef149e014446c5d10690cab1ef80a5a0fdf47936476d8b8d2138d01
                                                        • Instruction Fuzzy Hash: 2B216D71910218EFDB19DFA4ED86EEEBBB5FF04300F149029F91576251CBB09A48DB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __init_pointers.LIBCMT ref: 00E577D9
                                                          • Part of subcall function 00E54496: __initp_misc_winsig.LIBCMT ref: 00E544BA
                                                          • Part of subcall function 00E54496: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E5896C
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E58980
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E58993
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E589A6
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E589B9
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00E589CC
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00E589DF
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00E589F2
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00E58A05
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00E58A18
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00E58A2B
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00E58A3E
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00E58A51
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00E58A64
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00E58A77
                                                          • Part of subcall function 00E54496: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00E58A8A
                                                        • __mtinitlocks.LIBCMT ref: 00E577DE
                                                          • Part of subcall function 00E5C08A: InitializeCriticalSectionAndSpinCount.KERNEL32(00E9AD38,00000FA0,?,?,00E577E3,00E4F2B1,00E96440,00000014), ref: 00E5C0A8
                                                        • __mtterm.LIBCMT ref: 00E577E7
                                                          • Part of subcall function 00E5784F: RtlDeleteCriticalSection.NTDLL(00000000), ref: 00E5BFA6
                                                          • Part of subcall function 00E5784F: RtlDeleteCriticalSection.NTDLL(00E9AD38), ref: 00E5BFCF
                                                        • __calloc_crt.LIBCMT ref: 00E5780C
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E57835
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm
                                                        • String ID:
                                                        • API String ID: 3148795158-0
                                                        • Opcode ID: dd5dad6f1571afa0aabc2cd9dd0a3cda2b2c79a00b574c7bb35050c766e29de4
                                                        • Instruction ID: e6085da97b814f57678fd751da7034dbc0649ce3f2b73bef0b6521ea2b9c5f74
                                                        • Opcode Fuzzy Hash: dd5dad6f1571afa0aabc2cd9dd0a3cda2b2c79a00b574c7bb35050c766e29de4
                                                        • Instruction Fuzzy Hash: 70F0AF3220D6211AE2387A387C0664A27C58F0137BF643E2AFCA1F50D1EE9084998084
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _localeconv_sprintf
                                                        • String ID: %lld$0x%llx$value has no literal form
                                                        • API String ID: 890530849-1121615176
                                                        • Opcode ID: 20c12955d16359f9c855fc9d885f4323719db9bad3f0d5e899ec27a342592d0d
                                                        • Instruction ID: c36ed829c4803cbfbae2381aa8509f46dc4f055421c01298f836d092ae49d004
                                                        • Opcode Fuzzy Hash: 20c12955d16359f9c855fc9d885f4323719db9bad3f0d5e899ec27a342592d0d
                                                        • Instruction Fuzzy Hash: F521096570422067DB15A6289C0BA7FAADF8FD5714F3470AAF805F7292EEB0DD01C7A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E226CF: __EH_prolog3_GS.LIBCMT ref: 00E226D6
                                                        • _memset.LIBCMT ref: 00E2859B
                                                        • __swprintf.LIBCMT ref: 00E285BC
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00E285C9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugH_prolog3_OutputString__swprintf_memset
                                                        • String ID: %s$hwang
                                                        • API String ID: 1256804999-2770030846
                                                        • Opcode ID: 10644b7403484302a0b4ed5d2027fcd8453115628435cba2179a0d3e1334a950
                                                        • Instruction ID: 76a1252cf0c75539d3ef8c554e9662d0d99be52c6cc4c33a542f35595c9e429f
                                                        • Opcode Fuzzy Hash: 10644b7403484302a0b4ed5d2027fcd8453115628435cba2179a0d3e1334a950
                                                        • Instruction Fuzzy Hash: 75314B722487009FC710EF14EC82B5AB7E9FB84720F148A29F559AB2D1DB71E905CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E293AB
                                                        • __swprintf.LIBCMT ref: 00E293CC
                                                        • OutputDebugStringW.KERNEL32(?,?,?,?,?,00000003,00000001,?,?,?,?,?,?,7694B390,00000000), ref: 00E293D9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DebugOutputString__swprintf_memset
                                                        • String ID: %s$hwang
                                                        • API String ID: 797231043-2770030846
                                                        • Opcode ID: f9255c242969e7a42f2a5832fcb7f5160bab96fe00285c8502ad3f37657726f8
                                                        • Instruction ID: 9c24b3dc063088b5453e0c2215b6d52a8941b46adac0446d328adbb8ad4f881e
                                                        • Opcode Fuzzy Hash: f9255c242969e7a42f2a5832fcb7f5160bab96fe00285c8502ad3f37657726f8
                                                        • Instruction Fuzzy Hash: B431B872604210DFC700EF64EC82E5AB7E9FF88320F449519F959AB2D2DB71E905CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __wgetenv.LIBCMT ref: 00E3FD14
                                                        • __wgetenv.LIBCMT ref: 00E3FD25
                                                          • Part of subcall function 00E541FC: _strnlen.LIBCMT ref: 00E54231
                                                          • Part of subcall function 00E541FC: __lock.LIBCMT ref: 00E54242
                                                          • Part of subcall function 00E541FC: __getenv_helper_nolock.LIBCMT ref: 00E5424D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __wgetenv$__getenv_helper_nolock__lock_strnlen
                                                        • String ID: %s%s$LUA_NOENV$_5_3
                                                        • API String ID: 3323649511-3642853900
                                                        • Opcode ID: 9f2bbbade8630b050b433d14497810ae3faf039f549696d7e101006412e7f3b4
                                                        • Instruction ID: 74c203e2df36e915f2e9db4b05ff886ed5a2b2ad47177b08d17d7b6cabbc0b76
                                                        • Opcode Fuzzy Hash: 9f2bbbade8630b050b433d14497810ae3faf039f549696d7e101006412e7f3b4
                                                        • Instruction Fuzzy Hash: 15113B72744B202B4A207528AC0A92E77D79EC1730720E339F939373C5EE749D028688
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __getptd_noexit.LIBCMT ref: 00E4FA62
                                                          • Part of subcall function 00E576B7: GetLastError.KERNEL32(?,?,00E500CE,00E4F07C), ref: 00E576B9
                                                          • Part of subcall function 00E576B7: __calloc_crt.LIBCMT ref: 00E576DA
                                                          • Part of subcall function 00E576B7: GetCurrentThreadId.KERNEL32 ref: 00E57703
                                                          • Part of subcall function 00E576B7: SetLastError.KERNEL32(00000000,00E500CE,00E4F07C), ref: 00E5771B
                                                        • __calloc_crt.LIBCMT ref: 00E4FA85
                                                        • __get_sys_err_msg.LIBCMT ref: 00E4FAA3
                                                        • __invoke_watson.LIBCMT ref: 00E4FAC0
                                                        Strings
                                                        • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00E4FA6D, 00E4FA93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__invoke_watson
                                                        • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                        • API String ID: 2164971522-798102604
                                                        • Opcode ID: 948d2e77d9e6395d3bb76feb0217d505008a4d0e4051775507ef3a11730e5801
                                                        • Instruction ID: 3c0f96bd8fc40bb49f77e1d9c208abf4517cc645a407ca6fb21123955ffca568
                                                        • Opcode Fuzzy Hash: 948d2e77d9e6395d3bb76feb0217d505008a4d0e4051775507ef3a11730e5801
                                                        • Instruction Fuzzy Hash: 1FF0E932644B126BD72266597C42D6B73CCDB61FAEB102936FD4DB7202EA11DC402295
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _memset.LIBCMT ref: 00E273B9
                                                          • Part of subcall function 00E2C6F5: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,5E3F636C,00000000,00000001,00000000,?,?,?,00E7333C,000000FF,00E2C7E6), ref: 00E2C750
                                                          • Part of subcall function 00E2C6F5: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,00000000,5E3F636C,00000000,00000001,00000000,?,?), ref: 00E2C769
                                                        • __swprintf.LIBCMT ref: 00E273F1
                                                        • OutputDebugStringW.KERNEL32(?,00000001,00000000), ref: 00E2740E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$DebugOutputString__swprintf_memset
                                                        • String ID: TerminateProcessByPid failed, %s$hwang
                                                        • API String ID: 2884027105-2046656990
                                                        • Opcode ID: 554c98add03d81329d230919254d80bd4481ea2727b0296b77e3ed8a2d0f9dd0
                                                        • Instruction ID: 7109909921828d8464548ba83c1137d07f9381f1ca00331e6be3ea8df3996753
                                                        • Opcode Fuzzy Hash: 554c98add03d81329d230919254d80bd4481ea2727b0296b77e3ed8a2d0f9dd0
                                                        • Instruction Fuzzy Hash: 2BF081329001285BCB10EB54EC45EDA73FDBF88300F4095E5F859BB181DEB19A85CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00E2874F
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E28756
                                                        • GetCurrentProcess.KERNEL32(00000000), ref: 00E28766
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressCurrentHandleModuleProcProcess
                                                        • String ID: IsWow64Process$kernel32
                                                        • API String ID: 4190356694-3789238822
                                                        • Opcode ID: 9edd0510f506908e421ab508265c11c3f144e892da544eb80288201e3b781a41
                                                        • Instruction ID: dd7df04f009501ce55ca83701ede53826fa6f6fef969f3afc1629405ff65919c
                                                        • Opcode Fuzzy Hash: 9edd0510f506908e421ab508265c11c3f144e892da544eb80288201e3b781a41
                                                        • Instruction Fuzzy Hash: 80F08272922719EFC710DBB5C809A8EB7ECEB08369B50C555E109E7100D7B4D981CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E5769F: __getptd_noexit.LIBCMT ref: 00E576A0
                                                        • __invoke_watson.LIBCMT ref: 00E66222
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit__invoke_watson
                                                        • String ID:
                                                        • API String ID: 2533157543-0
                                                        • Opcode ID: 8105e5e9337329e52863c4fd38e6f92baa258c910c9edbbe6a7d55064b6b1471
                                                        • Instruction ID: 1cf7ed02975787752b44391840064b6312c62330a3612f6a90f95f3044affbd2
                                                        • Opcode Fuzzy Hash: 8105e5e9337329e52863c4fd38e6f92baa258c910c9edbbe6a7d55064b6b1471
                                                        • Instruction Fuzzy Hash: 3371E8729946119BEF149E24EC86BBB77ECEF01394F1450A9FD09FA182EB34DD448760
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00E7021D
                                                          • Part of subcall function 00E70DE0: __87except.LIBCMT ref: 00E70E1B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: 71b4f141429e658f60020ac154e58376e350aed5f1712d0c5c67037af0bc754e
                                                        • Instruction ID: e41f21b941429da685802fa6c9efad6cdbf827b0dd2b39281616f767d61b6368
                                                        • Opcode Fuzzy Hash: 71b4f141429e658f60020ac154e58376e350aed5f1712d0c5c67037af0bc754e
                                                        • Instruction Fuzzy Hash: EF513862A08202DACB25B714CD053AE7BD4DB40718F24FD59F4DDB22FAEB348CC49A46
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DecrementInterlockedStringType___crt_memcmp
                                                        • String ID: C
                                                        • API String ID: 722280844-1037565863
                                                        • Opcode ID: ae234c6069bd5a55ded6013969dd90ff378c8176e70174c04a38dc76baaec7fd
                                                        • Instruction ID: 1e47c754a4ea2d1d85dd094c445649d1ba21598fc23dc5e5c1c7006dfbfe4cf3
                                                        • Opcode Fuzzy Hash: ae234c6069bd5a55ded6013969dd90ff378c8176e70174c04a38dc76baaec7fd
                                                        • Instruction Fuzzy Hash: 5871B574A022299FCB24DF18D9C8A9CB7B5BF09305F2095DAE809B7351DB71AE85CF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _fgetc.LIBCMT ref: 00E3EE5D
                                                          • Part of subcall function 00E3EBB6: _fgetc.LIBCMT ref: 00E3EC2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _fgetc
                                                        • String ID: _IO_input$invalid format$too many arguments
                                                        • API String ID: 762172173-2273374480
                                                        • Opcode ID: bb8990358e0ea82688b671d0d59e9351c9c406cec6080b89043ea8802a03b588
                                                        • Instruction ID: d3764845db292dedd939996b3b62201c732031b22d4c6952f68fcbcdb1809b1b
                                                        • Opcode Fuzzy Hash: bb8990358e0ea82688b671d0d59e9351c9c406cec6080b89043ea8802a03b588
                                                        • Instruction Fuzzy Hash: 1041E4317083529BCB14EE29944A63E7BD6AFC4724F14A629F859BB3C5DE60EC01C792
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4$__allrem
                                                        • String ID: zero
                                                        • API String ID: 2906899411-2883514770
                                                        • Opcode ID: c6b11242d7f3b188d2c76f7f009d76a81fb2c756c79cc965510d61d91d0789e8
                                                        • Instruction ID: 25446df7d43aa778075cc5fe1edd46fe15fc86a3a66f88c91c19898c5102b5a4
                                                        • Opcode Fuzzy Hash: c6b11242d7f3b188d2c76f7f009d76a81fb2c756c79cc965510d61d91d0789e8
                                                        • Instruction Fuzzy Hash: 68412C71604B148BD714EF24A84692EB7E5EFC5760F18D22EF49A671A2DF7148C1C287
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2AA83: __EH_prolog3.LIBCMT ref: 00E2AA8A
                                                          • Part of subcall function 00E2AA83: _strlen.LIBCMT ref: 00E2AB44
                                                        • _strnlen.LIBCMT ref: 00E2A970
                                                        • _memcpy_s.LIBCMT ref: 00E2A9A9
                                                        • _strcat.LIBCMT ref: 00E2AA03
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_memcpy_s_strcat_strlen_strnlen
                                                        • String ID: AStringMetaTable
                                                        • API String ID: 1366018426-3285423709
                                                        • Opcode ID: f593bb56a6cc29b4751edf3ec986e5e9b7f21cb4137a3d1c5e7f7b7ccb3043cb
                                                        • Instruction ID: ef01ffd7732427dfe3ac856f700ecc2cd76f921ca202b233c0a8db0a7cea0d8c
                                                        • Opcode Fuzzy Hash: f593bb56a6cc29b4751edf3ec986e5e9b7f21cb4137a3d1c5e7f7b7ccb3043cb
                                                        • Instruction Fuzzy Hash: 7B4105325042119FC714EF28EC40E6AB7E9FFC8334F28463DF455A7292DA30A805CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_strlen
                                                        • String ID: AStringMetaTable$WStringMetaTable
                                                        • API String ID: 782648989-3501246679
                                                        • Opcode ID: 5b0fce574c9dd2a04c7bcba7ec2f1d39c3ff0a7937dfcad14eddfe044d1aa100
                                                        • Instruction ID: ad695c309cb85f1e2fca0f05f65d4d3d51bf3efc911e792c4edd713aee597585
                                                        • Opcode Fuzzy Hash: 5b0fce574c9dd2a04c7bcba7ec2f1d39c3ff0a7937dfcad14eddfe044d1aa100
                                                        • Instruction Fuzzy Hash: 4C31A270A046258B8F24AF29EC4256DB7E7AFC5730724662AE526B72E1DE34CD418782
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryW.KERNEL32(lc?^), ref: 00E23114
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00E7383D), ref: 00E23120
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastLibraryLoad
                                                        • String ID: DllManagerMetaTable$lc?^
                                                        • API String ID: 3568775529-3872318702
                                                        • Opcode ID: cf40db8494d40a7499ce2c29b8ecd44965e172358aa9ff41fff885c3228afe73
                                                        • Instruction ID: 87eed0a2a7580b5dda2af87e0deb212e737dfe2c737208e6bc88a56352b2e6df
                                                        • Opcode Fuzzy Hash: cf40db8494d40a7499ce2c29b8ecd44965e172358aa9ff41fff885c3228afe73
                                                        • Instruction Fuzzy Hash: BE21B3726087109FC304DF29DC82A5BB7E8EB88720F50562EF556E72D1DA34A905CBD2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • MessageBoxW.USER32(00000000,?,:-( ,00010010), ref: 00E24628
                                                        • ExitProcess.KERNEL32 ref: 00E24630
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ExitMessageProcess
                                                        • String ID: :-( $lc?^
                                                        • API String ID: 1220098344-532068705
                                                        • Opcode ID: 20c4f1e99b08bd30731fbbd97fc16456ac4d09bd0a27f9e71667711b38109e04
                                                        • Instruction ID: ded0ccd8ec0cb9aaa77fbd1b0d60123f213938a3773f45a6c374f8a433976d26
                                                        • Opcode Fuzzy Hash: 20c4f1e99b08bd30731fbbd97fc16456ac4d09bd0a27f9e71667711b38109e04
                                                        • Instruction Fuzzy Hash: B1216D72218301AFD304DF19DC41A5BB7E8EF89714F505A1DF589A2191EB70EA48CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp
                                                        • String ID: ACP$OCP
                                                        • API String ID: 856254489-711371036
                                                        • Opcode ID: 3425667bbfe056a55e507fc9527711b05f8ebf7e6cc63d77edcd1540635b8489
                                                        • Instruction ID: 908c9cf7d89d46479a5d8d3dfd2f19e6221405830362dcebcfa7ce210ed33e6b
                                                        • Opcode Fuzzy Hash: 3425667bbfe056a55e507fc9527711b05f8ebf7e6cc63d77edcd1540635b8489
                                                        • Instruction Fuzzy Hash: B301F5326D561576EB10AA18FC52FDA33CC9F607E9F44A415F908FB282F730DA4042D4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memcpy_s_wcsnlen
                                                        • String ID: lc?^$lc?^
                                                        • API String ID: 296551695-2981666739
                                                        • Opcode ID: a792312c52136bc7f2c542663d3d38a6e6de55c1ba47e02a277a4dc8d49b4c5f
                                                        • Instruction ID: 7bae73ec49fd2c689004884af51649e7fddd8a9a911913625b5c437f36444517
                                                        • Opcode Fuzzy Hash: a792312c52136bc7f2c542663d3d38a6e6de55c1ba47e02a277a4dc8d49b4c5f
                                                        • Instruction Fuzzy Hash: 6B112572500628DFC714EEE4E884C6FB3DCEB94320B31562DF025BB292DE34A80487A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _wcsnlen
                                                        • String ID: U
                                                        • API String ID: 3628947076-3372436214
                                                        • Opcode ID: b66dc4ad0f1e2e76dfcdb571bf476acc49475a3a8db8ef0f4cc99bad16c0a139
                                                        • Instruction ID: 969413e5fe1da0dc435ffe11ca9c2be231b70ec6cac2098571062ec69168b7cd
                                                        • Opcode Fuzzy Hash: b66dc4ad0f1e2e76dfcdb571bf476acc49475a3a8db8ef0f4cc99bad16c0a139
                                                        • Instruction Fuzzy Hash: 41F02B7221C2182DEF089AB4FC49B7B33DDCB80366F201C21FD48E5151F621C968C250
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _malloc.LIBCMT ref: 00E4D7DC
                                                          • Part of subcall function 00E4EF94: __FF_MSGBANNER.LIBCMT ref: 00E4EFAB
                                                          • Part of subcall function 00E4EF94: __NMSG_WRITE.LIBCMT ref: 00E4EFB2
                                                          • Part of subcall function 00E4EF94: RtlAllocateHeap.NTDLL(008E0000,00000000,00000001), ref: 00E4EFD7
                                                        • std::exception::exception.LIBCMT ref: 00E4D7F8
                                                        • __CxxThrowException@8.LIBCMT ref: 00E4D80D
                                                          • Part of subcall function 00E4F421: RaiseException.KERNEL32(?,?,00E4D0D4,?,?,?,?,?,00E4D0D4,?,00E9634C,?), ref: 00E4F472
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                        • String ID: bad allocation
                                                        • API String ID: 3074076210-2104205924
                                                        • Opcode ID: 4602571cacf4d7358c6aa0704b6601270a1048524808baab287e88bcd98dfdb4
                                                        • Instruction ID: 5be99e467b35814a65edf6ebf9c188574277f6ae0a22a5f97906600159787d1b
                                                        • Opcode Fuzzy Hash: 4602571cacf4d7358c6aa0704b6601270a1048524808baab287e88bcd98dfdb4
                                                        • Instruction Fuzzy Hash: 49E0E53510420AAACB00EB94EC069DE77FCAB00344F102422F414B1091DBB0C6449691
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(Advapi32.dll,?,00000000,00E257F3,?,00000000,?,00000000,00000000), ref: 00E2BCED
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 00E2BCFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                                        • API String ID: 1646373207-2168864297
                                                        • Opcode ID: 89933f21490f79385b41f1e9a7ba2d70f748982c4454157a5ce0ba06cbd92607
                                                        • Instruction ID: fcacc9e7f10a388b4cc37eccf1f4ecec9d29f20c9823244ba294cbd543ed507a
                                                        • Opcode Fuzzy Hash: 89933f21490f79385b41f1e9a7ba2d70f748982c4454157a5ce0ba06cbd92607
                                                        • Instruction Fuzzy Hash: 94F0A032244691AB87215B26AC08DA7BBF8FFD9B0B705583EB088B1021D7718481C630
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        • F:\DTL6\dtl_install\project\DTLInstaller_duilib\Common\base\ProcessToolHelp.hpp, xrefs: 00E22972
                                                        • DTLBase::ProcessToolHelp::TerminateProcessByPid, xrefs: 00E22968
                                                        • Throw win_exception at File:%sLine:%uFunction:%sMessage:%s, xrefs: 00E22977
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3
                                                        • String ID: DTLBase::ProcessToolHelp::TerminateProcessByPid$F:\DTL6\dtl_install\project\DTLInstaller_duilib\Common\base\ProcessToolHelp.hpp$Throw win_exception at File:%sLine:%uFunction:%sMessage:%s
                                                        • API String ID: 431132790-93563643
                                                        • Opcode ID: 277f838d04bdf0f35ae7bd03cb72533b36102e56c1eb98978f649564dfd931da
                                                        • Instruction ID: 039c70cd2597a8a6e069e78038dd5804e51e6b2e900b6c600bd4207d2c425c35
                                                        • Opcode Fuzzy Hash: 277f838d04bdf0f35ae7bd03cb72533b36102e56c1eb98978f649564dfd931da
                                                        • Instruction Fuzzy Hash: 76F090B06003549FCB25EF289802B9A3BE0AF04704F109459E558BB282D7B1C641D796
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,?,00E4EA48,00000000), ref: 00E4EAB0
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E4EAB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoInitialize$combase.dll
                                                        • API String ID: 2574300362-340411864
                                                        • Opcode ID: af004d231be3adc0adbc96b18656089bbe5610f88263c714ef5c43279c852ab9
                                                        • Instruction ID: 6942f6c74f377cba70629a31a5406ef397ff4161bc8ec6af8d9a0ee1f8e54c9b
                                                        • Opcode Fuzzy Hash: af004d231be3adc0adbc96b18656089bbe5610f88263c714ef5c43279c852ab9
                                                        • Instruction Fuzzy Hash: C9E04F71691700EFDB206FBAFD0EB153AA5B714B0AF605527B109F52F0EBB8484C9B10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00E4EA85), ref: 00E4EB85
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E4EB8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 2574300362-2819208100
                                                        • Opcode ID: 5a3e8c32b109af51dcbffb0c5caf264ca129b3efaf38f6851f40c625571f59fe
                                                        • Instruction ID: 15bc06477e99fdbeed10f6d262c0f269e05033d71de76eb42cb2b247aa222a7d
                                                        • Opcode Fuzzy Hash: 5a3e8c32b109af51dcbffb0c5caf264ca129b3efaf38f6851f40c625571f59fe
                                                        • Instruction Fuzzy Hash: 32E09270542780EFDB606B67BD0DB1A3BA5B74470AF609057B106F56B1EBB848488E50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(Kernel32,Wow64RevertWow64FsRedirection), ref: 00E23049
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E23050
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: Kernel32$Wow64RevertWow64FsRedirection
                                                        • API String ID: 1646373207-2204841719
                                                        • Opcode ID: aa9a9bea4177eac0fc233597d4f7ebc21a20dea321aedf25af7825fa5d756f6e
                                                        • Instruction ID: bc1e9d924d0ca75cac2c28bfdb4c0b5558f58f0e9ced4e36e9dd559e594457d3
                                                        • Opcode Fuzzy Hash: aa9a9bea4177eac0fc233597d4f7ebc21a20dea321aedf25af7825fa5d756f6e
                                                        • Instruction Fuzzy Hash: 7CD0A932204B21AEDB301BB1BC08F853B98EB00B09F049418A298B10A2DBA88880CB20
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000400,00000400,00000000), ref: 00E29137
                                                          • Part of subcall function 00E227EE: __EH_prolog3.LIBCMT ref: 00E227F5
                                                        • TranslateMessage.USER32(?), ref: 00E29284
                                                        • DispatchMessageW.USER32(?), ref: 00E2928F
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E2929D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchH_prolog3PeekTranslate
                                                        • String ID:
                                                        • API String ID: 2404587510-0
                                                        • Opcode ID: ea2676d8d19948165e89d9cb458bbc3ef4424f1b932675d18155d7339f4cd004
                                                        • Instruction ID: f83834f53253b49d00001b1a7cfcf8cf63b0db745238c89dfacfcf7f9e3ed38c
                                                        • Opcode Fuzzy Hash: ea2676d8d19948165e89d9cb458bbc3ef4424f1b932675d18155d7339f4cd004
                                                        • Instruction Fuzzy Hash: D1613C725083519FC714DF64D884AABB7E8FF89714F005A1EF999D72A1DB30E908CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                        • String ID:
                                                        • API String ID: 3877424927-0
                                                        • Opcode ID: dda5197ddf4204d7b1203af45941f3a5603b98c6e6585dacabc379b8970434be
                                                        • Instruction ID: 0885ad05102603dd296308ec33abbad1b65dfe4ed45d997200cdf4e97eebe93c
                                                        • Opcode Fuzzy Hash: dda5197ddf4204d7b1203af45941f3a5603b98c6e6585dacabc379b8970434be
                                                        • Instruction Fuzzy Hash: 7151A734A00705DFDB248FA9D8846AE77B5AF40326F249F29FC65B62E2D7709D588B40
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AdjustPointer_memmove
                                                        • String ID:
                                                        • API String ID: 1721217611-0
                                                        • Opcode ID: ee2029981bd4b5826ecad0fe5af492897296f0b4f6e875728a90a17e08cb372f
                                                        • Instruction ID: 10a683863f8461c5998246985c7a713eedaa868352f6e2aa4a04bf8f9a467b8a
                                                        • Opcode Fuzzy Hash: ee2029981bd4b5826ecad0fe5af492897296f0b4f6e875728a90a17e08cb372f
                                                        • Instruction Fuzzy Hash: EF41F3762083029EEB285F15E842B6A33E49F10369F24281EFC45BB5D1EFB1ED88D654
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __EH_prolog3_catch.LIBCMT ref: 00E2BAD8
                                                        • LoadStringW.USER32(?,00000000,00000100,00000018), ref: 00E2BB50
                                                        • LoadStringW.USER32(?,00000000,00000100,00000018), ref: 00E2BBD8
                                                        • MessageBoxW.USER32(00000000,?,?,00010022), ref: 00E2BBF5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LoadString$H_prolog3_catchMessage
                                                        • String ID:
                                                        • API String ID: 1190379205-0
                                                        • Opcode ID: 0daa7e29b326013f0112cfc62e31ff54845726f73e259520c5e4ecff79bad4df
                                                        • Instruction ID: e6e38497fe226c10e8c532afb288e86d626681c87d793bd254e9ee17c6124a05
                                                        • Opcode Fuzzy Hash: 0daa7e29b326013f0112cfc62e31ff54845726f73e259520c5e4ecff79bad4df
                                                        • Instruction Fuzzy Hash: 5E31B571A01219AFDB048F65ED8A6BE7BB4EF44360F20502EF505FA2D4EBB44D418B50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E2887B
                                                        • _memset.LIBCMT ref: 00E288A7
                                                        • Process32FirstW.KERNEL32 ref: 00E288C0
                                                        • Process32NextW.KERNEL32(?,?), ref: 00E2890A
                                                          • Part of subcall function 00E22A67: Process32NextW.KERNEL32(?,?), ref: 00E22A72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Process32$Next$CreateFirstSnapshotToolhelp32_memset
                                                        • String ID:
                                                        • API String ID: 2803600000-0
                                                        • Opcode ID: 733a966ef2d63ff55e751f5c83edba542961915840076145cbad4e2e58eb6f04
                                                        • Instruction ID: b1c9ae8d20ad1dadc179a0b8da25f79cde4c49ce8e15adb0b7687101e0bc9392
                                                        • Opcode Fuzzy Hash: 733a966ef2d63ff55e751f5c83edba542961915840076145cbad4e2e58eb6f04
                                                        • Instruction Fuzzy Hash: 72316B71519350AFD724DF25E885B6BB7E8FB88714F40192EF49992280EB709908CB93
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00E6295F
                                                        • __isleadbyte_l.LIBCMT ref: 00E6298D
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,00000001,00000000,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 00E629BB
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,00000001,00000000,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 00E629F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: 8590c1a0a3e8a4a9f10c95ad3ced01aa483db0678bcfdccf09d68011f8e68d9e
                                                        • Instruction ID: 9011bc511547df14e009c42d1fd8df3120c2af332f3efdc501dd72d4cda6c91a
                                                        • Opcode Fuzzy Hash: 8590c1a0a3e8a4a9f10c95ad3ced01aa483db0678bcfdccf09d68011f8e68d9e
                                                        • Instruction Fuzzy Hash: 4A310131640A46AFDB218F75D844BBA7BB5FFC13A4F15942CE660BB191E330D891DB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2BEBD: RegCloseKey.ADVAPI32(?,?,00E25127,00000000,?), ref: 00E2BF01
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00E2BDB6
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E2BDCE
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E2BDF1
                                                        • RegCloseKey.ADVAPI32(00000000,?,?,?,?,00000000,00000000), ref: 00E2BE08
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Close$DeleteEnum
                                                        • String ID:
                                                        • API String ID: 650376604-0
                                                        • Opcode ID: e2787f47db4acc1e07ea456330a012200965d8598ac8a1a74d3c874f5d280d18
                                                        • Instruction ID: f4a02953c9e2d0ebd15d97bc210866b452e41b3be9f0ba6536cd1231ae2ee72d
                                                        • Opcode Fuzzy Hash: e2787f47db4acc1e07ea456330a012200965d8598ac8a1a74d3c874f5d280d18
                                                        • Instruction Fuzzy Hash: D4213B7594123DAFDB20DB55EC88AEABBB8EF18354F0001A6A509F2151DB309EC4CFE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __calloc_crt.LIBCMT ref: 00E4E9B8
                                                        • CreateThread.KERNEL32(00000002,00000010,00E4EAEE,00000000,?,?), ref: 00E4E9FC
                                                        • GetLastError.KERNEL32(?,00E28E28,00000000,00000000,00000000,?,00000000,00000000), ref: 00E4EA06
                                                        • __dosmaperr.LIBCMT ref: 00E4EA1A
                                                          • Part of subcall function 00E500C9: __getptd_noexit.LIBCMT ref: 00E500C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 910100809-0
                                                        • Opcode ID: 9e29b8a37789808a8b23cd79c8293b05e5eb002bcb7807d9bd2408ddbfb94a24
                                                        • Instruction ID: 43f6507674c8a5f38a30a3116aaa30ba2a9d671edd8032bd8a9e67b0edbe387a
                                                        • Opcode Fuzzy Hash: 9e29b8a37789808a8b23cd79c8293b05e5eb002bcb7807d9bd2408ddbfb94a24
                                                        • Instruction Fuzzy Hash: 27112133104706AF9B10AFA9BC41AAB3BD8FF44739B101819F908B22D1EB71D8049760
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __mtinitlocknum.LIBCMT ref: 00E52977
                                                        • __lock.LIBCMT ref: 00E52983
                                                        • _idtab.LIBCMT ref: 00E5298E
                                                          • Part of subcall function 00E500C9: __getptd_noexit.LIBCMT ref: 00E500C9
                                                        • __cwait.LIBCMT ref: 00E529C5
                                                          • Part of subcall function 00E60050: WaitForSingleObject.KERNEL32(?,00000000,00000000,00000000,?,00E529CA,?,?,00000001,?,00E96608,0000000C,00E3E6B7,00000000), ref: 00E60066
                                                          • Part of subcall function 00E60050: GetExitCodeProcess.KERNEL32(?,?), ref: 00E60075
                                                          • Part of subcall function 00E60050: CloseHandle.KERNEL32(?,?,00E529CA,?,?,00000001,?,00E96608,0000000C,00E3E6B7,00000000), ref: 00E600B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CloseCodeExitHandleObjectProcessSingleWait__cwait__getptd_noexit__lock__mtinitlocknum_idtab
                                                        • String ID:
                                                        • API String ID: 36153976-0
                                                        • Opcode ID: ba0226b9dec4b6d5965443f75fd833a8d4ee99d7d87937a729ce55b56a695199
                                                        • Instruction ID: 38f4d5ab98383e05839e5a1e61d32c010cffce958e0412204f0c03ba77bf8c9d
                                                        • Opcode Fuzzy Hash: ba0226b9dec4b6d5965443f75fd833a8d4ee99d7d87937a729ce55b56a695199
                                                        • Instruction Fuzzy Hash: 2B115B716413019FDB117BA0CC4276D76E4AF42727F116D1AFE147B2C2DB7899488A61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ___BuildCatchObject.LIBCMT ref: 00E5B387
                                                          • Part of subcall function 00E5B998: ___AdjustPointer.LIBCMT ref: 00E5B9E1
                                                        • _UnwindNestedFrames.LIBCMT ref: 00E5B39E
                                                        • ___FrameUnwindToState.LIBCMT ref: 00E5B3B0
                                                        • CallCatchBlock.LIBCMT ref: 00E5B3D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                        • String ID:
                                                        • API String ID: 2633735394-0
                                                        • Opcode ID: 55a506a801e90e1ee71051e5bc1063aa43d04cb7b5b3622a6187c7274493763c
                                                        • Instruction ID: 31450fd4a38064b410956a17a2a99924a9a8d29db24a0c09f6e1eb3dd3a8efcb
                                                        • Opcode Fuzzy Hash: 55a506a801e90e1ee71051e5bc1063aa43d04cb7b5b3622a6187c7274493763c
                                                        • Instruction Fuzzy Hash: F7012532000108BBCF129F95DC01EDA3BBAEF58755F159825FE1876121D772E865EBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction ID: 62f6cce5e9977a0a6e20e9342b9f6c998af7222c8a7650f7c34285a6c0f474ee
                                                        • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction Fuzzy Hash: B4016D7208414EBBCF125E84EC018ED3F63BF19398B189914FA9869031C736C9B1AB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?), ref: 00E453FE
                                                        • GetLastError.KERNEL32 ref: 00E4540C
                                                        • CloseHandle.KERNEL32(?,?,?), ref: 00E45449
                                                        • GetLastError.KERNEL32 ref: 00E45453
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$CloseCreateFileHandle
                                                        • String ID:
                                                        • API String ID: 614986841-0
                                                        • Opcode ID: 0a427defebe0f7c9a53601aaf729e12129f6e85b4d42757248bd08cee66cb1f1
                                                        • Instruction ID: b1035045e854b7bbdeefe1ef3ed285e36c4763db102634a3e8affc2da419eb27
                                                        • Opcode Fuzzy Hash: 0a427defebe0f7c9a53601aaf729e12129f6e85b4d42757248bd08cee66cb1f1
                                                        • Instruction Fuzzy Hash: 24012B32B00A087BDB209B65BC49B5DB768DB90326F204615F925FA2D1DAF089989750
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __lock.LIBCMT ref: 00E5776A
                                                          • Part of subcall function 00E5BF5B: __mtinitlocknum.LIBCMT ref: 00E5BF6D
                                                          • Part of subcall function 00E5BF5B: RtlEnterCriticalSection.NTDLL(?), ref: 00E5BF86
                                                        • InterlockedIncrement.KERNEL32(00E9A860), ref: 00E57777
                                                        • __lock.LIBCMT ref: 00E5778B
                                                        • ___addlocaleref.LIBCMT ref: 00E577A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1687444384-0
                                                        • Opcode ID: 6b90a41d4b96d863c7a7daf20729e432b615eba645fc263bbdbdc48c2c884205
                                                        • Instruction ID: a0a4f0b2c8f729922d23833a99b83adb82dac7a085c89d2b414e368da0d03627
                                                        • Opcode Fuzzy Hash: 6b90a41d4b96d863c7a7daf20729e432b615eba645fc263bbdbdc48c2c884205
                                                        • Instruction Fuzzy Hash: C3015B71404B00DFE7209F65E80674ABBF0AF44726F20AD0FE899A72A1DB70A588CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        • invalid order function for sorting, xrefs: 00E4117B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: invalid order function for sorting
                                                        • API String ID: 0-1445527858
                                                        • Opcode ID: a640295ac4835704986be2e96c63267e8300de9e088726eba624a007857d1df8
                                                        • Instruction ID: b137813d73f892af4476c666dc6d16394c9d4aeac6fd7449a40052f27cec1737
                                                        • Opcode Fuzzy Hash: a640295ac4835704986be2e96c63267e8300de9e088726eba624a007857d1df8
                                                        • Instruction Fuzzy Hash: 0551E931B0021597CF08DF29AC816AEB7E69F95320F24917EF916FB3C1DA749D458B90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _fgetc_localeconv
                                                        • String ID: +
                                                        • API String ID: 225233785-2126386893
                                                        • Opcode ID: acb2eb5e0745c4c889eaed77d0a13ba6a229a0836868351d435e358fcd656ba7
                                                        • Instruction ID: f76cd3f51b338ab7774c0f1355c6278cb6b1599c806d3360a193ece1cb8845e7
                                                        • Opcode Fuzzy Hash: acb2eb5e0745c4c889eaed77d0a13ba6a229a0836868351d435e358fcd656ba7
                                                        • Instruction Fuzzy Hash: 46415E309002698BDF75DB64CC85BADBBF0AF44354F1899EAD40AB6291DA709EC4CF60
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E2AA83: __EH_prolog3.LIBCMT ref: 00E2AA8A
                                                          • Part of subcall function 00E2AA83: _strlen.LIBCMT ref: 00E2AB44
                                                        • _memset.LIBCMT ref: 00E2A199
                                                        • _strcat.LIBCMT ref: 00E2A1B3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_memset_strcat_strlen
                                                        • String ID: AStringMetaTable
                                                        • API String ID: 38168682-3285423709
                                                        • Opcode ID: 489839f6f6d46c0fe0eaabdacbfab33793ffebc8f8d6b08d170ba91fd44ccaf6
                                                        • Instruction ID: f4e4830106fd8985d5a48d809659b4ede1470a3b3781cd72e5fdd122c7482615
                                                        • Opcode Fuzzy Hash: 489839f6f6d46c0fe0eaabdacbfab33793ffebc8f8d6b08d170ba91fd44ccaf6
                                                        • Instruction Fuzzy Hash: DC41D6B16043118FD714EF24E884B6AB7E1FFC4324F18992DF45667292DB35E809CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _sprintf
                                                        • String ID: \%03d$\%d
                                                        • API String ID: 1467051239-1830572345
                                                        • Opcode ID: 41fc4aba83a7788a130c0eb850f9b95d9183541f5cb1e9a0e903ee6653000f23
                                                        • Instruction ID: d5eaa53b9d645a01a0ea1f3304ddc3ecdcf973c6072a6317a42bd2a7f175f843
                                                        • Opcode Fuzzy Hash: 41fc4aba83a7788a130c0eb850f9b95d9183541f5cb1e9a0e903ee6653000f23
                                                        • Instruction Fuzzy Hash: 3A318534200B519BC725EF29D4A587ABBE6EF8A304724A85DD4F6B7752CB30F842C760
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetCommandLineW.KERNEL32(lc?^,5E3F636C), ref: 00E28B02
                                                        • CommandLineToArgvW.SHELL32(00000000), ref: 00E28B09
                                                          • Part of subcall function 00E227EE: __EH_prolog3.LIBCMT ref: 00E227F5
                                                          • Part of subcall function 00E226CF: __EH_prolog3_GS.LIBCMT ref: 00E226D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CommandLine$ArgvH_prolog3H_prolog3_
                                                        • String ID: lc?^
                                                        • API String ID: 648356053-3458774033
                                                        • Opcode ID: c1055db38e7ba7e27ab77f4152de822afb8fc43625eaa780f8f663c56ee1ec71
                                                        • Instruction ID: 1e780b175ed9a0d2a8ee91f060781914c0afc0605524f670c5e403d4bb488800
                                                        • Opcode Fuzzy Hash: c1055db38e7ba7e27ab77f4152de822afb8fc43625eaa780f8f663c56ee1ec71
                                                        • Instruction Fuzzy Hash: 56315A712083919FC314DF28E845A5BB7E9FFC5720F105A1EF596A3291DF309909CB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: _fprintf
                                                        • String ID: %.14g$%lld
                                                        • API String ID: 1654120334-1635807733
                                                        • Opcode ID: 7fc7fbdae17e3af712efb229f9045c69a0f757365844d823ffdac5dc985c3fd4
                                                        • Instruction ID: d38279871bbfb801c53c4e9122938c7b16149e2387dbda968e54d88055bb2c13
                                                        • Opcode Fuzzy Hash: 7fc7fbdae17e3af712efb229f9045c69a0f757365844d823ffdac5dc985c3fd4
                                                        • Instruction Fuzzy Hash: A3213B32E08310ABD710EA68E84592AB7E5DFC4314F10693DFA5477242EA31DC05C792
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00E2A597
                                                          • Part of subcall function 00E2B956: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,?,?,00E2A650,00000000,00E9A000,0000000C,00E2A00E,00000002,00000000,5E3F636C), ref: 00E2B96F
                                                          • Part of subcall function 00E2B956: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,00000000,?,?,00E2A650,00000000,00E9A000,0000000C,00E2A00E,00000002,00000000), ref: 00E2B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$H_prolog3
                                                        • String ID: AStringMetaTable$WStringMetaTable
                                                        • API String ID: 692526729-3501246679
                                                        • Opcode ID: 0b5150364d3041b36cb5c288813f265e06d9907b1f3881d4b48ea84a0f3f9674
                                                        • Instruction ID: dab99f2c3e73b5561921620438d3c7e64fde483379243dd09494cc5834862eaa
                                                        • Opcode Fuzzy Hash: 0b5150364d3041b36cb5c288813f265e06d9907b1f3881d4b48ea84a0f3f9674
                                                        • Instruction Fuzzy Hash: D721B4707046368B8F24AF68EC9247D73A2AFC4334728662DE526BB2D5CF34CE414686
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ___from_strstr_to_strchr.LIBCMT ref: 00E40337
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr
                                                        • String ID: no module '%s' in file '%s'$cpath
                                                        • API String ID: 601868998-2543832310
                                                        • Opcode ID: 40079d85ac432221398836cee6eb5bf7a30414ce3576bf25d35780b3ae9ce7d9
                                                        • Instruction ID: dd1a46a32dabd9b42522bcd8aab6247193f4048cd31d4f342f3a54f4b57628b7
                                                        • Opcode Fuzzy Hash: 40079d85ac432221398836cee6eb5bf7a30414ce3576bf25d35780b3ae9ce7d9
                                                        • Instruction Fuzzy Hash: 8A01842274861167A519753A3C52A3F47CE9BC5B78B24A039F709F72D2DD708D020069
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00E30097: ___from_strstr_to_strchr.LIBCMT ref: 00E300F2
                                                          • Part of subcall function 00E30097: ___from_strstr_to_strchr.LIBCMT ref: 00E30118
                                                        • _strncmp.LIBCMT ref: 00E2E31D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ___from_strstr_to_strchr$_strncmp
                                                        • String ID: _G.$_LOADED
                                                        • API String ID: 2516952115-344459542
                                                        • Opcode ID: 2575f111750eed049fcae15c0c59b91fbf5175f396b7033d1e0c23f422cb6bea
                                                        • Instruction ID: 9248049cded9c3986725dce48b1db5495bab191539c980cae9177f010cc13e44
                                                        • Opcode Fuzzy Hash: 2575f111750eed049fcae15c0c59b91fbf5175f396b7033d1e0c23f422cb6bea
                                                        • Instruction Fuzzy Hash: 7C1148333087305FD614A638AC42A2E73DADFC9730B24972DE176A77D6DFA0AC064691
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,5E3F636C,?,?,?,lc?^,lc?^,00000000,00E7423F), ref: 00E2C666
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,?,?,lc?^,lc?^,00000000,00E7423F,000000FF), ref: 00E2C681
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide
                                                        • String ID: lc?^
                                                        • API String ID: 626452242-3458774033
                                                        • Opcode ID: bc82f59ebc9f4ffc38c0c9adf853c0132167125d6a6d412b1789819a111aede1
                                                        • Instruction ID: 7d918c910f986c872a2e018c01d9aa2b4e28974724d6647c7deb8b497a323caf
                                                        • Opcode Fuzzy Hash: bc82f59ebc9f4ffc38c0c9adf853c0132167125d6a6d412b1789819a111aede1
                                                        • Instruction Fuzzy Hash: 141139B1608745BFE300CF19DC44F37BBECFB89664F110B2AB815D2690DBA5A9088671
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00E3FC15
                                                        • _strrchr.LIBCMT ref: 00E3FC2C
                                                          • Part of subcall function 00E2F5D0: _strstr.LIBCMT ref: 00E2F665
                                                        Strings
                                                        • unable to get ModuleFileName, xrefs: 00E3FC7D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: FileModuleName_strrchr_strstr
                                                        • String ID: unable to get ModuleFileName
                                                        • API String ID: 726832683-205594539
                                                        • Opcode ID: 006793b2fdaff22ae4076f938e062ef934f1864db5c78bddda6833d8c36a6f9d
                                                        • Instruction ID: 008752500fc814bbb8e53d1cb6fdeccd0e5ee596c2ddb09601639682140f9ef0
                                                        • Opcode Fuzzy Hash: 006793b2fdaff22ae4076f938e062ef934f1864db5c78bddda6833d8c36a6f9d
                                                        • Instruction Fuzzy Hash: 47016631B00A182BD724E628AC06BEE77E85F85730F20133AF621F31C5EEA08E448655
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • _tmpnam.LIBCMT ref: 00E3F565
                                                          • Part of subcall function 00E524F9: __tmpnam_helper.LIBCMT ref: 00E52511
                                                        • __wgetenv.LIBCMT ref: 00E3F5A6
                                                        Strings
                                                        • unable to generate a unique filename, xrefs: 00E3F589
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: __tmpnam_helper__wgetenv_tmpnam
                                                        • String ID: unable to generate a unique filename
                                                        • API String ID: 2058239520-1457574477
                                                        • Opcode ID: beba8412801eb8c1370c53d68a3af0bd86360925a9a704b8e327701d919b2466
                                                        • Instruction ID: 73eafd2c7331b02f26dc7a5ea881e0147224f1b06b006caa81a4ce2d7867314e
                                                        • Opcode Fuzzy Hash: beba8412801eb8c1370c53d68a3af0bd86360925a9a704b8e327701d919b2466
                                                        • Instruction Fuzzy Hash: 6DF0C871B04318ABDF04FBB8E8068BE33E9DF89318B509425F805F7281EE70EE058595
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00E2A4B9
                                                          • Part of subcall function 00E2A590: __EH_prolog3.LIBCMT ref: 00E2A597
                                                          • Part of subcall function 00E2C25D: _memcpy_s.LIBCMT ref: 00E2C2BF
                                                        • _wcscpy.LIBCMT ref: 00E2A529
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3$_memcpy_s_wcscpy
                                                        • String ID: WStringMetaTable
                                                        • API String ID: 3123550153-1986380071
                                                        • Opcode ID: 36e647fdf9749622a491ebab341dbc7ddf84b224021626b81a77b321323a605b
                                                        • Instruction ID: 4c9826acf0fdec84fb322ff4f8348ea4ffb99ea0997a8a6cf42337f262dc490f
                                                        • Opcode Fuzzy Hash: 36e647fdf9749622a491ebab341dbc7ddf84b224021626b81a77b321323a605b
                                                        • Instruction Fuzzy Hash: 810196319041299BDF04EBA4ED45BEE77F5BF85310F245858F4617B2D1DE306A05C791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • std::exception::exception.LIBCMT ref: 00E4D0E8
                                                          • Part of subcall function 00E4E29B: std::exception::_Copy_str.LIBCMT ref: 00E4E2B4
                                                        • __CxxThrowException@8.LIBCMT ref: 00E4D0FD
                                                          • Part of subcall function 00E4F421: RaiseException.KERNEL32(?,?,00E4D0D4,?,?,?,?,?,00E4D0D4,?,00E9634C,?), ref: 00E4F472
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3419320899.0000000000E21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
                                                        • Associated: 00000000.00000002.3419303246.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000000E9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419320899.0000000001ACB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419829915.0000000001ACE000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.0000000001ACF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000024CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3419858747.00000000026D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                                        • String ID: bad function call
                                                        • API String ID: 757275642-3612616537
                                                        • Opcode ID: a5fc0d88840334e77655e166a14de066b708eb3d4b0bab8eb61a901c00d3d248
                                                        • Instruction ID: aa912c0f9c9e5c64d0b94dbe2af0dae5ad2c9b2b9051eb727e16721205e9837e
                                                        • Opcode Fuzzy Hash: a5fc0d88840334e77655e166a14de066b708eb3d4b0bab8eb61a901c00d3d248
                                                        • Instruction Fuzzy Hash: D9D01279D0020CBB8B00EF94D4468CD7BBCAA84340F50E572F529A6200EAB0D6448B95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%